İnceledim ve bana kalırsa sorunun kaynağı Metin 2 Launcher'ı. Hep o process açıkken mavi ekranları almışsınız. Bu Launcher'ın güvenilirliğinden emin misiniz? Farklı bir Launcher kullanıyorsanız orijinal Launcher'ı kullanın.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc4806268f160, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffc4806268f0b8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8061
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 23651
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 5850
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffc4806268f160
BUGCHECK_P3: ffffc4806268f0b8
BUGCHECK_P4: 0
TRAP_FRAME: ffffc4806268f160 -- (.trap 0xffffc4806268f160)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8037ef2e748 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037e9e8caf rsp=ffffc4806268f2f0 rbp=ffffc4806268f360
r8=ffffc4806268f2d0 r9=0000000000000000 r10=fffff8037e81a610
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!PspProcessDelete+0x1ce69f:
fffff803`7e9e8caf cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc4806268f0b8 -- (.exr 0xffffc4806268f0b8)
ExceptionAddress: fffff8037e9e8caf (nt!PspProcessDelete+0x00000000001ce69f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: metin2client.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffc480`6268ee38 fffff803`7e609169 : 00000000`00000139 00000000`00000003 ffffc480`6268f160 ffffc480`6268f0b8 : nt!KeBugCheckEx
ffffc480`6268ee40 fffff803`7e609590 : ffffc708`30070980 fffff803`81286231 ffffc480`6268f000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc480`6268ef80 fffff803`7e607923 : 00000000`00000000 fffff803`7b005c55 00000000`00000000 ffffe703`53fc38d8 : nt!KiFastFailDispatch+0xd0
ffffc480`6268f160 fffff803`7e9e8caf : 00000000`00000000 ffffe703`5e2457b0 00000000`00000180 01000000`00100000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc480`6268f2f0 fffff803`7e8732d0 : ffffe703`59f1a050 ffffe703`59f1a050 00000000`00000000 ffffe703`502b5400 : nt!PspProcessDelete+0x1ce69f
ffffc480`6268f380 fffff803`7e408357 : 00000000`00000000 00000000`00000000 ffffc480`6268f509 ffffe703`59f1a080 : nt!ObpRemoveObjectRoutine+0x80
ffffc480`6268f3e0 fffff803`7e7f3b79 : ffffe703`59f1a050 00000000`00000000 00000000`00000000 ffffe703`593540c0 : nt!ObfDereferenceObjectWithTag+0xc7
ffffc480`6268f420 fffff803`7e85c855 : ffffe703`582a37a8 fffff803`7e408649 ffffe703`582a3770 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
ffffc480`6268f560 fffff803`7e85e6ad : ffffe703`582a3770 ffffe703`59a59080 ffffffff`ffffff01 ffffe703`59354518 : nt!ExSweepHandleTable+0xd5
ffffc480`6268f610 fffff803`7e85c5a0 : ffffffff`ffffffff ffffe703`593540c0 ffffc480`6268f660 fffff803`7e8203ac : nt!ObKillProcess+0x35
ffffc480`6268f640 fffff803`7e8b0ab6 : ffffe703`593540c0 ffffc708`2f0eb770 ffffc480`6268f890 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffffc480`6268f6d0 fffff803`7e8f53c8 : 00000000`00000001 00000000`00000101 00000000`00000000 00000000`003a9000 : nt!PspExitThread+0x5f6
ffffc480`6268f7d0 fffff803`7e40ef67 : ffffe703`5935493a 00000000`2663fd30 00000000`00000000 ffffc480`6268fa00 : nt!KiSchedulerApcTerminate+0x38
ffffc480`6268f810 fffff803`7e5fb750 : 00000000`00000000 ffffc480`6268f8c0 fffff803`79ca3180 fffff803`00000000 : nt!KiDeliverApc+0x487
ffffc480`6268f8c0 fffff803`7e608c5f : 00000000`0308e58a 00000000`00000001 ffffffff`ff676980 ffffc480`6268fa80 : nt!KiInitiateUserApc+0x70
