Mavi ekran "KERNEL_SECURITY_CHECK_FAILURE" hatası

Hümmett

Kilopat
Katılım
30 Ocak 2018
Mesajlar
161
Daha fazla  
Cinsiyet
Erkek
Merhaba arkadaşlar, sistemim daha 1 aylık, birçok oyun oynadım bilgisayarı yoracak şekilde, World of Tanks da oynadım sorun çıkmadı ama 2 gündür World of Tanks'a girerken mavi ekran hatası ve başka bir hata başlığı altında ekran kartı çökme yazısı alıyorum. Resimleri ekliyorum bilgisi olanlar yardımcı olabilir mi?
 

Dosya Ekleri

  • 2E787B4E-E98C-4B7E-AB52-B528D9FE6445.jpeg
    2E787B4E-E98C-4B7E-AB52-B528D9FE6445.jpeg
    667,8 KB · Görüntüleme: 137
  • 5369A1D9-6DB0-4C61-9768-D8F3E9789DFA.jpeg
    5369A1D9-6DB0-4C61-9768-D8F3E9789DFA.jpeg
    531,6 KB · Görüntüleme: 116
Son düzenleyen: Moderatör:
Öncelikle Memtest86 ile bellek testi yapın:


Konu 4 sayfaya ulaşmış ama sistem özelliklerinizi göremiyorum halen. Nedir bu sistemin özellikleri? RAM'i, güç kaynağı? Detaylıca yazın!

CPU-Z SPD bilgisi paylaşın.

Analizime göre bellek kaynaklı olabilir:

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8078366bc20, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8078366bb78, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9772

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 101

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8078366bc20

BUGCHECK_P3: fffff8078366bb78

BUGCHECK_P4: 0

TRAP_FRAME:  fffff8078366bc20 -- (.trap 0xfffff8078366bc20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff920e8d88ffe8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077cec506d rsp=fffff8078366bdb0 rbp=ffff920e8e40e080
 r8=0000000000000001  r9=0000000000000006 r10=fffff8077cec2e00
r11=fffff8077b67c180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiExitDispatcher+0x1ad:
fffff807`7cec506d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff8078366bb78 -- (.exr 0xfffff8078366bb78)
ExceptionAddress: fffff8077cec506d (nt!KiExitDispatcher+0x00000000000001ad)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff807`8366b8f8 fffff807`7d007169     : 00000000`00000139 00000000`00000003 fffff807`8366bc20 fffff807`8366bb78 : nt!KeBugCheckEx
fffff807`8366b900 fffff807`7d007590     : 00000000`00000200 00000000`00000000 fffff807`7cff1300 fffff807`7ce7448a : nt!KiBugCheckDispatch+0x69
fffff807`8366ba40 fffff807`7d005923     : ffff920e`8cad7902 fffff807`919db008 ffff920e`91c7a4b0 00000000`00000009 : nt!KiFastFailDispatch+0xd0
fffff807`8366bc20 fffff807`7cec506d     : 00000000`00000000 00000000`00000000 fffff807`919db008 ffff920e`8cae0788 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`8366bdb0 fffff807`7cec33f7     : ffff920e`8e40e080 ffff920e`8cae0780 ffff920e`8e40e080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`8366be20 fffff807`7cec2e97     : 00000000`00000000 fffff807`8366bf06 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`8366bf10 fffff807`8cc65056     : 00000000`00000018 fffff807`8366bfb0 ffff920e`9197d710 ffff920e`000b000b : nt!IofCompleteRequest+0x17
fffff807`8366bf40 fffff807`8cc43aa7     : 00000000`00000002 ffff920e`8c9fe500 ffff920e`86c45190 fffff807`8366c024 : mouclass!MouseClassServiceCallback+0x476
fffff807`8366bfe0 fffff807`7cec2fce     : 00000000`00000000 fffffff6`00000000 ffff920e`8cb78101 fffff807`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`8366c080 fffff807`7cec2e97     : 00000000`00000000 ffff920e`8c0fb406 ffff920e`8a1ff150 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`8366c170 fffff807`8cc0aef5     : ffff920e`8c913a88 ffff920e`897b2502 00000000`00000000 00000000`00000008 : nt!IofCompleteRequest+0x17
fffff807`8366c1a0 fffff807`8cc0a7ed     : ffff920e`897b25e0 ffff920e`897b2502 ffff920e`897b25e0 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`8366c2a0 fffff807`7cec2fce     : ffff920e`8cb0a0d0 ffff920e`8cb0a0d0 fffff807`8366c301 ffff920e`8cb0a54b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`8366c340 fffff807`7cec2e97     : 00000000`00000001 00000000`00000000 ffff920e`8cadd020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`8366c430 fffff807`81fb811a     : 00000000`00000000 ffff920e`8a2b7a60 ffff920e`8cb0a0d0 fffff807`8366c510 : nt!IofCompleteRequest+0x17
fffff807`8366c460 fffff807`81fb5bbf     : ffff920e`89430b02 ffff920e`8ca82750 ffff920e`8cb0a0d0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`8366c4f0 fffff807`8d05b91c     : 00000000`ffffff02 ffff920e`894309c0 ffff920e`8cadd400 ffff920e`8cadd400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`8366c550 fffff807`8d05b7e1     : ffff920e`89430b60 00000000`00000007 ffff920e`89430bf0 fffff807`8366c768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`8366c5b0 fffff807`8d05b5d0     : 00000000`00000004 fffff807`8366c720 00000000`00000000 ffff920e`8cadc5e0 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`8366c660 fffff807`8d056570     : 00000000`00000004 fffff807`8366c738 00000000`00000008 fffff807`8366c740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`8366c690 fffff807`8d0560a5     : 00000000`00000780 00006df1`76847500 ffff920e`8a6fbec0 ffff920e`89bd0470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`8366c6f0 fffff807`8d055d7c     : ffff920e`8c810328 fffff807`7b67c180 00006df1`737ee328 fffff807`8366c810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`8366c7f0 fffff807`81fb38f5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`8366c820 fffff807`7cee535e     : fffff807`7b67f240 00000000`00000000 fffff807`8366cb20 fffff807`7b67c180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`8366c860 fffff807`7cee4644     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`8366c9d0 fffff807`7cff8d7e     : 00000000`00000000 fffff807`7b67c180 fffff807`7d927600 ffff920e`8f7d00c0 : nt!KiRetireDpcList+0x1f4
fffff807`8366cc60 00000000`00000000     : fffff807`8366d000 fffff807`83667000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  mouclass!MouseClassServiceCallback+476

MODULE_NAME: mouclass

IMAGE_NAME:  mouclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  476

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {19eabd28-80b6-28d3-485c-6d6a06644567}

Followup:     MachineOwner
---------

KERNEL_THREAD_PRIORITY_FLOOR_VIOLATION (157)
An illegal operation was attempted on the priority floor of a particular
thread.
Arguments:
Arg1: ffffc50621bce380, The address of the thread
Arg2: 0000000000000004, The target priority value
Arg3: 0000000000000002, The priority counter for the target priority underflowed
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4311

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9504

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  157

BUGCHECK_P1: ffffc50621bce380

BUGCHECK_P2: 4

BUGCHECK_P3: 2

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffda0a`1f1fc7e8 fffff800`510462f8     : 00000000`00000157 ffffc506`21bce380 00000000`00000004 00000000`00000002 : nt!KeBugCheckEx
ffffda0a`1f1fc7f0 fffff800`50edb4bd     : ffffda0a`1f1fc8f8 00000000`00000000 ffffda0a`00000003 0000002a`00000000 : nt!KiAbThreadUnboostCpuPriority+0x1b8374
ffffda0a`1f1fc860 fffff800`50edaa7d     : ffffc506`21bce380 ffffb481`d5ea1100 00000000`00000003 00000000`00000003 : nt!KiAbThreadRemoveBoosts+0x5d
ffffda0a`1f1fc890 fffff800`51063dc7     : ffffc506`21bcefd0 ffffda0a`1f1fc9a9 ffffc506`21bce380 ffffc506`00002348 : nt!KeAbPreAcquire+0xed
ffffda0a`1f1fc8e0 fffff800`5d42d13d     : ffffda0a`1f1fca01 00000000`00989680 0000006f`a00d8f02 00000000`00000002 : nt!KeWaitForMultipleObjects+0x1a5bb7
ffffda0a`1f1fc9f0 fffff800`5d3bb9ca     : 00000000`00000000 ffffc506`21b60000 ffffda0a`1f1fcb19 ffffc506`21b60000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffffda0a`1f1fcac0 fffff800`5d43ad45     : ffffc506`21fad000 ffffc506`21b60000 ffffc506`21fad010 ffffc506`272bf8a0 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffffda0a`1f1fcb80 fffff800`5d43acfa     : ffffc506`21b60400 fffff800`5d43ac30 ffffc506`21b60000 ffffb481`d5ea1100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffda0a`1f1fcbd0 fffff800`50ea29a5     : ffffc506`21bce380 fffff800`00000001 ffffc506`21b60000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffda0a`1f1fcc10 fffff800`50ffc868     : ffffb481`d5ea1180 ffffc506`21bce380 fffff800`50ea2950 03c81d58`00000005 : nt!PspSystemThreadStartup+0x55
ffffda0a`1f1fcc60 00000000`00000000     : ffffda0a`1f1fd000 ffffda0a`1f1f7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VidSchiWaitForSchedulerEvents+25d

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1124

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25d

FAILURE_BUCKET_ID:  0x157_dxgmms2!VidSchiWaitForSchedulerEvents

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {08e8de48-145f-7450-09b2-c895ecb87fe8}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe08f69312c20, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffe08f69312c20, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3889

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5837

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffe08f69312c20

BUGCHECK_P2: 11

BUGCHECK_P3: ffffe08f69312c20

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff806312fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8063120f340: Unable to get Flags value from nt!KdVersionBlock
fffff8063120f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffe08f69312c20

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffff8281ced105e0 -- (.trap 0xffff8281ced105e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe08f68f44368 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000e5 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe08f69312c20 rsp=ffff8281ced10770 rbp=ffff9080f2d5c180
 r8=000000010000012c  r9=ffff9080f2dd5180 r10=ffffe08f6548d080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffe08f`69312c20 202c31          and     byte ptr [rcx+rsi],ch ds:00000000`00000000=??
Resetting default scope

STACK_TEXT: 
ffff8281`ced10338 fffff806`30a7a665     : 00000000`00000050 ffffe08f`69312c20 00000000`00000011 ffff8281`ced105e0 : nt!KeBugCheckEx
ffff8281`ced10340 fffff806`308ea4a0     : 00000000`00000000 00000000`00000011 ffff8281`ced10660 00000000`00000000 : nt!MiSystemFault+0x172315
ffff8281`ced10440 fffff806`30a0335e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8281`ced105e0 ffffe08f`69312c20     : ffffe08f`69312c20 00000000`00000001 00000000`00000000 ffff9080`f2d5c180 : nt!KiPageFault+0x35e
ffff8281`ced10770 ffffe08f`69312c20     : 00000000`00000001 00000000`00000000 ffff9080`f2d5c180 ffffe08f`5e0b2000 : 0xffffe08f`69312c20
ffff8281`ced10778 00000000`00000001     : 00000000`00000000 ffff9080`f2d5c180 ffffe08f`5e0b2000 ffffe08f`6757c848 : 0xffffe08f`69312c20
ffff8281`ced10780 00000000`00000000     : ffff9080`f2d5c180 ffffe08f`5e0b2000 ffffe08f`6757c848 ffffe08f`00000000 : 0x1


