KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8078366bc20, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8078366bb78, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9772
Key : Analysis.Memory.CommitPeak.Mb
Value: 101
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff8078366bc20
BUGCHECK_P3: fffff8078366bb78
BUGCHECK_P4: 0
TRAP_FRAME: fffff8078366bc20 -- (.trap 0xfffff8078366bc20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff920e8d88ffe8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077cec506d rsp=fffff8078366bdb0 rbp=ffff920e8e40e080
r8=0000000000000001 r9=0000000000000006 r10=fffff8077cec2e00
r11=fffff8077b67c180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiExitDispatcher+0x1ad:
fffff807`7cec506d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff8078366bb78 -- (.exr 0xfffff8078366bb78)
ExceptionAddress: fffff8077cec506d (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff807`8366b8f8 fffff807`7d007169 : 00000000`00000139 00000000`00000003 fffff807`8366bc20 fffff807`8366bb78 : nt!KeBugCheckEx
fffff807`8366b900 fffff807`7d007590 : 00000000`00000200 00000000`00000000 fffff807`7cff1300 fffff807`7ce7448a : nt!KiBugCheckDispatch+0x69
fffff807`8366ba40 fffff807`7d005923 : ffff920e`8cad7902 fffff807`919db008 ffff920e`91c7a4b0 00000000`00000009 : nt!KiFastFailDispatch+0xd0
fffff807`8366bc20 fffff807`7cec506d : 00000000`00000000 00000000`00000000 fffff807`919db008 ffff920e`8cae0788 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`8366bdb0 fffff807`7cec33f7 : ffff920e`8e40e080 ffff920e`8cae0780 ffff920e`8e40e080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`8366be20 fffff807`7cec2e97 : 00000000`00000000 fffff807`8366bf06 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`8366bf10 fffff807`8cc65056 : 00000000`00000018 fffff807`8366bfb0 ffff920e`9197d710 ffff920e`000b000b : nt!IofCompleteRequest+0x17
fffff807`8366bf40 fffff807`8cc43aa7 : 00000000`00000002 ffff920e`8c9fe500 ffff920e`86c45190 fffff807`8366c024 : mouclass!MouseClassServiceCallback+0x476
fffff807`8366bfe0 fffff807`7cec2fce : 00000000`00000000 fffffff6`00000000 ffff920e`8cb78101 fffff807`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`8366c080 fffff807`7cec2e97 : 00000000`00000000 ffff920e`8c0fb406 ffff920e`8a1ff150 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`8366c170 fffff807`8cc0aef5 : ffff920e`8c913a88 ffff920e`897b2502 00000000`00000000 00000000`00000008 : nt!IofCompleteRequest+0x17
fffff807`8366c1a0 fffff807`8cc0a7ed : ffff920e`897b25e0 ffff920e`897b2502 ffff920e`897b25e0 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`8366c2a0 fffff807`7cec2fce : ffff920e`8cb0a0d0 ffff920e`8cb0a0d0 fffff807`8366c301 ffff920e`8cb0a54b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`8366c340 fffff807`7cec2e97 : 00000000`00000001 00000000`00000000 ffff920e`8cadd020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`8366c430 fffff807`81fb811a : 00000000`00000000 ffff920e`8a2b7a60 ffff920e`8cb0a0d0 fffff807`8366c510 : nt!IofCompleteRequest+0x17
fffff807`8366c460 fffff807`81fb5bbf : ffff920e`89430b02 ffff920e`8ca82750 ffff920e`8cb0a0d0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`8366c4f0 fffff807`8d05b91c : 00000000`ffffff02 ffff920e`894309c0 ffff920e`8cadd400 ffff920e`8cadd400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`8366c550 fffff807`8d05b7e1 : ffff920e`89430b60 00000000`00000007 ffff920e`89430bf0 fffff807`8366c768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`8366c5b0 fffff807`8d05b5d0 : 00000000`00000004 fffff807`8366c720 00000000`00000000 ffff920e`8cadc5e0 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`8366c660 fffff807`8d056570 : 00000000`00000004 fffff807`8366c738 00000000`00000008 fffff807`8366c740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`8366c690 fffff807`8d0560a5 : 00000000`00000780 00006df1`76847500 ffff920e`8a6fbec0 ffff920e`89bd0470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`8366c6f0 fffff807`8d055d7c : ffff920e`8c810328 fffff807`7b67c180 00006df1`737ee328 fffff807`8366c810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`8366c7f0 fffff807`81fb38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`8366c820 fffff807`7cee535e : fffff807`7b67f240 00000000`00000000 fffff807`8366cb20 fffff807`7b67c180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`8366c860 fffff807`7cee4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`8366c9d0 fffff807`7cff8d7e : 00000000`00000000 fffff807`7b67c180 fffff807`7d927600 ffff920e`8f7d00c0 : nt!KiRetireDpcList+0x1f4
fffff807`8366cc60 00000000`00000000 : fffff807`8366d000 fffff807`83667000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}
Followup: MachineOwner
---------
KERNEL_THREAD_PRIORITY_FLOOR_VIOLATION (157)
An illegal operation was attempted on the priority floor of a particular
thread.