ffffc480`6268fa00 00000000`77891cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`2229f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77891cfc
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1288
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8022bfdade6, Address of the instruction which caused the BugCheck
Arg3: ffff860d04b664a0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 21562
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 65150
Key : Analysis.Init.CPU.mSec
Value: 765
Key : Analysis.Init.Elapsed.mSec
Value: 5670
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8022bfdade6
BUGCHECK_P3: ffff860d04b664a0
BUGCHECK_P4: 0
CONTEXT: ffff860d04b664a0 -- (.cxr 0xffff860d04b664a0)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffca86fb643e40
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffca870e8faa80
rip=fffff8022bfdade6 rsp=ffff860d04b66ea0 rbp=0000000000000000
r8=ffffca870e8faa80 r9=00000000000000c8 r10=0000000000000001
r11=fffff8022ba0a368 r12=ffffca86fb641b70 r13=ffff860d04b67210
r14=0000000000000003 r15=ffffca86fb641b70
iopl=0 nv up ei pl zr ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050256
nt!PiDmCacheDataDecode+0x6a:
fffff802`2bfdade6 66391c42 cmp word ptr [rdx+rax*2],bx ds:002b:00000000`00000000=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SettingSyncHost.exe
LOCK_ADDRESS: fffff8022c644ba0 -- (!locks fffff8022c644ba0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff8022c644ba0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8022c644ba0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
STACK_TEXT:
ffff860d`04b66ea0 fffff802`2bfda8a0 : 00000000`c0000016 ffffca86`00000001 00000000`00000000 00000000`00000200 : nt!PiDmCacheDataDecode+0x6a
ffff860d`04b66ee0 fffff802`2bfda2e7 : fffff802`2ba0a368 ffffca87`0e8faa80 ffffca86`fb643dd0 00000000`00000003 : nt!PiDmObjectGetCachedObjectPropertyData+0xcc
ffff860d`04b66f40 fffff802`2bfd9e47 : ffff860d`04b670b0 ffffca86`fb641b70 00000000`00000000 00000000`00000003 : nt!PiDmObjectGetCachedObjectProperty+0xb7
ffff860d`04b66fb0 fffff802`2bfdb569 : ffff860d`04b67218 ffff860d`04b670f1 ffffca86`fb34f010 ffffca87`0c399d00 : nt!PiPnpRtlObjectActionCallback+0xe7
ffff860d`04b67050 fffff802`2bfdb45d : ffff860d`04b67218 00000000`47706e50 ffff928f`3a9c3430 fffff802`00000000 : nt!_PnpGetObjectProperty+0x9d
ffff860d`04b67120 fffff802`2bfd7acd : 00000000`00000000 fffff802`00000000 ffffca86`fb34f010 ffff928f`3a9c3430 : nt!PnpGetObjectProperty+0xd1
ffff860d`04b671b0 fffff802`2bfd7d12 : ffffca86`fb34f010 ffffca86`fb641b70 ffffca86`fb34f010 00000000`00000001 : nt!PiPnpRtlApplyMandatoryDeviceInterfaceFilters+0x69
ffff860d`04b67230 fffff802`2bfd7450 : 00000000`00000000 ffff860d`04b673b9 ffffca86`fb643dd0 ffffca86`fb643dd0 : nt!PiPnpRtlApplyMandatoryFilters+0x8e
ffff860d`04b67290 fffff802`2bfd73e6 : fffff802`2c643d01 ffffca86`fb643dd0 00000000`00000000 fffff802`2c643d60 : nt!PiDqQueryEnumObject+0x5c
ffff860d`04b672d0 fffff802`2bfd8b45 : ffffca86`fb643dd0 00000000`00000000 ffffca86`fb643dd0 fffff802`2c643d60 : nt!PiDqEnumQueryObjectsCallback+0x16
ffff860d`04b67300 fffff802`2bfd1f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`c0000001 : nt!PiDmEnumObjectsWithCallback+0x10d
ffff860d`04b67420 fffff802`2bfd2d4e : 00000000`00000000 fffff802`00000000 00000000`00000016 00000000`00000000 : nt!PiDqObjectManagerEnumerateAndRegisterQuery+0x314