SYMBOL_NAME:  nt!MiSystemFault+172315

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  172315

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffea0e17661940, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffea0e17661898, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21397

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffea0e17661940

BUGCHECK_P3: ffffea0e17661898

BUGCHECK_P4: 0

TRAP_FRAME:  ffffea0e17661940 -- (.trap 0xffffea0e17661940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff928adf442c68 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff928adb552140 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80126067e27 rsp=ffffea0e17661ad8 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffff928ad01db1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x19ebe7:
fffff801`26067e27 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffea0e17661898 -- (.exr 0xffffea0e17661898)
ExceptionAddress: fffff80126067e27 (nt!RtlRbRemoveNode+0x000000000019ebe7)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffea0e`17661618 fffff801`26007169     : 00000000`00000139 00000000`0000001d ffffea0e`17661940 ffffea0e`17661898 : nt!KeBugCheckEx
ffffea0e`17661620 fffff801`26007590     : 00000000`00000000 fffff801`25ffbf96 00000000`00000000 fffff801`25e5905b : nt!KiBugCheckDispatch+0x69
ffffea0e`17661760 fffff801`26005923     : 00000000`00000000 ffffce01`f392c180 ffff928a`d9479040 fffff801`25edf38f : nt!KiFastFailDispatch+0xd0
ffffea0e`17661940 fffff801`26067e27     : ffff928a`db552100 ffff928a`db552140 fffff801`3447251c 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffea0e`17661ad8 fffff801`3447251c     : 00000000`00000000 ffff928a`db552100 00000000`00000000 fffff801`34477190 : nt!RtlRbRemoveNode+0x19ebe7
ffffea0e`17661af0 fffff801`34472f29     : 00000000`00000010 00000000`00000016 00000000`00000002 fffff801`34477150 : mmcss!CiSchedulerWait+0x37c
ffffea0e`17661bc0 fffff801`25ea29a5     : ffff928a`00000030 ffff928a`d9479040 00000000`00000080 fffff801`34472d50 : mmcss!CiSchedulerThreadFunction+0x1d9
ffffea0e`17661c10 fffff801`25ffc868     : ffffce01`f39e6180 ffff928a`d9479040 fffff801`25ea2950 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffea0e`17661c60 00000000`00000000     : ffffea0e`17662000 ffffea0e`1765c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  mmcss!CiSchedulerWait+37c

MODULE_NAME: mmcss

IMAGE_NAME:  mmcss.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  37c

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_mmcss!CiSchedulerWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5875fdc-2064-6d97-04f6-3d8302607b2b}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffaa0daa3ee630, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffaa0daa3ee588, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5061

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11174

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffaa0daa3ee630

BUGCHECK_P3: ffffaa0daa3ee588

BUGCHECK_P4: 0

TRAP_FRAME:  ffffaa0daa3ee630 -- (.trap 0xffffaa0daa3ee630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb10569b2e4a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb1056caf9a40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077507048d rsp=ffffaa0daa3ee7c0 rbp=000000d3013ee53a
 r8=000000d3013c4b98  r9=fffff8076f90c6b0 r10=fffff8076f909ac0
r11=ffffaa0daa3ee800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiInsertTimerTable+0x18f1fd:
fffff807`7507048d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffaa0daa3ee588 -- (.exr 0xffffaa0daa3ee588)
ExceptionAddress: fffff8077507048d (nt!KiInsertTimerTable+0x000000000018f1fd)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffaa0d`aa3ee308 fffff807`75007169     : 00000000`00000139 00000000`00000003 ffffaa0d`aa3ee630 ffffaa0d`aa3ee588 : nt!KeBugCheckEx
ffffaa0d`aa3ee310 fffff807`75007590     : 00000000`00000000 ffffaa0d`aa3ee740 00000000`00000000 719c0700`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa0d`aa3ee450 fffff807`75005923     : 00000000`00000000 00000000`00000000 ffff1ba5`f8d95979 ffffb105`6621ac10 : nt!KiFastFailDispatch+0xd0
ffffaa0d`aa3ee630 fffff807`7507048d     : ffffaa0d`aa3ee800 fffff807`837e41c2 00000000`00000081 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffaa0d`aa3ee7c0 fffff807`74edf5fd     : ffffb105`69b2e380 fffff807`837e496b ffffaa0d`aa3ee8f8 00000000`00000000 : nt!KiInsertTimerTable+0x18f1fd
ffffaa0d`aa3ee840 fffff807`74ebe4ce     : ffffb105`0000004f ffffb105`00000000 ffffb105`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffffaa0d`aa3ee8e0 fffff807`8383d13d     : ffffaa0d`aa3eea01 00000000`00989680 000000d3`01b88119 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffffaa0d`aa3ee9f0 fffff807`837cb9ca     : 00000000`00000000 ffffb105`69ae0000 ffffaa0d`aa3eeb19 ffffb105`69ae0000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffffaa0d`aa3eeac0 fffff807`8384ad45     : ffffb105`6b273000 ffffb105`69ae0000 ffffb105`6b273010 ffffb105`6cc59010 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffffaa0d`aa3eeb80 fffff807`8384acfa     : ffffb105`69ae0400 fffff807`8384ac30 ffffb105`69ae0000 ffffd800`ee6c0100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffaa0d`aa3eebd0 fffff807`74ea29a5     : ffffb105`69b2e380 fffff807`00000001 ffffb105`69ae0000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffaa0d`aa3eec10 fffff807`74ffc868     : ffffd800`ee6c0180 ffffb105`69b2e380 fffff807`74ea2950 00000004`00000000 : nt!PspSystemThreadStartup+0x55
ffffaa0d`aa3eec60 00000000`00000000     : ffffaa0d`aa3ef000 ffffaa0d`aa3e9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!KiInsertTimerTable+18f1fd

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18f1fd

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup:     MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077231cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffec078ef02b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3639

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7132

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1

BUGCHECK_P1: 77231cfc

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffffec078ef02b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  wgc_renderer.exe

STACK_TEXT: 
ffffec07`8ef029b8 fffff803`0e007169     : 00000000`00000001 00000000`77231cfc 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffec07`8ef029c0 fffff803`0e007033     : ffffae03`70965080 ffffae03`715541e0 ffffec07`8ef02b18 ffffffff`fffdb610 : nt!KiBugCheckDispatch+0x69
ffffec07`8ef02b00 00000000`77231cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`09fef058 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77231cfc


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_d0004_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1e5e8093-a7e6-a911-7b9b-47d4229c250f}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000007a, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80443f8a85b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5889

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9439

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 7a

BUGCHECK_P4: fffff80443f8a85b

READ_ADDRESS: fffff804448fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044480f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044480f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffb80553637480 -- (.trap 0xffffb80553637480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc301ed35c180 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb80553637698 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80443f8a85b rsp=ffffb80553637610 rbp=0000000000000200
 r8=ffffb80553637678  r9=0000000000000000 r10=00000039f03c5b74
r11=ffffd78dd9419608 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!HvlGetPpmStatsForProcessor+0x37:
fffff804`43f8a85b 4d8b04c9        mov     r8,qword ptr [r9+rcx*8] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffb805`53637338 fffff804`44007169     : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`0000007a : nt!KeBugCheckEx
ffffb805`53637340 fffff804`44003469     : ffffd78d`d7e9ab00 fffff804`43ebb48c 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb805`53637480 fffff804`43f8a85b     : ffffb805`53637680 ffffd3d9`25bdacee 00000000`00000001 ffffd78d`dbfdb3d8 : nt!KiPageFault+0x469
ffffb805`53637610 fffff804`44087280     : ffffd78d`dbfd4330 ffffc301`ed364218 00000042`daa7c404 ffffc301`ed364210 : nt!HvlGetPpmStatsForProcessor+0x37
ffffb805`53637640 fffff804`43f27d13     : 00000000`00006c48 00000000`00000064 00000000`00000000 00000000`00000000 : nt!PpmUpdatePerformanceFeedback+0x15e570
ffffb805`536376f0 fffff804`43f27004     : 00000000`00000000 00001f80`0000001e 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xb93
ffffb805`53637af0 fffff804`43ff8d34     : ffffffff`00000000 ffffc301`ed3671c0 ffffd78d`e000a580 00000000`000002f4 : nt!PoIdle+0x374
ffffb805`53637c60 00000000`00000000     : ffffb805`53638000 ffffb805`53632000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!HvlGetPpmStatsForProcessor+37

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  37

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!HvlGetPpmStatsForProcessor

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {13479a0b-4a53-66a3-46a3-dd0f4e63ec64}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffcf05cfe34760, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffcf05cfe34760, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12205

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffcf05cfe34760

BUGCHECK_P2: 11

BUGCHECK_P3: ffffcf05cfe34760

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff801216fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8012160f340: Unable to get Flags value from nt!KdVersionBlock
fffff8012160f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffcf05cfe34760

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffcf05cfe345e0 -- (.trap 0xffffcf05cfe345e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800209c06a08 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000009e rsi=0000000000000000 rdi=0000000000000000
rip=ffffcf05cfe34760 rsp=ffffcf05cfe34770 rbp=ffffd6809a95c180
 r8=0000000100000e0c  r9=ffffd6809a95c180 r10=ffff80020d29b080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffcf05`cfe34760 7047            jo      ffffcf05`cfe347a9              [br=0]
Resetting default scope

STACK_TEXT: 
ffffcf05`cfe34338 fffff801`20e7a665     : 00000000`00000050 ffffcf05`cfe34760 00000000`00000011 ffffcf05`cfe345e0 : nt!KeBugCheckEx
ffffcf05`cfe34340 fffff801`20cea4a0     : ffff8002`00000000 00000000`00000011 ffffcf05`cfe34660 00000000`00000000 : nt!MiSystemFault+0x172315
ffffcf05`cfe34440 fffff801`20e0335e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffcf05`cfe345e0 ffffcf05`cfe34760     : ffff8002`00000002 fffff801`00000003 00000000`00000000 ffff8001`00000000 : nt!KiPageFault+0x35e
ffffcf05`cfe34770 ffff8002`00000002     : fffff801`00000003 00000000`00000000 ffff8001`00000000 ffff8002`040e7d00 : 0xffffcf05`cfe34760
ffffcf05`cfe34778 fffff801`00000003     : 00000000`00000000 ffff8001`00000000 ffff8002`040e7d00 00000000`00000000 : 0xffff8002`00000002
ffffcf05`cfe34780 00000000`00000000     : ffff8001`00000000 ffff8002`040e7d00 00000000`00000000 ffff8002`00000000 : 0xfffff801`00000003


SYMBOL_NAME:  nt!MiSystemFault+172315

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  172315

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8282de668740, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8282de668698, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12313