Arguments:
Arg1: ffffc50621bce380, The address of the thread
Arg2: 0000000000000004, The target priority value
Arg3: 0000000000000002, The priority counter for the target priority underflowed
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4311
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9504
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 157
BUGCHECK_P1: ffffc50621bce380
BUGCHECK_P2: 4
BUGCHECK_P3: 2
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffda0a`1f1fc7e8 fffff800`510462f8 : 00000000`00000157 ffffc506`21bce380 00000000`00000004 00000000`00000002 : nt!KeBugCheckEx
ffffda0a`1f1fc7f0 fffff800`50edb4bd : ffffda0a`1f1fc8f8 00000000`00000000 ffffda0a`00000003 0000002a`00000000 : nt!KiAbThreadUnboostCpuPriority+0x1b8374
ffffda0a`1f1fc860 fffff800`50edaa7d : ffffc506`21bce380 ffffb481`d5ea1100 00000000`00000003 00000000`00000003 : nt!KiAbThreadRemoveBoosts+0x5d
ffffda0a`1f1fc890 fffff800`51063dc7 : ffffc506`21bcefd0 ffffda0a`1f1fc9a9 ffffc506`21bce380 ffffc506`00002348 : nt!KeAbPreAcquire+0xed
ffffda0a`1f1fc8e0 fffff800`5d42d13d : ffffda0a`1f1fca01 00000000`00989680 0000006f`a00d8f02 00000000`00000002 : nt!KeWaitForMultipleObjects+0x1a5bb7
ffffda0a`1f1fc9f0 fffff800`5d3bb9ca : 00000000`00000000 ffffc506`21b60000 ffffda0a`1f1fcb19 ffffc506`21b60000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffffda0a`1f1fcac0 fffff800`5d43ad45 : ffffc506`21fad000 ffffc506`21b60000 ffffc506`21fad010 ffffc506`272bf8a0 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffffda0a`1f1fcb80 fffff800`5d43acfa : ffffc506`21b60400 fffff800`5d43ac30 ffffc506`21b60000 ffffb481`d5ea1100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffda0a`1f1fcbd0 fffff800`50ea29a5 : ffffc506`21bce380 fffff800`00000001 ffffc506`21b60000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffda0a`1f1fcc10 fffff800`50ffc868 : ffffb481`d5ea1180 ffffc506`21bce380 fffff800`50ea2950 03c81d58`00000005 : nt!PspSystemThreadStartup+0x55
ffffda0a`1f1fcc60 00000000`00000000 : ffffda0a`1f1fd000 ffffda0a`1f1f7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VidSchiWaitForSchedulerEvents+25d
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1124
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25d
FAILURE_BUCKET_ID: 0x157_dxgmms2!VidSchiWaitForSchedulerEvents
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {08e8de48-145f-7450-09b2-c895ecb87fe8}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe08f69312c20, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffe08f69312c20, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3889
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5837
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe08f69312c20
BUGCHECK_P2: 11
BUGCHECK_P3: ffffe08f69312c20
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff806312fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8063120f340: Unable to get Flags value from nt!KdVersionBlock
fffff8063120f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe08f69312c20
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffff8281ced105e0 -- (.trap 0xffff8281ced105e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe08f68f44368 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000e5 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe08f69312c20 rsp=ffff8281ced10770 rbp=ffff9080f2d5c180
r8=000000010000012c r9=ffff9080f2dd5180 r10=ffffe08f6548d080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffe08f`69312c20 202c31 and byte ptr [rcx+rsi],ch ds:00000000`00000000=??