ffff860d`04b67560 fffff802`2bfd1548 : ffff928f`3a9c3410 00000000`00000000 00000000`00000000 ffff860d`04b676a0 : nt!PiDqQuerySerializeActionQueue+0x9e
ffff860d`04b675f0 fffff802`2bfd2297 : ffff928f`36370190 ffff860d`04b67801 ffff928f`00000000 00000000`00000000 : nt!PiDqIrpQueryGetResult+0x154
ffff860d`04b67690 fffff802`2c0ee61d : ffff928f`36370190 ffff928f`2fb06d80 fffff802`2ba06590 00000000`00000000 : nt!PiDqDispatch+0x1c7
ffff860d`04b676d0 fffff802`2bc8f6f5 : ffff928f`36370190 00000000`00000002 00000000`00000000 00000000`00000001 : nt!PiDaDispatch+0x4d
ffff860d`04b67700 fffff802`2c0758f8 : ffff928f`36370190 00000000`00000000 ffff928f`36370190 00000000`00000000 : nt!IofCallDriver+0x55
ffff860d`04b67740 fffff802`2c0751c5 : 00000000`00000000 ffff860d`04b67a80 00000000`00000000 ffff860d`04b67a80 : nt!IopSynchronousServiceTail+0x1a8
ffff860d`04b677e0 fffff802`2c074bc6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000189`f3060a08 : nt!IopXxxControlFile+0x5e5
ffff860d`04b67920 fffff802`2be08bb5 : ffff928f`00000000 ffff860d`04b67a80 0000004e`c2b7f638 ffff928f`3814c1c0 : nt!NtDeviceIoControlFile+0x56
ffff860d`04b67990 00007ff9`dd1ace54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004e`c2b7f618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dd1ace54
SYMBOL_NAME: nt!PiDmCacheDataDecode+6a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1288
STACK_COMMAND: .cxr 0xffff860d04b664a0 ; kb
BUCKET_ID_FUNC_OFFSET: 6a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PiDmCacheDataDecode
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {66b0690e-8711-ad19-8b04-0e0cfbf4bb12}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe0007e60f500, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffe0007e60f458, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5561
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17672
Key : Analysis.Init.CPU.mSec
Value: 827
Key : Analysis.Init.Elapsed.mSec
Value: 6032
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffe0007e60f500
BUGCHECK_P3: ffffe0007e60f458
BUGCHECK_P4: 0
TRAP_FRAME: ffffe0007e60f500 -- (.trap 0xffffe0007e60f500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8052a6e3a90 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcf8ec5e8b158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8052de1a51f rsp=ffffe0007e60f690 rbp=0000000000000001
r8=0000000000000000 r9=000000000000000f r10=0000000000000003
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiSelectReadyThread+0x20cfef:
fffff805`2de1a51f cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffe0007e60f458 -- (.exr 0xffffe0007e60f458)
ExceptionAddress: fffff8052de1a51f (nt!KiSelectReadyThread+0x000000000020cfef)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: metin2client.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffe000`7e60f1d8 fffff805`2de09169 : 00000000`00000139 00000000`00000003 ffffe000`7e60f500 ffffe000`7e60f458 : nt!KeBugCheckEx
ffffe000`7e60f1e0 fffff805`2de09590 : ffffcf8e`bfa5b240 fffff805`2ddf9215 ffffe101`53be8180 fffff805`2a6df468 : nt!KiBugCheckDispatch+0x69
ffffe000`7e60f320 fffff805`2de07923 : ffffe101`539eb180 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe000`7e60f500 fffff805`2de1a51f : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe000`7e60f690 fffff805`2dc0c520 : ffffe101`00000008 00000000`ffffffff 00000000`00000000 ffffcf8e`c5e8b158 : nt!KiSelectReadyThread+0x20cfef