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8282de668740

BUGCHECK_P3: ffff8282de668698

BUGCHECK_P4: 0

TRAP_FRAME:  ffff8282de668740 -- (.trap 0xffff8282de668740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf00b1b33d80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa601dcbc9158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046e4df803 rsp=ffff8282de6688d0 rbp=ffffdf00b1b2c180
 r8=0000000000000000  r9=00000001219cf4d4 r10=0000000000000002
r11=ffff8282de668968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff804`6e4df803 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8282de668698 -- (.exr 0xffff8282de668698)
ExceptionAddress: fffff8046e4df803 (nt!KiCommitThreadWait+0x00000000000005c3)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff8282`de668418 fffff804`6e607169     : 00000000`00000139 00000000`00000003 ffff8282`de668740 ffff8282`de668698 : nt!KeBugCheckEx
ffff8282`de668420 fffff804`6e607590     : ffffdf00`00000000 00000000`00000000 00000000`00000000 00001f80`00000200 : nt!KiBugCheckDispatch+0x69
ffff8282`de668560 fffff804`6e605923     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8282`de668740 fffff804`6e4df803     : ffffa601`00000005 00000000`00000002 ffff8282`de6689e0 fffff804`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8282`de6688d0 fffff804`6e4dec33     : ffff8282`00000000 fffff804`00000000 00000000`00000000 ffffa601`de20e200 : nt!KiCommitThreadWait+0x5c3
ffff8282`de668970 fffff804`6e8f1531     : ffffa601`de58e5e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff8282`de668a60 fffff804`6e8f15da     : ffffa601`de20e0c0 00000060`51fcf788 00000000`00000000 fffff804`6e606a71 : nt!ObWaitForSingleObject+0x91
ffff8282`de668ac0 fffff804`6e606bb8     : 000001de`f5069000 00000000`00000000 ffff8282`de668b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffff8282`de668b00 00007ffd`cbf4be24     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`51fcf758 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`cbf4be24


SYMBOL_NAME:  nt!KiCommitThreadWait+5c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5c3

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {369b7001-cfef-011b-6243-985c04f34d42}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff506f6e37750, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff506f6e376a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5874

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15224

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff506f6e37750

BUGCHECK_P3: fffff506f6e376a8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff506f6e37750 -- (.trap 0xfffff506f6e37750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9c8b800b10e8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077fabf758 rsp=fffff506f6e378e0 rbp=ffff9c8b800b10e0
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiProcessExpiredTimerList+0x248:
fffff807`7fabf758 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff506f6e376a8 -- (.exr 0xfffff506f6e376a8)
ExceptionAddress: fffff8077fabf758 (nt!KiProcessExpiredTimerList+0x0000000000000248)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff506`f6e37428 fffff807`7fc07169     : 00000000`00000139 00000000`00000003 fffff506`f6e37750 fffff506`f6e376a8 : nt!KeBugCheckEx
fffff506`f6e37430 fffff807`7fc07590     : 00000000`000a0a0a 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff506`f6e37570 fffff807`7fc05923     : fffff506`f6e378e8 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff506`f6e37750 fffff807`7fabf758     : ffff9c8b`801ad1c0 00000000`00000000 ffff9c8b`7d8961f0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff506`f6e378e0 fffff807`7fae4e29     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000090ff : nt!KiProcessExpiredTimerList+0x248
fffff506`f6e379d0 fffff807`7fbf8d7e     : ffffffff`00000000 ffffe080`19d2c180 ffffe080`19d371c0 ffff9c8b`7d896080 : nt!KiRetireDpcList+0x9d9
fffff506`f6e37c60 00000000`00000000     : fffff506`f6e38000 fffff506`f6e32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiProcessExpiredTimerList+248

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  248

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
    buffer overrun.
Arg2: ffff9001e6b8b320, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9001e6b8b278, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 59086

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 2

BUGCHECK_P2: ffff9001e6b8b320

BUGCHECK_P3: ffff9001e6b8b278

BUGCHECK_P4: 0

TRAP_FRAME:  ffff9001e6b8b320 -- (.trap 0xffff9001e6b8b320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff89838000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff898380d1155 rsp=ffff9001e6b8b4b8 rbp=ffff9001e6b8ba90
 r8=ffffbf81143f4000  r9=00002f80f2878a20 r10=ffff9001e6b8ca20
r11=00000000000001c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
win32kbase!_report_gsfailure+0x5:
fffff898`380d1155 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9001e6b8b278 -- (.exr 0xffff9001e6b8b278)
ExceptionAddress: fffff898380d1155 (win32kbase!_report_gsfailure+0x0000000000000005)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff9001`e6b8aff8 fffff807`2e007169     : 00000000`00000139 00000000`00000002 ffff9001`e6b8b320 ffff9001`e6b8b278 : nt!KeBugCheckEx
ffff9001`e6b8b000 fffff807`2e007590     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd38d`e62f8370 : nt!KiBugCheckDispatch+0x69
ffff9001`e6b8b140 fffff807`2e005923     : 00000000`0000003f fffff807`2e1194df 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9001`e6b8b320 fffff898`380d1155     : fffff898`380d2d06 ffff9001`e6b8ba90 fffff807`2de52fcf fffff898`38263b88 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9001`e6b8b4b8 fffff898`380d2d06     : ffff9001`e6b8ba90 fffff807`2de52fcf fffff898`38263b88 ffff9001`00000000 : win32kbase!_report_gsfailure+0x5
ffff9001`e6b8b4c0 fffff898`380d2c9b     : ffff9001`e6b8b590 00000000`00000000 ffff9001`e6b8bac8 ffff9001`e6b8baa0 : win32kbase!_GSHandlerCheckCommon+0x5a
ffff9001`e6b8b4f0 fffff807`2dffe0d2     : fffff898`380d2c88 00000000`00000000 00000000`00000000 00000000`00000000 : win32kbase!_GSHandlerCheck+0x13
ffff9001`e6b8b520 fffff807`2de52db7     : ffff9001`e6b8ba90 00000000`00000000 ffff9001`e6b8ca20 fffff898`3804f329 : nt!RtlpExecuteHandlerForException+0x12
ffff9001`e6b8b550 fffff807`2de519a6     : ffff9001`e6b8c468 ffff9001`e6b8c1a0 ffff9001`e6b8c468 00000000`00000031 : nt!RtlDispatchException+0x297
ffff9001`e6b8bc70 fffff807`2e0072ac     : ffff44cb`aa0b36c8 00000000`0000080b 00000000`00001000 ffff9001`e6b8c510 : nt!KiDispatchException+0x186
ffff9001`e6b8c330 fffff807`2e003443     : ffffe60e`1b094720 ffffd38d`d9492000 ffffe60e`00d82820 ffff9001`e6b8c5d0 : nt!KiExceptionDispatch+0x12c
ffff9001`e6b8c510 fffff807`2e2c0146     : ffff9001`e6b8c700 00000000`00002000 00000000`d5f45000 00000001`00000000 : nt!KiPageFault+0x443
ffff9001`e6b8c6a0 fffff807`2e2bff08     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x1e6
ffff9001`e6b8c700 fffff807`2dedb967     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd38d`ec973190 : nt!ObpRemoveObjectRoutine+0x88
ffff9001`e6b8c760 fffff807`2de82245     : ffffd38d`e2fed830 00000000`00000000 ffffd38d`dd697080 fffff807`2e1e7658 : nt!ObfDereferenceObjectWithTag+0xc7
ffff9001`e6b8c7a0 fffff807`2e1e75cf     : ffffd38d`dd697648 ffff9001`e6b8ca01 00000000`00000000 ffffd38d`dd697080 : nt!PspRemoveProperty+0x91
ffff9001`e6b8c7d0 fffff807`2e1e6a68     : ffffd38d`dd697080 00000000`00000000 ffff44cb`aa0b3238 00000000`00000000 : nt!PspEmptyPropertySet+0x27
ffff9001`e6b8c800 fffff807`2e1e99b3     : ffffd38d`00000000 fffff807`3c82f823 00000000`00000007 ffffe60e`1b094720 : nt!PspExitThread+0xc8
ffff9001`e6b8c900 fffff807`2e2935b4     : ffffd38d`e2fedb90 ffff9001`e6b8cac0 00000000`00000002 fffff8ce`06f6d020 : nt!PspTerminateThreadByPointer+0x53
ffff9001`e6b8c940 fffff807`3c8977a9     : ffffd38d`00000000 ffff9001`e6b8cac0 00000000`00000000 ffffd38d`e0b2b380 : nt!PsTerminateSystemThread+0x24
ffff9001`e6b8c970 ffffd38d`00000000     : ffff9001`e6b8cac0 00000000`00000000 ffffd38d`e0b2b380 00000439`ffffffff : dxgkrnl+0x1577a9
ffff9001`e6b8c978 ffff9001`e6b8cac0     : 00000000`00000000 ffffd38d`e0b2b380 00000439`ffffffff ffffd38d`ec973190 : 0xffffd38d`00000000
ffff9001`e6b8c980 00000000`00000000     : ffffd38d`e0b2b380 00000439`ffffffff ffffd38d`ec973190 00000000`00000000 : 0xffff9001`e6b8cac0


SYMBOL_NAME:  win32kbase!_report_gsfailure+5

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f22c2e43-4b0d-a5dc-7d6c-399075f6e217}

Followup:     MachineOwner
---------
 
@Recep Baltaş merhaba dönüş yaptığınız için teşekkür ederim. sistem bilgilerini yazıyorum ancak şunu belirteyim bellek testini 1 ay önce yapmıştım sorun çıkmamıştı akşam tekrar yaparım ancak bilgisayar açıldıktan ortalama 5 dk sonra mavi ekran vermeye başlıyor. bazen ise 1 saat sonra veriyor ayrıca temiz kurulum yapmayı denedim kaç defa, kurulum yaparken bile mavi ekran veriyor, kurulum yaptırmıyordu.

Sistem özellikleri;
  • Gigabyte B450M S2H 3600MHz (OC) DDR4 M4 M.2.
  • Gigabyte RXT 2060 OC 6 GB GDDR6 192 Bit.
  • 2X XPG 8 GB Gammix D30 kırmızı 3000MHz CL 16 DDR4 singl.
  • Thermaltake V200 600W 80Plus 3X Pure Plus RGB fan.
  • Kioxia Exceria 500GB nume M.2 SSD 1700 MB okuma.
  • AMD Ryzen 5 3500 MPK 3.6 GHz 16MB önbellek 6 çekirdek.

@Recep Baltaş merhaba sfc/scannow taraması yaptım ve böyle bir yazı çıktı, ayrıca yeni DMP dosyalarınıda bırakıyorum inceler misiniz?

Merhaba @Recep Baltaş sf/scannow taraması yaptım ve böyle bir sonuç çıktı, ayrıca yeni DMP dosyaları da bırakıyorum inceler misiniz?

F67B1744-E6F4-4445-B40F-B837166567D1.jpeg
34F9D9F9-892D-4EF4-BA8F-30A2E79CBA8B.jpeg
41E8E6A3-82B9-4125-A224-0394C8865064.jpeg
F5F91CA6-1506-435E-98BB-F599765CB31C.jpeg
9FEFA49F-3532-41F9-90DB-F67CA773C2D6.jpeg
F5EFA29B-71C4-4777-BF30-2BB7E05DD6F6.jpeg
72F17D42-5A5B-44D5-95F1-BC18C0ED69D5.jpeg
E3817A51-CA70-4D7C-915C-8A282C2E2CC9.jpeg
F23FD3D9-40DC-4D6B-A611-316BB3384871.jpeg
A748F934-971C-4FE0-8591-C6632057F6B0.jpeg
 
Son düzenleyen: Moderatör:
Dediğim şekilde dener misin?