Resetting default scope
STACK_TEXT:
ffff8281`ced10338 fffff806`30a7a665 : 00000000`00000050 ffffe08f`69312c20 00000000`00000011 ffff8281`ced105e0 : nt!KeBugCheckEx
ffff8281`ced10340 fffff806`308ea4a0 : 00000000`00000000 00000000`00000011 ffff8281`ced10660 00000000`00000000 : nt!MiSystemFault+0x172315
ffff8281`ced10440 fffff806`30a0335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8281`ced105e0 ffffe08f`69312c20 : ffffe08f`69312c20 00000000`00000001 00000000`00000000 ffff9080`f2d5c180 : nt!KiPageFault+0x35e
ffff8281`ced10770 ffffe08f`69312c20 : 00000000`00000001 00000000`00000000 ffff9080`f2d5c180 ffffe08f`5e0b2000 : 0xffffe08f`69312c20
ffff8281`ced10778 00000000`00000001 : 00000000`00000000 ffff9080`f2d5c180 ffffe08f`5e0b2000 ffffe08f`6757c848 : 0xffffe08f`69312c20
ffff8281`ced10780 00000000`00000000 : ffff9080`f2d5c180 ffffe08f`5e0b2000 ffffe08f`6757c848 ffffe08f`00000000 : 0x1
SYMBOL_NAME: nt!MiSystemFault+172315
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 172315
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffea0e17661940, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffea0e17661898, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21397
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffea0e17661940
BUGCHECK_P3: ffffea0e17661898
BUGCHECK_P4: 0
TRAP_FRAME: ffffea0e17661940 -- (.trap 0xffffea0e17661940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff928adf442c68 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff928adb552140 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80126067e27 rsp=ffffea0e17661ad8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff928ad01db1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x19ebe7:
fffff801`26067e27 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffea0e17661898 -- (.exr 0xffffea0e17661898)
ExceptionAddress: fffff80126067e27 (nt!RtlRbRemoveNode+0x000000000019ebe7)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffea0e`17661618 fffff801`26007169 : 00000000`00000139 00000000`0000001d ffffea0e`17661940 ffffea0e`17661898 : nt!KeBugCheckEx
ffffea0e`17661620 fffff801`26007590 : 00000000`00000000 fffff801`25ffbf96 00000000`00000000 fffff801`25e5905b : nt!KiBugCheckDispatch+0x69
ffffea0e`17661760 fffff801`26005923 : 00000000`00000000 ffffce01`f392c180 ffff928a`d9479040 fffff801`25edf38f : nt!KiFastFailDispatch+0xd0
ffffea0e`17661940 fffff801`26067e27 : ffff928a`db552100 ffff928a`db552140 fffff801`3447251c 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffea0e`17661ad8 fffff801`3447251c : 00000000`00000000 ffff928a`db552100 00000000`00000000 fffff801`34477190 : nt!RtlRbRemoveNode+0x19ebe7
ffffea0e`17661af0 fffff801`34472f29 : 00000000`00000010 00000000`00000016 00000000`00000002 fffff801`34477150 : mmcss!CiSchedulerWait+0x37c
ffffea0e`17661bc0 fffff801`25ea29a5 : ffff928a`00000030 ffff928a`d9479040 00000000`00000080 fffff801`34472d50 : mmcss!CiSchedulerThreadFunction+0x1d9
ffffea0e`17661c10 fffff801`25ffc868 : ffffce01`f39e6180 ffff928a`d9479040 fffff801`25ea2950 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffea0e`17661c60 00000000`00000000 : ffffea0e`17662000 ffffea0e`1765c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: mmcss!CiSchedulerWait+37c
MODULE_NAME: mmcss
IMAGE_NAME: mmcss.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 37c
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_mmcss!CiSchedulerWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5875fdc-2064-6d97-04f6-3d8302607b2b}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffaa0daa3ee630, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffaa0daa3ee588, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11174
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffaa0daa3ee630
BUGCHECK_P3: ffffaa0daa3ee588
BUGCHECK_P4: 0
TRAP_FRAME: ffffaa0daa3ee630 -- (.trap 0xffffaa0daa3ee630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb10569b2e4a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb1056caf9a40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077507048d rsp=ffffaa0daa3ee7c0 rbp=000000d3013ee53a