ffffe000`7e60f720 fffff805`2dc0bd2f : ffffcf8e`c4148080 00000000`00000000 ffffe000`7e60f8e0 00000000`00000000 : nt!KiSwapThread+0x220
ffffe000`7e60f7d0 fffff805`2dc0b5d3 : ffffe101`0000006a fffff805`00000000 000fa4ef`bd9bbf01 ffffcf8e`c41481c0 : nt!KiCommitThreadWait+0x14f
ffffe000`7e60f870 fffff805`2dff7b51 : ffffcf8e`c35c2260 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffe000`7e60f960 fffff805`2dff7bfa : ffffcf8e`c4148080 00000000`00000000 00000000`00000000 00000000`00285000 : nt!ObWaitForSingleObject+0x91
ffffe000`7e60f9c0 fffff805`2de08bb5 : 00000000`00000000 00000000`00000001 ffffe000`7e60fa18 ffffffff`fffdb610 : nt!NtWaitForSingleObject+0x6a
ffffe000`7e60fa00 00000000`77b21cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0a24f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b21cfc
SYMBOL_NAME: nt!KiSwapThread+220
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1288
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 220
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {364d2a10-fb5b-e8e9-9b5b-39c85a1b5a41}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000067, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8057064a7dc, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7686
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 23922
Key : Analysis.Init.CPU.mSec
Value: 1093
Key : Analysis.Init.Elapsed.mSec
Value: 6022
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 67
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8057064a7dc
WRITE_ADDRESS: fffff805710fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000067
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: metin2client.exe
TRAP_FRAME: ffffaa8ab06a9ef0 -- (.trap 0xffffaa8ab06a9ef0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc58c1d66f9c0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057064a7dc rsp=ffffaa8ab06aa080 rbp=0000000000000000
r8=ffffea753a9d4000 r9=ffffc58c1ee6a700 r10=ffffea753a9d4fff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x3c:
fffff805`7064a7dc f00fba2b1f lock bts dword ptr [rbx],1Fh ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffffaa8a`b06a9da8 fffff805`70809169 : 00000000`0000000a 00000000`00000067 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffaa8a`b06a9db0 fffff805`70805469 : ffffaa8a`b06aa360 fffff805`7062039f ffffaa8a`b06aa460 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa8a`b06a9ef0 fffff805`7064a7dc : 00010000`00000000 00000000`00000002 ffffc58c`00000000 ffffaa8a`b06aa4c0 : nt!KiPageFault+0x469
ffffaa8a`b06aa080 fffff805`708446c7 : 00000000`00000000 00000000`00000000 ffffc58c`15202000 00000000`00000600 : nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x3c
ffffaa8a`b06aa0b0 fffff805`7069e4e7 : 00000000`00000001 00000000`00000000 00000000`0000000e 00000000`00000fff : nt!MiLockPageTableInternal+0x1a3cd7
ffffaa8a`b06aa120 fffff805`70604f4b : 00000000`00000002 ffffc58c`1ee6a700 ffffaa8a`00000003 ffffaa8a`b06aa4e0 : nt!MiWalkPageTablesRecursively+0x847
ffffaa8a`b06aa1c0 fffff805`706049e1 : ffffaa8a`b06aa460 00000000`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffaa8a`b06aa2c0 fffff805`706040e9 : 00000000`00000000 00000000`00000000 ffff8200`2032b1c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffaa8a`b06aa7d0 fffff805`706038f7 : 00000000`00000000 ffffaa8a`b06aa980 ffffaa8a`b06aa940 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffaa8a`b06aa8c0 fffff805`706f3780 : fffff805`71050b00 ffffaa8a`b06aa980 00000000`000018ff ffff8200`00000200 : nt!MiProcessWorkingSets+0x227