Merhaba @claus şu an elimde başka kart olmadığı için deneyemedim ancak yeğenimde ASUS'un 3 fanlı RTX 2060 modeli var bu hafta sonu çağırıcağım onun kartını denerim teşekkür ederim.

@claus bir de ekran kartını söktüğümde bilgisayar açılmadı yani açıldı ama Gigabyte yazısı gelince uyarı geldi ekran kartıyla ilgili daha da devam etmedi.
@Recep Baltaş @claus @HK1892 @Bora Dere

Merhaba bugün farklı bir bilgisayarda Rufus ile sıfırdan UEFI belleği oluşturdum ve tekrar format attım ama bir farkla, daha önceki formatlarımda mevcut diskleri seçip sil demiyordum bugün yine Technopat'ta ISO oluşturma konusunda mevcut Windows'u silmek için diskleri silin diye bir yazı gördüm onu uyguladım sonra komut sisteminden diskpart uygulamasını yaptım ve formatım mavi ekransız sorunsuz şekilde tamamlandı (önceki tüm formatlarımda mavi ekran alıyordum) daha sonra ilk işim güncellemeleri yapmak oldu. Önce Microsoft Store'dan yaklaşık 34 uygulamayı güncelledi. Daha sonra Windows güncelleştirmelerini yaptım sistemi yeniden başlattım. Ekran kartını elle indirip güncellerken kernel Security hatası verdi. Daha sonra tekrar denedim bu sefer güncelledi sonra denemek için oyun indiriyordum indirme işlemi başladıktan yaklaşık 10 dk sonra yine kernel Security verdi. Tekrar denedim bu sefer sorunsuz indirme işlemi bitti. Daha sonra BIOS'u güncelledim oyuna girdim sıkıntı çıkmadı şimdilik. Önceden 10 dk bir mavi ekran alırdım farklı kodlarda ancak bu işlemleri yaptıktan sonra sadece kernel hatası aldım 2 kez ve çok daha nadir almaya başladım. Bakalım devam edecek mi bir gelişme olursa geri dönüş yapacağım tekrar yardımlarınız için teşekkür ederim.
 
Son düzenleyen: Moderatör:
Sorunun bellekle ilgili gibi. XMP kapatıp dener misin bir süre?


Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcb8162686e70
Arg3: 0000000006e01083
Arg4: fffff8007c206e34

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8077

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 130633

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffcb8162686e70

BUGCHECK_P3: 6e01083

BUGCHECK_P4: fffff8007c206e34

TRAP_FRAME:  ffffcb8162686e70 -- (.trap 0xffffcb8162686e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000001b832f33c18
rdx=00000000000002d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007c206e34 rsp=0000000006e01083 rbp=0000000000000002
 r8=ffffbb86b2835c10  r9=ffffcb816259d180 r10=ffffbb86a8124b60
r11=ffffbb86b224f080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiSystemServiceExit+0x274:
fffff800`7c206e34 c3              ret
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

BAD_STACK_POINTER:  0000000006e01083

UNALIGNED_STACK_POINTER:  0000000006e01083

STACK_TEXT: 
ffffcb81`62686d28 fffff800`7c207169     : 00000000`0000007f 00000000`00000008 ffffcb81`62686e70 00000000`06e01083 : nt!KeBugCheckEx
ffffcb81`62686d30 fffff800`7c201f83     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb81`62686e70 fffff800`7c206e34     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`06e01083 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x274


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c3

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8033d31cb3b, Address of the instruction which caused the bugcheck
Arg3: ffffdb004c3ca500, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5827

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 122910

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8033d31cb3b

BUGCHECK_P3: ffffdb004c3ca500

BUGCHECK_P4: 0

CONTEXT:  ffffdb004c3ca500 -- (.cxr 0xffffdb004c3ca500)
rax=ffffde88aafad080 rbx=0000000000000003 rcx=850fc0854818418b
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000001
rip=fffff8033d31cb3b rsp=ffffdb004c3caf00 rbp=ffffdb004c3cb000
 r8=0000000000000000  r9=0000000000000003 r10=fffff803326dbb10
r11=ffffdb004c3cae70 r12=ffffdb004c3cb210 r13=ffffdb004c3cafd0
r14=ffffa3826ef9c380 r15=fffff80341dd4189
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
dxgkrnl!DXGDEVICE::DestroyAllocations+0x4a3:
fffff803`3d31cb3b 488b8180020000  mov     rax,qword ptr [rcx+280h] ds:002b:850fc085`4818440b=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffffdb00`4c3caf00 fffff803`3d300abd     : ffffdb00`4c3cb110 fffff803`3d2034bd 00000000`00000003 ffffa382`6d207de0 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4a3
ffffdb00`4c3cb0a0 fffff803`3d2fff6b     : 00000000`001a0000 00000000`00000000 ffffa382`00000000 ffffa382`6ef9c380 : dxgkrnl!DXGDEVICE::TerminateAllocations+0x92d
ffffdb00`4c3cb140 fffff803`3d3011c8     : ffffde88`a3c78528 ffffdb00`4c3cb650 ffffffff`ffffffff ffffa382`6ea8c7a0 : dxgkrnl!DxgkDestroyAllocationInternal+0xefb
ffffdb00`4c3cb550 fffff803`3d3017eb     : 000000d5`6518f6c0 000001f3`e57ec501 ffffde88`aafad080 fffff803`32aefbce : dxgkrnl!DxgkDestroyAllocationHelper+0x568
ffffdb00`4c3cba20 fffff803`32806bb8     : ffffde88`aafad080 ffffde88`aafad080 000001f3`e57ec5a0 ffffde88`00000000 : dxgkrnl!DxgkDestroyAllocation2+0x21b
ffffdb00`4c3cbb00 00007ffe`f92049c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d5`6518f628 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f92049c4


SYMBOL_NAME:  dxgkrnl!DXGDEVICE::DestroyAllocations+4a3

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .cxr 0xffffdb004c3ca500 ; kb

BUCKET_ID_FUNC_OFFSET:  4a3

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!DXGDEVICE::DestroyAllocations

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ccc144cd-d714-261c-fcd3-8a2e39d89516}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
    buffer overrun.
Arg2: ffffa207265831e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa20726583138, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5905

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25965

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 109

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 2

BUGCHECK_P2: ffffa207265831e0

BUGCHECK_P3: ffffa20726583138

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa207265831e0 -- (.trap 0xffffa207265831e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800081d9fb5 rsp=ffffa20726583378 rbp=ffffa20726583509
 r8=0000000000000002  r9=0000000000000000 r10=fffff80004c75490
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe nc
storport!_report_gsfailure+0x5:
fffff800`081d9fb5 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa20726583138 -- (.exr 0xffffa20726583138)
ExceptionAddress: fffff800081d9fb5 (storport!_report_gsfailure+0x0000000000000005)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffa207`26582eb8 fffff800`04e07169     : 00000000`00000139 00000000`00000002 ffffa207`265831e0 ffffa207`26583138 : nt!KeBugCheckEx
ffffa207`26582ec0 fffff800`04e07590     : ffffa207`26583038 ffffa207`26583140 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa207`26583000 fffff800`04e05923     : fffff800`04ca45d0 fffff800`04c2a0a3 ffff8d0a`3e15a5f0 ffffffff`ffffffff : nt!KiFastFailDispatch+0xd0
ffffa207`265831e0 fffff800`081d9fb5     : fffff800`081cb18f ffff8d0a`44b9d368 ffffffff`ffffffff 00020000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa207`26583378 fffff800`081cb18f     : ffff8d0a`44b9d368 ffffffff`ffffffff 00020000`00000000 ffff8d0a`3e15c100 : storport!_report_gsfailure+0x5
ffffa207`26583380 fffff800`081caa44     : 00000000`00000028 00000000`40200342 ffffa207`265834e0 ffff8d0a`00000001 : storport!RaidInsertDeviceQueue+0x18f
ffffa207`26583440 fffff800`081ca4ec     : 00000000`00000000 00000000`00000002 ffff8d0a`00000000 ffff8d0a`3e094101 : storport!RaidStartIoPacket+0x314
ffffa207`26583570 fffff800`081ca28a     : ffff8d0a`44ef8550 0000000b`383ce000 000072f5`c1769748 fffff800`04ccd6c5 : storport!RaUnitScsiIrp+0x21c
ffffa207`26583610 fffff800`04ccd6c5     : 00000000`00000000 ffff8d0a`44b9d2f0 00000000`00000000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a
ffffa207`26583650 fffff800`082b5bf3     : ffff8d0a`3e8968b0 ffff8d0a`3e9312e0 00000000`00000000 ffff8d0a`44b9d2f0 : nt!IofCallDriver+0x55
ffffa207`26583690 fffff800`07bba976     : ffff8d0a`44b9d2f0 00000000`0000000f ffff8d0a`3e8968b0 000072f5`c1769748 : EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess+0x223
ffffa207`265836c0 fffff800`04ccd6c5     : 00000000`00000001 00000000`00000000 ffff8d0a`3e7c5c90 ffff8d0a`449b3730 : Wdf01000!FxDevice::DispatchWithLock+0x266 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1447]
ffffa207`26583720 fffff800`08f170ed     : ffff8d0a`449b3730 00000000`00020000 ffff8d0a`3e921040 ffff8d0a`3e921040 : nt!IofCallDriver+0x55
ffffa207`26583760 fffff800`08f1660c     : 00000000`00000000 00000000`00000000 00000000`00020000 fffff800`00000100 : CLASSPNP!SubmitTransferPacket+0x29d
ffffa207`265837b0 fffff800`08f1636b     : ffff8d0a`449b3730 ffff8d0a`44ef8550 ffff8d0a`44ef8500 00000000`00000000 : CLASSPNP!ServiceTransferRequest+0x21c
ffffa207`26583840 fffff800`08f183e3     : 00000000`00000000 ffff8d0a`3e877a20 00000010`55754000 00000000`00989680 : CLASSPNP!ClassReadWrite+0x14b
ffffa207`26583890 fffff800`04ccd6c5     : ffff8d0a`3e8698a0 ffff8d0a`44ef8550 ffff8d0a`3e8aea20 00000000`00000000 : CLASSPNP!ClassGlobalDispatch+0x23
ffffa207`265838c0 fffff800`07fe39cb     : 00000064`e7ccf2c2 00000000`00000000 00000000`00000000 3036382e`305b3a22 : nt!IofCallDriver+0x55
ffffa207`26583900 fffff800`07fe3cff     : 00000001`00000001 00000065`d921e2e7 00000000`00000000 ffff8d0a`3e81e870 : partmgr!PmIo+0xeb
ffffa207`26583980 fffff800`04ccd6c5     : 00000000`00060403 ffffa207`26583c03 00000000`00000001 ffff8d0a`3bf02080 : partmgr!PmGlobalDispatch+0x1f
ffffa207`265839b0 fffff800`07fe3534     : ffffa207`26583cb0 00000000`00020000 fffff800`00000000 ffffa207`26583a30 : nt!IofCallDriver+0x55
ffffa207`265839f0 fffff800`07fe3cff     : 00000000`00020000 ffff8d0a`44ef8818 ffffa207`26583c19 00000000`00000000 : partmgr!PartitionIo+0x1d4
ffffa207`26583aa0 fffff800`04ccd6c5     : ffffa207`26583c19 fffff800`07fe3c7d 00000064`e7ccf2c2 ffffa207`26583b10 : partmgr!PmGlobalDispatch+0x1f
ffffa207`26583ad0 fffff800`080d1109     : ffff8d0a`3e81e9c0 00000000`00000001 00000065`d921e2e6 ffff8d0a`3e81e870 : nt!IofCallDriver+0x55
ffffa207`26583b10 fffff800`04ccd6c5     : ffffa207`26583c19 ffff8d0a`3e95c180 00000000`00000002 00000000`00000000 : volmgr!VmReadWrite+0xf9
ffffa207`26583b50 fffff800`08ce4ece     : ffff8d0a`3e95c180 ffffa207`26583c19 ffff8d0a`3e95c1b8 ffff8d0a`3e95c180 : nt!IofCallDriver+0x55
ffffa207`26583b90 fffff800`08ce4b77     : 00000000`00000000 ffffa207`26583d70 00000000`00000000 ffff8d0a`44ef8550 : fvevol!FveFilterRundownReadWrite+0x33e
ffffa207`26583c80 fffff800`04ccd6c5     : 00000000`00000004 ffff8d0a`44ef88f0 00000000`00000000 00000000`00000000 : fvevol!FveFilterRundownRead+0x27
ffffa207`26583cb0 fffff800`08eb3cb7     : ffff1146`c8a756bb ffff8d0a`44ef8550 00000000`00000004 ffffa207`25c30078 : nt!IofCallDriver+0x55
ffffa207`26583cf0 fffff800`08eb4fe5     : 00000000`00000002 ffffa207`25c2ff00 ffff8d0a`3e9199a0 ffff8d0a`44ef8550 : iorate!IoRateIssueAndRecordIo+0x7f
ffffa207`26583d30 fffff800`08eb519f     : ffff8d0a`3e9561d0 ffff8d0a`3bf02080 00000000`005dd188 00000000`00000200 : iorate!IoRateProcessIrpWrapper+0x69
ffffa207`26583dc0 fffff800`04ccd6c5     : ffff8d0a`44461040 ffffa207`280e5f00 fffff800`08da1010 fffff800`04ccd6c5 : iorate!IoRateDispatchReadWrite+0x5f
ffffa207`26583e00 fffff800`08da1033     : ffff8d0a`3e91d4e0 fffff800`08db1a98 ffffa207`00000000 fffff800`08db115d : nt!IofCallDriver+0x55
ffffa207`26583e40 fffff800`04ccd6c5     : ffff8d0a`3e965190 fffff800`08dfacf8 00000000`00000018 00000000`074bbd88 : volume!VolumePassThrough+0x23
ffffa207`26583e70 fffff800`08db1230     : 00000000`00000000 ffffa207`25c2fb98 ffffa207`25c2f980 ffff8d0a`3bf02080 : nt!IofCallDriver+0x55
ffffa207`26583eb0 fffff800`08db11a9     : ffffa207`25c30078 00000000`00003fff ffffa207`25c2fa00 00000000`00000000 : volsnap!VolSnapReadFilter+0x70
ffffa207`26583ee0 fffff800`04ccd6c5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : volsnap!VolSnapRead+0x19
ffffa207`26583f10 fffff800`083cf9cc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffa207`26583f50 fffff800`04df8aee     : 00000000`00000000 00000000`074be160 00000000`074be218 00000000`075bf9c8 : Ntfs!NtfsStorageDriverCallout+0x1c
ffffa207`26583f80 fffff800`04df8aac     : ffffa207`26583fd0 ffff8d0a`3bf02080 ffffa207`26584000 fffff800`04c0d7cd : nt!KxSwitchKernelStackCallout+0x2e
ffffa207`25c2fe60 fffff800`04c0d7cd     : ffffa207`26583fd0 ffff8d0a`3bf02080 ffffa207`25c2ff00 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffffa207`25c2fe80 fffff800`04c0d5c2     : fffff800`083cf9b0 ffffa207`25c30078 ffffa207`00000002 ffff8d0a`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d
ffffa207`25c2ff20 fffff800`04c0d423     : ffffa207`25c30100 00000000`00000001 00000000`00000000 ffff8d0a`3e956080 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2
ffffa207`25c2ff90 fffff800`04c0d3dd     : fffff800`083cf9b0 ffffa207`25c30078 ffff8d0a`44d81708 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x33
ffffa207`25c30000 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d