r8=000000d3013c4b98 r9=fffff8076f90c6b0 r10=fffff8076f909ac0
r11=ffffaa0daa3ee800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiInsertTimerTable+0x18f1fd:
fffff807`7507048d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffaa0daa3ee588 -- (.exr 0xffffaa0daa3ee588)
ExceptionAddress: fffff8077507048d (nt!KiInsertTimerTable+0x000000000018f1fd)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffaa0d`aa3ee308 fffff807`75007169 : 00000000`00000139 00000000`00000003 ffffaa0d`aa3ee630 ffffaa0d`aa3ee588 : nt!KeBugCheckEx
ffffaa0d`aa3ee310 fffff807`75007590 : 00000000`00000000 ffffaa0d`aa3ee740 00000000`00000000 719c0700`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa0d`aa3ee450 fffff807`75005923 : 00000000`00000000 00000000`00000000 ffff1ba5`f8d95979 ffffb105`6621ac10 : nt!KiFastFailDispatch+0xd0
ffffaa0d`aa3ee630 fffff807`7507048d : ffffaa0d`aa3ee800 fffff807`837e41c2 00000000`00000081 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffaa0d`aa3ee7c0 fffff807`74edf5fd : ffffb105`69b2e380 fffff807`837e496b ffffaa0d`aa3ee8f8 00000000`00000000 : nt!KiInsertTimerTable+0x18f1fd
ffffaa0d`aa3ee840 fffff807`74ebe4ce : ffffb105`0000004f ffffb105`00000000 ffffb105`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffffaa0d`aa3ee8e0 fffff807`8383d13d : ffffaa0d`aa3eea01 00000000`00989680 000000d3`01b88119 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffffaa0d`aa3ee9f0 fffff807`837cb9ca : 00000000`00000000 ffffb105`69ae0000 ffffaa0d`aa3eeb19 ffffb105`69ae0000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffffaa0d`aa3eeac0 fffff807`8384ad45 : ffffb105`6b273000 ffffb105`69ae0000 ffffb105`6b273010 ffffb105`6cc59010 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffffaa0d`aa3eeb80 fffff807`8384acfa : ffffb105`69ae0400 fffff807`8384ac30 ffffb105`69ae0000 ffffd800`ee6c0100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffaa0d`aa3eebd0 fffff807`74ea29a5 : ffffb105`69b2e380 fffff807`00000001 ffffb105`69ae0000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffaa0d`aa3eec10 fffff807`74ffc868 : ffffd800`ee6c0180 ffffb105`69b2e380 fffff807`74ea2950 00000004`00000000 : nt!PspSystemThreadStartup+0x55
ffffaa0d`aa3eec60 00000000`00000000 : ffffaa0d`aa3ef000 ffffaa0d`aa3e9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiInsertTimerTable+18f1fd
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18f1fd
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077231cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffec078ef02b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3639
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7132
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 77231cfc
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffffec078ef02b80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: wgc_renderer.exe
STACK_TEXT:
ffffec07`8ef029b8 fffff803`0e007169 : 00000000`00000001 00000000`77231cfc 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffec07`8ef029c0 fffff803`0e007033 : ffffae03`70965080 ffffae03`715541e0 ffffec07`8ef02b18 ffffffff`fffdb610 : nt!KiBugCheckDispatch+0x69
ffffec07`8ef02b00 00000000`77231cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`09fef058 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77231cfc
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_d0004_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1e5e8093-a7e6-a911-7b9b-47d4229c250f}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000007a, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80443f8a85b, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5889
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9439
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: ff
BUGCHECK_P3: 7a
BUGCHECK_P4: fffff80443f8a85b
READ_ADDRESS: fffff804448fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044480f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044480f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb80553637480 -- (.trap 0xffffb80553637480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc301ed35c180 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb80553637698 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80443f8a85b rsp=ffffb80553637610 rbp=0000000000000200