ffffaa8a`b06aa960 fffff805`707b5c37 : 00000000`00000003 00000000`00000003 00000000`ffffffff ffff8200`1e1e8180 : nt!MiWorkingSetManager+0x110
ffffaa8a`b06aaa20 fffff805`70755855 : ffffc58c`158ab080 00000000`00000080 fffff805`707b5ae0 8b485024`448d4c00 : nt!KeBalanceSetManager+0x157
ffffaa8a`b06aab10 fffff805`707fe808 : ffff8200`1e1e8180 ffffc58c`158ab080 fffff805`70755800 cccccccc`cccccccc : nt!PspSystemThreadStartup+0x55
ffffaa8a`b06aab60 00000000`00000000 : ffffaa8a`b06ab000 ffffaa8a`b06a4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExAcquireSpinLockExclusiveAtDpcLevel+3c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1288
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3c
FAILURE_BUCKET_ID: AV_nt!ExAcquireSpinLockExclusiveAtDpcLevel
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2d838a6f-0e2e-fbf8-f6b6-d687446804d5}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the BugCheck
Arg2: fffff80084e0c869, Address of the instruction which caused the BugCheck
Arg3: ffffc600e7886920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5467
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11572
Key : Analysis.Init.CPU.mSec
Value: 906
Key : Analysis.Init.Elapsed.mSec
Value: 4200
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000096
BUGCHECK_P2: fffff80084e0c869
BUGCHECK_P3: ffffc600e7886920
BUGCHECK_P4: 0
CONTEXT: ffffc600e7886920 -- (.cxr 0xffffc600e7886920)
rax=0000000000000000 rbx=0000000000000102 rcx=ffffaa03fafd78e0
rdx=0000000000000001 rsi=0000000000000002 rdi=ffffe70b2fb08180
rip=fffff80084e0c869 rsp=ffffaa03fafd7720 rbp=0000000000100000
r8=ffffc600e71eb180 r9=0000000000000000 r10=0000000000000000
r11=fffff80084c00000 r12=0000000000000000 r13=0000000000000000
r14=ffffe70b2fb081c0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KiSwapThread+0x569:
fffff800`84e0c869 440f22c5 mov tmm,rbp
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: metin2client.exe
STACK_TEXT:
ffffaa03`fafd7720 fffff800`84e0bd2f : ffffe70b`2fb08080 00000000`00000000 ffffaa03`fafd78e0 00000000`00000000 : nt!KiSwapThread+0x569
ffffaa03`fafd77d0 fffff800`84e0b5d3 : ffffe70b`00000071 fffff800`00000000 00000000`00000001 ffffe70b`2fb081c0 : nt!KiCommitThreadWait+0x14f
ffffaa03`fafd7870 fffff800`851f7b51 : ffffe70b`30a47160 fffff800`00000006 ffffc67a`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffaa03`fafd7960 fffff800`851f7bfa : ffffe70b`2fb08080 00000000`00000000 00000000`00000000 00000000`0af4ff48 : nt!ObWaitForSingleObject+0x91
ffffaa03`fafd79c0 fffff800`85008bb5 : ffffe70b`2fb08080 00000000`00000000 ffffaa03`fafd7a18 ffffffff`ffff3cb0 : nt!NtWaitForSingleObject+0x6a
ffffaa03`fafd7a00 00000000`772f1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0a16f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772f1cfc
SYMBOL_NAME: nt!KiSwapThread+569
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1288
STACK_COMMAND: .cxr 0xffffc600e7886920 ; kb
BUCKET_ID_FUNC_OFFSET: 569
FAILURE_BUCKET_ID: 0x3B_c0000096_nt!KiSwapThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {235bae93-d676-ec58-f7d8-6b4e6f3fed8e}
Followup: MachineOwner
---------[/CODE]