SYMBOL_NAME:  EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess+223

MODULE_NAME: EhStorClass

IMAGE_NAME:  EhStorClass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  223

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e4b56203-85f7-ffae-6cad-b785d917afb1}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80558423e53, Address of the instruction which caused the bugcheck
Arg3: ffffb20c1de4b520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4140

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18130

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80558423e53

BUGCHECK_P3: ffffb20c1de4b520

BUGCHECK_P4: 0

CONTEXT:  ffffb20c1de4b520 -- (.cxr 0xffffb20c1de4b520)
rax=0000000000000000 rbx=ffffaf84842e7950 rcx=ffffaf8480200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffaf8480200100
rip=fffff80558423e53 rsp=ffffb20c1de4bf28 rbp=00000000ff80ffa0
 r8=0000000000000000  r9=ffffaf84842e7950 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000030 r15=0000000079737355
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff805`58423e53 498b4010        mov     rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SystemSettings.exe

STACK_TEXT: 
ffffb20c`1de4bf28 fffff805`5878e459     : 00000000`00000000 ffff8d79`2b600000 ffffafb0`8925b6e0 00500030`8904f008 : nt!RtlpHpSegDescriptorValidate+0x13
ffffb20c`1de4bf30 fffff805`5878e387     : ffffaf84`80200100 ffffb20c`1de4cb80 ffffaf84`842e7950 ffffb20c`1de4cb80 : nt!RtlpHpSizeHeapInternal+0x89
ffffb20c`1de4bf80 fffff805`58667a7a     : ffffaf84`80200100 00000000`11000000 ffffb20c`1de4cb80 ffffaf84`00000000 : nt!RtlpHpSizeHeap+0x5f
ffffb20c`1de4bfb0 fffff805`58bb1019     : 00000000`00000000 ffffb20c`1de4c001 ffffafb0`893c4410 01000000`00100000 : nt!ExFreeHeapPool+0x1a0b7a
ffffb20c`1de4c090 ffffafb0`893c4462     : 00000000`00000000 ffffaf84`84326010 00000000`00061cff ffffb387`8e162080 : nt!ExFreePool+0x9
ffffb20c`1de4c0c0 ffffafb0`89036707     : 00000000`00000000 ffffaf84`842e7960 ffffaf84`842e7960 ffffaf84`84326010 : win32kfull!Win32FreePoolImpl+0x52
ffffb20c`1de4c0f0 ffffafb0`89337f18     : 00000068`00000003 ffffaf84`84326010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
ffffb20c`1de4c120 ffffafb0`897c6fcf     : ffffb387`8e162080 00000068`7a8ff610 ffffb387`ffffffff ffff700a`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
ffffb20c`1de4ca50 fffff805`58606bb8     : 00000000`00000000 00000000`00000000 00000000`000002d0 fffff805`58862c10 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
ffffb20c`1de4ca90 00007ff9`a094a104     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000068`7a8ff4a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a094a104


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.630

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffb20c1de4b520 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000094, The exception code that was not handled
Arg2: fffff80046c69336, The address that the exception occurred at
Arg3: ffffb005d4fb0a30, Parameter 0 of the exception
Arg4: 000000000000005a, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6467

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17689

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000094

BUGCHECK_P2: fffff80046c69336

BUGCHECK_P3: ffffb005d4fb0a30

BUGCHECK_P4: 5a

EXCEPTION_PARAMETER1:  ffffb005d4fb0a30

EXCEPTION_PARAMETER2:  000000000000005a

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WorldOfTanks.exe

TRAP_FRAME:  2b4c00000350b941 -- (.trap 0x2b4c00000350b941)
Unable to read trap frame at 2b4c0000`0350b941