r8=ffffb80553637678 r9=0000000000000000 r10=00000039f03c5b74
r11=ffffd78dd9419608 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!HvlGetPpmStatsForProcessor+0x37:
fffff804`43f8a85b 4d8b04c9 mov r8,qword ptr [r9+rcx*8] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffb805`53637338 fffff804`44007169 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`0000007a : nt!KeBugCheckEx
ffffb805`53637340 fffff804`44003469 : ffffd78d`d7e9ab00 fffff804`43ebb48c 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb805`53637480 fffff804`43f8a85b : ffffb805`53637680 ffffd3d9`25bdacee 00000000`00000001 ffffd78d`dbfdb3d8 : nt!KiPageFault+0x469
ffffb805`53637610 fffff804`44087280 : ffffd78d`dbfd4330 ffffc301`ed364218 00000042`daa7c404 ffffc301`ed364210 : nt!HvlGetPpmStatsForProcessor+0x37
ffffb805`53637640 fffff804`43f27d13 : 00000000`00006c48 00000000`00000064 00000000`00000000 00000000`00000000 : nt!PpmUpdatePerformanceFeedback+0x15e570
ffffb805`536376f0 fffff804`43f27004 : 00000000`00000000 00001f80`0000001e 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xb93
ffffb805`53637af0 fffff804`43ff8d34 : ffffffff`00000000 ffffc301`ed3671c0 ffffd78d`e000a580 00000000`000002f4 : nt!PoIdle+0x374
ffffb805`53637c60 00000000`00000000 : ffffb805`53638000 ffffb805`53632000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!HvlGetPpmStatsForProcessor+37
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 37
FAILURE_BUCKET_ID: AV_CODE_AV_nt!HvlGetPpmStatsForProcessor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {13479a0b-4a53-66a3-46a3-dd0f4e63ec64}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffcf05cfe34760, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffcf05cfe34760, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12205
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffcf05cfe34760
BUGCHECK_P2: 11
BUGCHECK_P3: ffffcf05cfe34760
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff801216fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8012160f340: Unable to get Flags value from nt!KdVersionBlock
fffff8012160f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffcf05cfe34760
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffcf05cfe345e0 -- (.trap 0xffffcf05cfe345e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800209c06a08 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000009e rsi=0000000000000000 rdi=0000000000000000
rip=ffffcf05cfe34760 rsp=ffffcf05cfe34770 rbp=ffffd6809a95c180
r8=0000000100000e0c r9=ffffd6809a95c180 r10=ffff80020d29b080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffcf05`cfe34760 7047 jo ffffcf05`cfe347a9 [br=0]
Resetting default scope
STACK_TEXT:
ffffcf05`cfe34338 fffff801`20e7a665 : 00000000`00000050 ffffcf05`cfe34760 00000000`00000011 ffffcf05`cfe345e0 : nt!KeBugCheckEx
ffffcf05`cfe34340 fffff801`20cea4a0 : ffff8002`00000000 00000000`00000011 ffffcf05`cfe34660 00000000`00000000 : nt!MiSystemFault+0x172315
ffffcf05`cfe34440 fffff801`20e0335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffcf05`cfe345e0 ffffcf05`cfe34760 : ffff8002`00000002 fffff801`00000003 00000000`00000000 ffff8001`00000000 : nt!KiPageFault+0x35e
ffffcf05`cfe34770 ffff8002`00000002 : fffff801`00000003 00000000`00000000 ffff8001`00000000 ffff8002`040e7d00 : 0xffffcf05`cfe34760
ffffcf05`cfe34778 fffff801`00000003 : 00000000`00000000 ffff8001`00000000 ffff8002`040e7d00 00000000`00000000 : 0xffff8002`00000002
ffffcf05`cfe34780 00000000`00000000 : ffff8001`00000000 ffff8002`040e7d00 00000000`00000000 ffff8002`00000000 : 0xfffff801`00000003
SYMBOL_NAME: nt!MiSystemFault+172315
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 172315
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8282de668740, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8282de668698, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4733
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12313