BAD_STACK_POINTER:  ffff8000e86f6158

STACK_TEXT: 
ffff8000`e86f6158 fffff800`46ef451e     : 00000000`0000001e ffffffff`c0000094 fffff800`46c69336 ffffb005`d4fb0a30 : nt!KeBugCheckEx
ffff8000`e86f6160 fffff800`46dfe0d2     : fffff800`46ef44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff8000`e86f61a0 fffff800`46c52db7     : ffff8000`e86f6710 00000000`00000000 fffff606`c3e4cfb0 fffff800`46dfc255 : nt!RtlpExecuteHandlerForException+0x12
ffff8000`e86f61d0 fffff800`46c519a6     : fffff606`c3e4c7b8 ffff8000`e86f6e20 fffff606`c3e4c7b8 00000000`00000064 : nt!RtlDispatchException+0x297
ffff8000`e86f68f0 fffff800`46df60a2     : 3b4840c0`83480018 0000006a`b8f472c1 2b4c0000`0350b941 48c8d349`ca8b4102 : nt!KiDispatchException+0x186
ffff8000`e86f6fb0 fffff800`46df6070     : fffff800`46e072a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff606`c3e4c678 fffff800`46e072a5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff606`c3e4c680 fffff800`46dfff0a     : 00000000`00000000 fffff800`571b2d6d 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff606`c3e4c860 fffff800`46c69336     : ffffb005`d44f4d3e fffff800`46c66afe ffffb005`d44f4cb0 00000000`00000000 : nt!KiDivideErrorFault+0x30a
fffff606`c3e4c9f0 fffff800`46c6915e     : 00000621`3145f800 00000000`00000000 fffff800`476fc4e0 ffffb005`d8e46a20 : nt!PpmPerfSelectProcessorState+0x1a6
fffff606`c3e4cb10 fffff800`46d2f410     : ffff8000`e86d9240 fffff606`c3e4ce80 fffff606`c3e4ccb0 fffff606`c3e4ce80 : nt!PpmPerfSelectProcessorStates+0x5e
fffff606`c3e4cb40 fffff800`46ce535e     : ffff8000`e86d9240 ffffb005`d1820000 00000000`00000000 ffffb005`00000002 : nt!PpmCheckRun+0x40
fffff606`c3e4cbb0 fffff800`46ce4644     : ffff8000`e86d6180 00000000`00000000 00000000`00000008 00000000`00011663 : nt!KiExecuteAllDpcs+0x30e
fffff606`c3e4cd20 fffff800`46dfc255     : 00000000`00000000 ffff8000`e86d6180 00000000`00000000 00000000`83eecbf0 : nt!KiRetireDpcList+0x1f4
fffff606`c3e4cfb0 fffff800`46dfc040     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff606`c5f4fad0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffff97dbcaaa9740-ffff97dbcaaa9771  50 bytes - win32kbase!CInputThread::_CalledOnInputThread+18
    [ 0f 94 c0 48 83 c4 20 5b:48 8b 02 49 3b 00 77 09 ]
    ffff97dbcaaa977e-ffff97dbcaaa9786  9 bytes - win32kbase!CInputThread::InputThreadState::Init+2e (+0x3e)
    [ 89 43 18 c7 03 01 00 00:74 66 83 ea 01 74 55 83 ]
    ffff97dbcaaa9793-ffff97dbcaaa979b  9 bytes - win32kbase!CInputThread::InputThreadState::Init+43 (+0x15)
    [ 48 85 c0 74 07 c7 40 30:00 8d 4a 58 eb 08 b8 40 ]
    ffff97dbcaaa979e - win32kbase!CInputThread::InputThreadState::Init+4e (+0x0b)
    [ 00:8d ]
    ffff97dbcaaa97a0-ffff97dbcaaa97d6  55 bytes - win32kbase!CInputThread::InputThreadState::Init+50 (+0x02)
    [ 83 c4 20 5b c3 cc cc cc:10 49 8d 14 0a 48 85 d2 ]
    ffff97dbcaaa97d8-ffff97dbcaaa97e0  9 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+28 (+0x38)
    [ e8 07 dd f8 ff 48 83 67:eb c7 b8 00 01 00 00 b9 ]
    ffff97dbcaaa97e2-ffff97dbcaaa9834  83 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+32 (+0x0a)
    [ 48 8b 5c 24 30 48 83 c4:00 00 eb bb b8 00 04 00 ]
    ffff97dbcaaa9836-ffff97dbcaaa983f  10 bytes - win32kbase!W32PIDLOCK::vInit+16 (+0x54)
    [ 61 0c 00 83 61 08 00 83:63 10 df b2 01 8a c2 48 ]
    ffff97dbcaab2910-ffff97dbcaab2955  70 bytes - win32kbase!NtMITUpdateInputGlobals+1a0 (+0x90da)
    [ c0 0f 84 81 00 00 00 f7:48 83 ec 28 48 8b ca e8 ]
    ffff97dbcaab2962-ffff97dbcaab296c  11 bytes - win32kbase!NtMITUpdateInputGlobals+1f2 (+0x52)
    [ 3c 01 0f 84 7a 8a 06 00:b5 9e 06 00 41 83 e8 01 ]
    ffff97dbcaab2979-ffff97dbcaab298b  19 bytes - win32kbase!NtMITUpdateInputGlobals+209 (+0x17)
    [ 48 8b 35 78 33 1a 00 48:00 41 83 f8 02 0f 85 3a ]
    ffff97dbcaab2998-ffff97dbcaab299e  7 bytes - win32kbase!NtMITUpdateInputGlobals+228 (+0x1f)
    [ 48 8b 35 51 4d 1a 00:00 c6 00 01 0f ba 69 ]
    ffff97dbcaab29ab-ffff97dbcaab29af  5 bytes - win32kbase!NtMITUpdateInputGlobals+23b (+0x13)
    [ 33 d2 48 8b ce:c0 e8 03 24 01 ]
    ffff97dbcaab29c8-ffff97dbcaab29d2  11 bytes - win32kbase!NtMITUpdateInputGlobals+258 (+0x1d)
    [ 8b 5e 28 33 d2 48 8b ce:c6 00 01 41 0f ba 6a 10 ]
    ffff97dbcaab29eb-ffff97dbcaab2a0f  37 bytes - win32kbase!NtMITUpdateInputGlobals+27b (+0x23)
    [ 3b fb 75 32 41 8b cd e8:e1 ef eb cb cc cc cc cc ]
    ffff97dbcaab4781-ffff97dbcaab4799  25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+a9 (+0x1d96)
    [ 8b 5c 24 50 48 8b 74 24:83 ec 28 8b ca 45 33 c0 ]
    ffff97dbcaab479b-ffff97dbcaab47b3  25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+c3 (+0x1a)
    [ b8 bb 00 00 c0 eb 9b cc:cc cc cc cc cc 48 8b c4 ]
    ffff97dbcaab47b5-ffff97dbcaab47f5  65 bytes - win32kbase!DirectComposition::CSharedInteractionMarshaler::OpenSharedHandle+5 (+0x1a)
    [ 8b 89 50 01 00 00 48 85:21 58 20 0f 57 c0 0f 11 ]
    ffff97dbcaab47f8-ffff97dbcaab47fb  4 bytes - win32kbase!PostPlaySoundMessage+c (+0x43)
    [ 85 c0 74 0c:89 44 24 58 ]
    ffff97dbcaab4802-ffff97dbcaab480a  9 bytes - win32kbase!PostPlaySoundMessage+16 (+0x0a)
    [ 48 83 c4 28 c3 cc b8 bb:ca 72 0c 48 8b 05 1c 8b ]
    ffff97dbcaab480c-ffff97dbcaab4865  90 bytes - win32kbase!PostPlaySoundMessage+20 (+0x0a)
    [ c0 eb f3 cc cc cc cc cc:48 3b 08 76 1e 48 8b 05 ]
    ffff97dbcaab4872-ffff97dbcaab4876  5 bytes - win32kbase!CSpatialProcessor::CheckAndSendPointerPositionEffectsUpdate+3a (+0x66)
    [ 33 d2 48 8b ce:20 e8 24 1a 00 ]
609 errors : !win32kbase (ffff97dbcaaa9740-ffff97dbcaab4876)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
 
Sorunun bellekle ilgili gibi. XMP kapatıp dener misin bir süre?

Kod:
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
use .trap on that value.
Else.
.trap on the appropriate frame will show where the trap was taken.
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT.
Arg2: ffffcb8162686e70.
Arg3: 0000000006e01083.
Arg4: fffff8007c206e34.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8077.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-KTSBH2V.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 130633.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 77.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 7f.

BUGCHECK_P1: 8.

BUGCHECK_P2: ffffcb8162686e70.

BUGCHECK_P3: 6e01083.

BUGCHECK_P4: fffff8007c206e34.

TRAP_FRAME: ffffcb8162686e70 -- (.trap 0xffffcb8162686e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000001b832f33c18.
rdx=00000000000002d0 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8007c206e34 rsp=0000000006e01083 rbp=0000000000000002.
r8=ffffbb86b2835c10 r9=ffffcb816259d180 r10=ffffbb86a8124b60.
r11=ffffbb86b224f080 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!KiSystemServiceExit+0x274:
fffff800`7c206e34 c3 ret.
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

BAD_STACK_POINTER: 0000000006e01083.

UNALIGNED_STACK_POINTER: 0000000006e01083.

STACK_TEXT:
ffffcb81`62686d28 fffff800`7c207169 : 00000000`0000007f 00000000`00000008 ffffcb81`62686e70 00000000`06e01083 : nt!KeBugCheckEx.
ffffcb81`62686d30 fffff800`7c201f83 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
ffffcb81`62686e70 fffff800`7c206e34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3.
00000000`06e01083 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x274.

SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.630.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2c3.

FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup: MachineOwner.
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff8033d31cb3b, Address of the instruction which caused the bugcheck.
Arg3: ffffdb004c3ca500, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5827.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-KTSBH2V.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 122910.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 84.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8033d31cb3b.

BUGCHECK_P3: ffffdb004c3ca500.

BUGCHECK_P4: 0.

CONTEXT: ffffdb004c3ca500 -- (.cxr 0xffffdb004c3ca500)
rax=ffffde88aafad080 rbx=0000000000000003 rcx=850fc0854818418b.
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000001.
rip=fffff8033d31cb3b rsp=ffffdb004c3caf00 rbp=ffffdb004c3cb000.
r8=0000000000000000 r9=0000000000000003 r10=fffff803326dbb10.
r11=ffffdb004c3cae70 r12=ffffdb004c3cb210 r13=ffffdb004c3cafd0.
r14=ffffa3826ef9c380 r15=fffff80341dd4189.
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246.
dxgkrnl!DXGDEVICE::DestroyAllocations+0x4a3:
fffff803`3d31cb3b 488b8180020000 mov rax,qword ptr [rcx+280h] ds:002b:850fc085`4818440b=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
ffffdb00`4c3caf00 fffff803`3d300abd : ffffdb00`4c3cb110 fffff803`3d2034bd 00000000`00000003 ffffa382`6d207de0 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4a3.
ffffdb00`4c3cb0a0 fffff803`3d2fff6b : 00000000`001a0000 00000000`00000000 ffffa382`00000000 ffffa382`6ef9c380 : dxgkrnl!DXGDEVICE::TerminateAllocations+0x92d.
ffffdb00`4c3cb140 fffff803`3d3011c8 : ffffde88`a3c78528 ffffdb00`4c3cb650 ffffffff`ffffffff ffffa382`6ea8c7a0 : dxgkrnl!DxgkDestroyAllocationInternal+0xefb.
ffffdb00`4c3cb550 fffff803`3d3017eb : 000000d5`6518f6c0 000001f3`e57ec501 ffffde88`aafad080 fffff803`32aefbce : dxgkrnl!DxgkDestroyAllocationHelper+0x568.
ffffdb00`4c3cba20 fffff803`32806bb8 : ffffde88`aafad080 ffffde88`aafad080 000001f3`e57ec5a0 ffffde88`00000000 : dxgkrnl!DxgkDestroyAllocation2+0x21b.
ffffdb00`4c3cbb00 00007ffe`f92049c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000d5`6518f628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f92049c4.

SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyAllocations+4a3.

MODULE_NAME: dxgkrnl.

IMAGE_NAME: dxgkrnl.sys.

IMAGE_VERSION: 10.0.19041.631.

STACK_COMMAND: .cxr 0xffffdb004c3ca500 ; kb.

BUCKET_ID_FUNC_OFFSET: 4a3.

FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!DXGDEVICE::DestroyAllocations.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ccc144cd-d714-261c-fcd3-8a2e39d89516}

Followup: MachineOwner.
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based.
buffer overrun.
Arg2: ffffa207265831e0, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffffa20726583138, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5905.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-KTSBH2V.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 25965.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 109.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 2.

BUGCHECK_P2: ffffa207265831e0.

BUGCHECK_P3: ffffa20726583138.

BUGCHECK_P4: 0.

TRAP_FRAME: ffffa207265831e0 -- (.trap 0xffffa207265831e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff800081d9fb5 rsp=ffffa20726583378 rbp=ffffa20726583509.
r8=0000000000000002 r9=0000000000000000 r10=fffff80004c75490.
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac pe nc.
storport!_report_gsfailure+0x5:
fffff800`081d9fb5 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffa20726583138 -- (.exr 0xffffa20726583138)
ExceptionAddress: fffff800081d9fb5 (storport!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 0000000000000002.
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

WATSON_BKT_EVENT: BEX.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000002.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffa207`26582eb8 fffff800`04e07169 : 00000000`00000139 00000000`00000002 ffffa207`265831e0 ffffa207`26583138 : nt!KeBugCheckEx.
ffffa207`26582ec0 fffff800`04e07590 : ffffa207`26583038 ffffa207`26583140 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
ffffa207`26583000 fffff800`04e05923 : fffff800`04ca45d0 fffff800`04c2a0a3 ffff8d0a`3e15a5f0 ffffffff`ffffffff : nt!KiFastFailDispatch+0xd0.
ffffa207`265831e0 fffff800`081d9fb5 : fffff800`081cb18f ffff8d0a`44b9d368 ffffffff`ffffffff 00020000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323.
ffffa207`26583378 fffff800`081cb18f : ffff8d0a`44b9d368 ffffffff`ffffffff 00020000`00000000 ffff8d0a`3e15c100 : storport!_report_gsfailure+0x5.
ffffa207`26583380 fffff800`081caa44 : 00000000`00000028 00000000`40200342 ffffa207`265834e0 ffff8d0a`00000001 : storport!RaidInsertDeviceQueue+0x18f.
ffffa207`26583440 fffff800`081ca4ec : 00000000`00000000 00000000`00000002 ffff8d0a`00000000 ffff8d0a`3e094101 : storport!RaidStartIoPacket+0x314.
ffffa207`26583570 fffff800`081ca28a : ffff8d0a`44ef8550 0000000b`383ce000 000072f5`c1769748 fffff800`04ccd6c5 : storport!RaUnitScsiIrp+0x21c.
ffffa207`26583610 fffff800`04ccd6c5 : 00000000`00000000 ffff8d0a`44b9d2f0 00000000`00000000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a.
ffffa207`26583650 fffff800`082b5bf3 : ffff8d0a`3e8968b0 ffff8d0a`3e9312e0 00000000`00000000 ffff8d0a`44b9d2f0 : nt!IofCallDriver+0x55.
ffffa207`26583690 fffff800`07bba976 : ffff8d0a`44b9d2f0 00000000`0000000f ffff8d0a`3e8968b0 000072f5`c1769748 : EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess+0x223.
ffffa207`265836c0 fffff800`04ccd6c5 : 00000000`00000001 00000000`00000000 ffff8d0a`3e7c5c90 ffff8d0a`449b3730 : Wdf01000!FxDevice::DispatchWithLock+0x266 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1447]
ffffa207`26583720 fffff800`08f170ed : ffff8d0a`449b3730 00000000`00020000 ffff8d0a`3e921040 ffff8d0a`3e921040 : nt!IofCallDriver+0x55.
ffffa207`26583760 fffff800`08f1660c : 00000000`00000000 00000000`00000000 00000000`00020000 fffff800`00000100 : CLASSPNP!SubmitTransferPacket+0x29d.
ffffa207`265837b0 fffff800`08f1636b : ffff8d0a`449b3730 ffff8d0a`44ef8550 ffff8d0a`44ef8500 00000000`00000000 : CLASSPNP!ServiceTransferRequest+0x21c.
ffffa207`26583840 fffff800`08f183e3 : 00000000`00000000 ffff8d0a`3e877a20 00000010`55754000 00000000`00989680 : CLASSPNP!ClassReadWrite+0x14b.
ffffa207`26583890 fffff800`04ccd6c5 : ffff8d0a`3e8698a0 ffff8d0a`44ef8550 ffff8d0a`3e8aea20 00000000`00000000 : CLASSPNP!ClassGlobalDispatch+0x23.
ffffa207`265838c0 fffff800`07fe39cb : 00000064`e7ccf2c2 00000000`00000000 00000000`00000000 3036382e`305b3a22 : nt!IofCallDriver+0x55.
ffffa207`26583900 fffff800`07fe3cff : 00000001`00000001 00000065`d921e2e7 00000000`00000000 ffff8d0a`3e81e870 : partmgr!PmIo+0xeb.
ffffa207`26583980 fffff800`04ccd6c5 : 00000000`00060403 ffffa207`26583c03 00000000`00000001 ffff8d0a`3bf02080 : partmgr!PmGlobalDispatch+0x1f.
ffffa207`265839b0 fffff800`07fe3534 : ffffa207`26583cb0 00000000`00020000 fffff800`00000000 ffffa207`26583a30 : nt!IofCallDriver+0x55.
ffffa207`265839f0 fffff800`07fe3cff : 00000000`00020000 ffff8d0a`44ef8818 ffffa207`26583c19 00000000`00000000 : partmgr!PartitionIo+0x1d4.
ffffa207`26583aa0 fffff800`04ccd6c5 : ffffa207`26583c19 fffff800`07fe3c7d 00000064`e7ccf2c2 ffffa207`26583b10 : partmgr!PmGlobalDispatch+0x1f.
ffffa207`26583ad0 fffff800`080d1109 : ffff8d0a`3e81e9c0 00000000`00000001 00000065`d921e2e6 ffff8d0a`3e81e870 : nt!IofCallDriver+0x55.
ffffa207`26583b10 fffff800`04ccd6c5 : ffffa207`26583c19 ffff8d0a`3e95c180 00000000`00000002 00000000`00000000 : volmgr!VmReadWrite+0xf9.
ffffa207`26583b50 fffff800`08ce4ece : ffff8d0a`3e95c180 ffffa207`26583c19 ffff8d0a`3e95c1b8 ffff8d0a`3e95c180 : nt!IofCallDriver+0x55.
ffffa207`26583b90 fffff800`08ce4b77 : 00000000`00000000 ffffa207`26583d70 00000000`00000000 ffff8d0a`44ef8550 : fvevol!FveFilterRundownReadWrite+0x33e.
ffffa207`26583c80 fffff800`04ccd6c5 : 00000000`00000004 ffff8d0a`44ef88f0 00000000`00000000 00000000`00000000 : fvevol!FveFilterRundownRead+0x27.
ffffa207`26583cb0 fffff800`08eb3cb7 : ffff1146`c8a756bb ffff8d0a`44ef8550 00000000`00000004 ffffa207`25c30078 : nt!IofCallDriver+0x55.
ffffa207`26583cf0 fffff800`08eb4fe5 : 00000000`00000002 ffffa207`25c2ff00 ffff8d0a`3e9199a0 ffff8d0a`44ef8550 : iorate!IoRateIssueAndRecordIo+0x7f.
ffffa207`26583d30 fffff800`08eb519f : ffff8d0a`3e9561d0 ffff8d0a`3bf02080 00000000`005dd188 00000000`00000200 : iorate!IoRateProcessIrpWrapper+0x69.
ffffa207`26583dc0 fffff800`04ccd6c5 : ffff8d0a`44461040 ffffa207`280e5f00 fffff800`08da1010 fffff800`04ccd6c5 : iorate!IoRateDispatchReadWrite+0x5f.
ffffa207`26583e00 fffff800`08da1033 : ffff8d0a`3e91d4e0 fffff800`08db1a98 ffffa207`00000000 fffff800`08db115d : nt!IofCallDriver+0x55.
ffffa207`26583e40 fffff800`04ccd6c5 : ffff8d0a`3e965190 fffff800`08dfacf8 00000000`00000018 00000000`074bbd88 : volume!VolumePassThrough+0x23.
ffffa207`26583e70 fffff800`08db1230 : 00000000`00000000 ffffa207`25c2fb98 ffffa207`25c2f980 ffff8d0a`3bf02080 : nt!IofCallDriver+0x55.
ffffa207`26583eb0 fffff800`08db11a9 : ffffa207`25c30078 00000000`00003fff ffffa207`25c2fa00 00000000`00000000 : volsnap!VolSnapReadFilter+0x70.
ffffa207`26583ee0 fffff800`04ccd6c5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : volsnap!VolSnapRead+0x19.
ffffa207`26583f10 fffff800`083cf9cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55.
ffffa207`26583f50 fffff800`04df8aee : 00000000`00000000 00000000`074be160 00000000`074be218 00000000`075bf9c8 : Ntfs!NtfsStorageDriverCallout+0x1c.
ffffa207`26583f80 fffff800`04df8aac : ffffa207`26583fd0 ffff8d0a`3bf02080 ffffa207`26584000 fffff800`04c0d7cd : nt!KxSwitchKernelStackCallout+0x2e.
ffffa207`25c2fe60 fffff800`04c0d7cd : ffffa207`26583fd0 ffff8d0a`3bf02080 ffffa207`25c2ff00 00000000`00000000 : nt!KiSwitchKernelStackContinue.
ffffa207`25c2fe80 fffff800`04c0d5c2 : fffff800`083cf9b0 ffffa207`25c30078 ffffa207`00000002 ffff8d0a`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d.
ffffa207`25c2ff20 fffff800`04c0d423 : ffffa207`25c30100 00000000`00000001 00000000`00000000 ffff8d0a`3e956080 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2.
ffffa207`25c2ff90 fffff800`04c0d3dd : fffff800`083cf9b0 ffffa207`25c30078 ffff8d0a`44d81708 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x33.
ffffa207`25c30000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d.

SYMBOL_NAME: EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess+223.

MODULE_NAME: EhStorClass.

IMAGE_NAME: EhStorClass.sys.

IMAGE_VERSION: 10.0.19041.1030.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 223.

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e4b56203-85f7-ffae-6cad-b785d917afb1}

Followup: MachineOwner.
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80558423e53, Address of the instruction which caused the bugcheck.
Arg3: ffffb20c1de4b520, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4140.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-KTSBH2V.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 18130.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 94.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80558423e53.

BUGCHECK_P3: ffffb20c1de4b520.

BUGCHECK_P4: 0.

CONTEXT: ffffb20c1de4b520 -- (.cxr 0xffffb20c1de4b520)
rax=0000000000000000 rbx=ffffaf84842e7950 rcx=ffffaf8480200200.
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffaf8480200100.
rip=fffff80558423e53 rsp=ffffb20c1de4bf28 rbp=00000000ff80ffa0.
r8=0000000000000000 r9=ffffaf84842e7950 r10=0000000000000000.
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9.
r14=0000000000000030 r15=0000000079737355.
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246.
nt!RtlpHpSegDescriptorValidate+0x13:
fffff805`58423e53 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: SystemSettings.exe.

STACK_TEXT:
ffffb20c`1de4bf28 fffff805`5878e459 : 00000000`00000000 ffff8d79`2b600000 ffffafb0`8925b6e0 00500030`8904f008 : nt!RtlpHpSegDescriptorValidate+0x13.
ffffb20c`1de4bf30 fffff805`5878e387 : ffffaf84`80200100 ffffb20c`1de4cb80 ffffaf84`842e7950 ffffb20c`1de4cb80 : nt!RtlpHpSizeHeapInternal+0x89.
ffffb20c`1de4bf80 fffff805`58667a7a : ffffaf84`80200100 00000000`11000000 ffffb20c`1de4cb80 ffffaf84`00000000 : nt!RtlpHpSizeHeap+0x5f.
ffffb20c`1de4bfb0 fffff805`58bb1019 : 00000000`00000000 ffffb20c`1de4c001 ffffafb0`893c4410 01000000`00100000 : nt!ExFreeHeapPool+0x1a0b7a.
ffffb20c`1de4c090 ffffafb0`893c4462 : 00000000`00000000 ffffaf84`84326010 00000000`00061cff ffffb387`8e162080 : nt!ExFreePool+0x9.
ffffb20c`1de4c0c0 ffffafb0`89036707 : 00000000`00000000 ffffaf84`842e7960 ffffaf84`842e7960 ffffaf84`84326010 : win32kfull!Win32FreePoolImpl+0x52.
ffffb20c`1de4c0f0 ffffafb0`89337f18 : 00000068`00000003 ffffaf84`84326010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37.
ffffb20c`1de4c120 ffffafb0`897c6fcf : ffffb387`8e162080 00000068`7a8ff610 ffffb387`ffffffff ffff700a`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508.
ffffb20c`1de4ca50 fffff805`58606bb8 : 00000000`00000000 00000000`00000000 00000000`000002d0 fffff805`58862c10 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f.
ffffb20c`1de4ca90 00007ff9`a094a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000068`7a8ff4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a094a104.

SYMBOL_NAME: nt!ExFreePool+9.

IMAGE_NAME: Pool_Corruption.

IMAGE_VERSION: 10.0.19041.630.