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff8282de668740
BUGCHECK_P3: ffff8282de668698
BUGCHECK_P4: 0
TRAP_FRAME: ffff8282de668740 -- (.trap 0xffff8282de668740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf00b1b33d80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa601dcbc9158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046e4df803 rsp=ffff8282de6688d0 rbp=ffffdf00b1b2c180
r8=0000000000000000 r9=00000001219cf4d4 r10=0000000000000002
r11=ffff8282de668968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff804`6e4df803 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff8282de668698 -- (.exr 0xffff8282de668698)
ExceptionAddress: fffff8046e4df803 (nt!KiCommitThreadWait+0x00000000000005c3)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff8282`de668418 fffff804`6e607169 : 00000000`00000139 00000000`00000003 ffff8282`de668740 ffff8282`de668698 : nt!KeBugCheckEx
ffff8282`de668420 fffff804`6e607590 : ffffdf00`00000000 00000000`00000000 00000000`00000000 00001f80`00000200 : nt!KiBugCheckDispatch+0x69
ffff8282`de668560 fffff804`6e605923 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8282`de668740 fffff804`6e4df803 : ffffa601`00000005 00000000`00000002 ffff8282`de6689e0 fffff804`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8282`de6688d0 fffff804`6e4dec33 : ffff8282`00000000 fffff804`00000000 00000000`00000000 ffffa601`de20e200 : nt!KiCommitThreadWait+0x5c3
ffff8282`de668970 fffff804`6e8f1531 : ffffa601`de58e5e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff8282`de668a60 fffff804`6e8f15da : ffffa601`de20e0c0 00000060`51fcf788 00000000`00000000 fffff804`6e606a71 : nt!ObWaitForSingleObject+0x91
ffff8282`de668ac0 fffff804`6e606bb8 : 000001de`f5069000 00000000`00000000 ffff8282`de668b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffff8282`de668b00 00007ffd`cbf4be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`51fcf758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`cbf4be24
SYMBOL_NAME: nt!KiCommitThreadWait+5c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff506f6e37750, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff506f6e376a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15224
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff506f6e37750
BUGCHECK_P3: fffff506f6e376a8
BUGCHECK_P4: 0
TRAP_FRAME: fffff506f6e37750 -- (.trap 0xfffff506f6e37750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9c8b800b10e8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077fabf758 rsp=fffff506f6e378e0 rbp=ffff9c8b800b10e0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiProcessExpiredTimerList+0x248:
fffff807`7fabf758 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff506f6e376a8 -- (.exr 0xfffff506f6e376a8)
ExceptionAddress: fffff8077fabf758 (nt!KiProcessExpiredTimerList+0x0000000000000248)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff506`f6e37428 fffff807`7fc07169 : 00000000`00000139 00000000`00000003 fffff506`f6e37750 fffff506`f6e376a8 : nt!KeBugCheckEx
fffff506`f6e37430 fffff807`7fc07590 : 00000000`000a0a0a 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff506`f6e37570 fffff807`7fc05923 : fffff506`f6e378e8 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff506`f6e37750 fffff807`7fabf758 : ffff9c8b`801ad1c0 00000000`00000000 ffff9c8b`7d8961f0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff506`f6e378e0 fffff807`7fae4e29 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000090ff : nt!KiProcessExpiredTimerList+0x248
fffff506`f6e379d0 fffff807`7fbf8d7e : ffffffff`00000000 ffffe080`19d2c180 ffffe080`19d371c0 ffff9c8b`7d896080 : nt!KiRetireDpcList+0x9d9
fffff506`f6e37c60 00000000`00000000 : fffff506`f6e38000 fffff506`f6e32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiProcessExpiredTimerList+248
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 248
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffff9001e6b8b320, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9001e6b8b278, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 59086
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 2
BUGCHECK_P2: ffff9001e6b8b320
BUGCHECK_P3: ffff9001e6b8b278
BUGCHECK_P4: 0
TRAP_FRAME: ffff9001e6b8b320 -- (.trap 0xffff9001e6b8b320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff89838000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff898380d1155 rsp=ffff9001e6b8b4b8 rbp=ffff9001e6b8ba90
r8=ffffbf81143f4000 r9=00002f80f2878a20 r10=ffff9001e6b8ca20
r11=00000000000001c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
win32kbase!_report_gsfailure+0x5:
fffff898`380d1155 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff9001e6b8b278 -- (.exr 0xffff9001e6b8b278)
ExceptionAddress: fffff898380d1155 (win32kbase!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff9001`e6b8aff8 fffff807`2e007169 : 00000000`00000139 00000000`00000002 ffff9001`e6b8b320 ffff9001`e6b8b278 : nt!KeBugCheckEx
ffff9001`e6b8b000 fffff807`2e007590 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd38d`e62f8370 : nt!KiBugCheckDispatch+0x69
ffff9001`e6b8b140 fffff807`2e005923 : 00000000`0000003f fffff807`2e1194df 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9001`e6b8b320 fffff898`380d1155 : fffff898`380d2d06 ffff9001`e6b8ba90 fffff807`2de52fcf fffff898`38263b88 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9001`e6b8b4b8 fffff898`380d2d06 : ffff9001`e6b8ba90 fffff807`2de52fcf fffff898`38263b88 ffff9001`00000000 : win32kbase!_report_gsfailure+0x5
ffff9001`e6b8b4c0 fffff898`380d2c9b : ffff9001`e6b8b590 00000000`00000000 ffff9001`e6b8bac8 ffff9001`e6b8baa0 : win32kbase!_GSHandlerCheckCommon+0x5a
ffff9001`e6b8b4f0 fffff807`2dffe0d2 : fffff898`380d2c88 00000000`00000000 00000000`00000000 00000000`00000000 : win32kbase!_GSHandlerCheck+0x13
ffff9001`e6b8b520 fffff807`2de52db7 : ffff9001`e6b8ba90 00000000`00000000 ffff9001`e6b8ca20 fffff898`3804f329 : nt!RtlpExecuteHandlerForException+0x12
ffff9001`e6b8b550 fffff807`2de519a6 : ffff9001`e6b8c468 ffff9001`e6b8c1a0 ffff9001`e6b8c468 00000000`00000031 : nt!RtlDispatchException+0x297
ffff9001`e6b8bc70 fffff807`2e0072ac : ffff44cb`aa0b36c8 00000000`0000080b 00000000`00001000 ffff9001`e6b8c510 : nt!KiDispatchException+0x186
ffff9001`e6b8c330 fffff807`2e003443 : ffffe60e`1b094720 ffffd38d`d9492000 ffffe60e`00d82820 ffff9001`e6b8c5d0 : nt!KiExceptionDispatch+0x12c
ffff9001`e6b8c510 fffff807`2e2c0146 : ffff9001`e6b8c700 00000000`00002000 00000000`d5f45000 00000001`00000000 : nt!KiPageFault+0x443
ffff9001`e6b8c6a0 fffff807`2e2bff08 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x1e6
ffff9001`e6b8c700 fffff807`2dedb967 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd38d`ec973190 : nt!ObpRemoveObjectRoutine+0x88
ffff9001`e6b8c760 fffff807`2de82245 : ffffd38d`e2fed830 00000000`00000000 ffffd38d`dd697080 fffff807`2e1e7658 : nt!ObfDereferenceObjectWithTag+0xc7
ffff9001`e6b8c7a0 fffff807`2e1e75cf : ffffd38d`dd697648 ffff9001`e6b8ca01 00000000`00000000 ffffd38d`dd697080 : nt!PspRemoveProperty+0x91
ffff9001`e6b8c7d0 fffff807`2e1e6a68 : ffffd38d`dd697080 00000000`00000000 ffff44cb`aa0b3238 00000000`00000000 : nt!PspEmptyPropertySet+0x27
ffff9001`e6b8c800 fffff807`2e1e99b3 : ffffd38d`00000000 fffff807`3c82f823 00000000`00000007 ffffe60e`1b094720 : nt!PspExitThread+0xc8
ffff9001`e6b8c900 fffff807`2e2935b4 : ffffd38d`e2fedb90 ffff9001`e6b8cac0 00000000`00000002 fffff8ce`06f6d020 : nt!PspTerminateThreadByPointer+0x53
ffff9001`e6b8c940 fffff807`3c8977a9 : ffffd38d`00000000 ffff9001`e6b8cac0 00000000`00000000 ffffd38d`e0b2b380 : nt!PsTerminateSystemThread+0x24
ffff9001`e6b8c970 ffffd38d`00000000 : ffff9001`e6b8cac0 00000000`00000000 ffffd38d`e0b2b380 00000439`ffffffff : dxgkrnl+0x1577a9
ffff9001`e6b8c978 ffff9001`e6b8cac0 : 00000000`00000000 ffffd38d`e0b2b380 00000439`ffffffff ffffd38d`ec973190 : 0xffffd38d`00000000
ffff9001`e6b8c980 00000000`00000000 : ffffd38d`e0b2b380 00000439`ffffffff ffffd38d`ec973190 00000000`00000000 : 0xffff9001`e6b8cac0
SYMBOL_NAME: win32kbase!_report_gsfailure+5
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f22c2e43-4b0d-a5dc-7d6c-399075f6e217}
Followup: MachineOwner
---------