MODULE_NAME: Pool_Corruption.

STACK_COMMAND: .cxr 0xffffb20c1de4b520 ; kb.

BUCKET_ID_FUNC_OFFSET: 9.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup: Pool_corruption.
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000094, The exception code that was not handled.
Arg2: fffff80046c69336, The address that the exception occurred at.
Arg3: ffffb005d4fb0a30, Parameter 0 of the exception.
Arg4: 000000000000005a, Parameter 1 of the exception.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32kbase.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 6467.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-KTSBH2V.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 17689.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 79.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000094.

BUGCHECK_P2: fffff80046c69336.

BUGCHECK_P3: ffffb005d4fb0a30.

BUGCHECK_P4: 5a.

EXCEPTION_PARAMETER1: ffffb005d4fb0a30.

EXCEPTION_PARAMETER2: 000000000000005a.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: WorldOfTanks.exe.

TRAP_FRAME: 2b4c00000350b941 -- (.trap 0x2b4c00000350b941)
Unable to read trap frame at 2b4c0000`0350b941.

BAD_STACK_POINTER: ffff8000e86f6158.

STACK_TEXT:
ffff8000`e86f6158 fffff800`46ef451e : 00000000`0000001e ffffffff`c0000094 fffff800`46c69336 ffffb005`d4fb0a30 : nt!KeBugCheckEx.
ffff8000`e86f6160 fffff800`46dfe0d2 : fffff800`46ef44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22.
ffff8000`e86f61a0 fffff800`46c52db7 : ffff8000`e86f6710 00000000`00000000 fffff606`c3e4cfb0 fffff800`46dfc255 : nt!RtlpExecuteHandlerForException+0x12.
ffff8000`e86f61d0 fffff800`46c519a6 : fffff606`c3e4c7b8 ffff8000`e86f6e20 fffff606`c3e4c7b8 00000000`00000064 : nt!RtlDispatchException+0x297.
ffff8000`e86f68f0 fffff800`46df60a2 : 3b4840c0`83480018 0000006a`b8f472c1 2b4c0000`0350b941 48c8d349`ca8b4102 : nt!KiDispatchException+0x186.
ffff8000`e86f6fb0 fffff800`46df6070 : fffff800`46e072a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12.
fffff606`c3e4c678 fffff800`46e072a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue.
fffff606`c3e4c680 fffff800`46dfff0a : 00000000`00000000 fffff800`571b2d6d 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125.
fffff606`c3e4c860 fffff800`46c69336 : ffffb005`d44f4d3e fffff800`46c66afe ffffb005`d44f4cb0 00000000`00000000 : nt!KiDivideErrorFault+0x30a.
fffff606`c3e4c9f0 fffff800`46c6915e : 00000621`3145f800 00000000`00000000 fffff800`476fc4e0 ffffb005`d8e46a20 : nt!PpmPerfSelectProcessorState+0x1a6.
fffff606`c3e4cb10 fffff800`46d2f410 : ffff8000`e86d9240 fffff606`c3e4ce80 fffff606`c3e4ccb0 fffff606`c3e4ce80 : nt!PpmPerfSelectProcessorStates+0x5e.
fffff606`c3e4cb40 fffff800`46ce535e : ffff8000`e86d9240 ffffb005`d1820000 00000000`00000000 ffffb005`00000002 : nt!PpmCheckRun+0x40.
fffff606`c3e4cbb0 fffff800`46ce4644 : ffff8000`e86d6180 00000000`00000000 00000000`00000008 00000000`00011663 : nt!KiExecuteAllDpcs+0x30e.
fffff606`c3e4cd20 fffff800`46dfc255 : 00000000`00000000 ffff8000`e86d6180 00000000`00000000 00000000`83eecbf0 : nt!KiRetireDpcList+0x1f4.
fffff606`c3e4cfb0 fffff800`46dfc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5.
fffff606`c5f4fad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase.
ffff97dbcaaa9740-ffff97dbcaaa9771 50 bytes - win32kbase!CInputThread::_CalledOnInputThread+18.
[ 0f 94 c0 48 83 c4 20 5b:48 8b 02 49 3b 00 77 09 ]
ffff97dbcaaa977e-ffff97dbcaaa9786 9 bytes - win32kbase!CInputThread::InputThreadState::Init+2e (+0x3e)
[ 89 43 18 c7 03 01 00 00:74 66 83 ea 01 74 55 83 ]
ffff97dbcaaa9793-ffff97dbcaaa979b 9 bytes - win32kbase!CInputThread::InputThreadState::Init+43 (+0x15)
[ 48 85 c0 74 07 c7 40 30:00 8d 4a 58 eb 08 b8 40 ]
ffff97dbcaaa979e - win32kbase!CInputThread::InputThreadState::Init+4e (+0x0b)
[ 00:8d ]
ffff97dbcaaa97a0-ffff97dbcaaa97d6 55 bytes - win32kbase!CInputThread::InputThreadState::Init+50 (+0x02)
[ 83 c4 20 5b c3 cc cc cc:10 49 8d 14 0a 48 85 d2 ]
ffff97dbcaaa97d8-ffff97dbcaaa97e0 9 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+28 (+0x38)
[ e8 07 dd f8 ff 48 83 67:eb c7 b8 00 01 00 00 b9 ]
ffff97dbcaaa97e2-ffff97dbcaaa9834 83 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+32 (+0x0a)
[ 48 8b 5c 24 30 48 83 c4:00 00 eb bb b8 00 04 00 ]
ffff97dbcaaa9836-ffff97dbcaaa983f 10 bytes - win32kbase!W32PIDLOCK::vInit+16 (+0x54)
[ 61 0c 00 83 61 08 00 83:63 10 df b2 01 8a c2 48 ]
ffff97dbcaab2910-ffff97dbcaab2955 70 bytes - win32kbase!NtMITUpdateInputGlobals+1a0 (+0x90da)
[ c0 0f 84 81 00 00 00 f7:48 83 ec 28 48 8b ca e8 ]
ffff97dbcaab2962-ffff97dbcaab296c 11 bytes - win32kbase!NtMITUpdateInputGlobals+1f2 (+0x52)
[ 3c 01 0f 84 7a 8a 06 00:b5 9e 06 00 41 83 e8 01 ]
ffff97dbcaab2979-ffff97dbcaab298b 19 bytes - win32kbase!NtMITUpdateInputGlobals+209 (+0x17)
[ 48 8b 35 78 33 1a 00 48:00 41 83 f8 02 0f 85 3a ]
ffff97dbcaab2998-ffff97dbcaab299e 7 bytes - win32kbase!NtMITUpdateInputGlobals+228 (+0x1f)
[ 48 8b 35 51 4d 1a 00:00 c6 00 01 0f ba 69 ]
ffff97dbcaab29ab-ffff97dbcaab29af 5 bytes - win32kbase!NtMITUpdateInputGlobals+23b (+0x13)
[ 33 d2 48 8b ce:c0 e8 03 24 01 ]
ffff97dbcaab29c8-ffff97dbcaab29d2 11 bytes - win32kbase!NtMITUpdateInputGlobals+258 (+0x1d)
[ 8b 5e 28 33 d2 48 8b ce:c6 00 01 41 0f ba 6a 10 ]
ffff97dbcaab29eb-ffff97dbcaab2a0f 37 bytes - win32kbase!NtMITUpdateInputGlobals+27b (+0x23)
[ 3b fb 75 32 41 8b cd e8:e1 ef eb cb cc cc cc cc ]
ffff97dbcaab4781-ffff97dbcaab4799 25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+a9 (+0x1d96)
[ 8b 5c 24 50 48 8b 74 24:83 ec 28 8b ca 45 33 c0 ]
ffff97dbcaab479b-ffff97dbcaab47b3 25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+c3 (+0x1a)
[ b8 bb 00 00 c0 eb 9b cc:cc cc cc cc cc 48 8b c4 ]
ffff97dbcaab47b5-ffff97dbcaab47f5 65 bytes - win32kbase!DirectComposition::CSharedInteractionMarshaler::OpenSharedHandle+5 (+0x1a)
[ 8b 89 50 01 00 00 48 85:21 58 20 0f 57 c0 0f 11 ]
ffff97dbcaab47f8-ffff97dbcaab47fb 4 bytes - win32kbase!PostPlaySoundMessage+c (+0x43)
[ 85 c0 74 0c:89 44 24 58 ]
ffff97dbcaab4802-ffff97dbcaab480a 9 bytes - win32kbase!PostPlaySoundMessage+16 (+0x0a)
[ 48 83 c4 28 c3 cc b8 bb:ca 72 0c 48 8b 05 1c 8b ]
ffff97dbcaab480c-ffff97dbcaab4865 90 bytes - win32kbase!PostPlaySoundMessage+20 (+0x0a)
[ c0 eb f3 cc cc cc cc cc:48 3b 08 76 1e 48 8b 05 ]
ffff97dbcaab4872-ffff97dbcaab4876 5 bytes - win32kbase!CSpatialProcessor::CheckAndSendPointerPositionEffectsUpdate+3a (+0x66)
[ 33 d2 48 8b ce:20 e8 24 1a 00 ]
609 errors : !win32kbase (ffff97dbcaaa9740-ffff97dbcaab4876)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

MEMORY_CORRUPTOR: LARGE.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption.
---------

@Recep Baltaş merhaba recep bey bilgisayarı servise gönderdim oradan dönüş aldığım zaman eğer sorunum çözülmüş ise buraya yazacağım benim sorunuma benzer sorun yaşayanlara faydası dokunur belki, ayrıca RAM frekanslarıyla oynamadım standart 2660 frekansta kullanıyordum sürekli.
 
Ben ekran kartı veya bir ihtiml PSU'dan olduğunu düşünüyorum. Son durumdan haberdar edin.

@claus kasa serviste şu an onların dönüşüne göre bilgilendireceğim, ayrıca servisten geldikten sonra belli bir süre kullanıp tekrar test edeceğim ona göre yazarım tekrar teşekkür ederim.
 
Mümkünse dediğim parçaları özellikle ekran kartını kontrol ettirirsen iyi olur.

@claus servise verirken dediğiniz gibi ekran kartını özellikle belirttim ve yazdırdım ekran kartına daha ilgili bakacaklarına inanıyorum, ilgin için teşekkür ederim.
@Recep Baltaş @claus @Bora Dere @HK1892
Tekrar merhaba, servise gönderdiğim ürünlerden dönüş aldım, servise 2 adet RAM, ekran kartı, anakart gönderdiler seri no ile takip ettiğim ürünlerde RAM'larda arızaya rastlanmadı yazdı. Bugün itibarıyla ekran kartı ve anakart ise hala yetkili servise gönderildi yazıyor, ancak bugün İtopya'dan telefon geldi ve ek olarak işlemciyi de gönderdik servise dediler. İşlemcide sorun olduğunu ve işlemcinin aynısından stokta bulunmadığını para iadesinin yapılacağını belirttiler, diğer bileşenler ellerine ulaşıp toplanacağı zaman bilgi verecekler miş. Anladığım kadarıyla aldığım mavi ekranların sebebi işlemci, sizce de öyle midir? Ve ben şu anki sistemime ellerinde arızalı ( Ryzen 5 3500) işlemci olmadığı işin 3600X alsam uyumlu olur mu?
 
Son düzenleyen: Moderatör:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı