KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8078366bc20, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8078366bb78, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9772
Key : Analysis.Memory.CommitPeak.Mb
Value: 101
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff8078366bc20
BUGCHECK_P3: fffff8078366bb78
BUGCHECK_P4: 0
TRAP_FRAME: fffff8078366bc20 -- (.trap 0xfffff8078366bc20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff920e8d88ffe8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077cec506d rsp=fffff8078366bdb0 rbp=ffff920e8e40e080
r8=0000000000000001 r9=0000000000000006 r10=fffff8077cec2e00
r11=fffff8077b67c180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiExitDispatcher+0x1ad:
fffff807`7cec506d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff8078366bb78 -- (.exr 0xfffff8078366bb78)
ExceptionAddress: fffff8077cec506d (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff807`8366b8f8 fffff807`7d007169 : 00000000`00000139 00000000`00000003 fffff807`8366bc20 fffff807`8366bb78 : nt!KeBugCheckEx
fffff807`8366b900 fffff807`7d007590 : 00000000`00000200 00000000`00000000 fffff807`7cff1300 fffff807`7ce7448a : nt!KiBugCheckDispatch+0x69
fffff807`8366ba40 fffff807`7d005923 : ffff920e`8cad7902 fffff807`919db008 ffff920e`91c7a4b0 00000000`00000009 : nt!KiFastFailDispatch+0xd0
fffff807`8366bc20 fffff807`7cec506d : 00000000`00000000 00000000`00000000 fffff807`919db008 ffff920e`8cae0788 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`8366bdb0 fffff807`7cec33f7 : ffff920e`8e40e080 ffff920e`8cae0780 ffff920e`8e40e080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`8366be20 fffff807`7cec2e97 : 00000000`00000000 fffff807`8366bf06 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`8366bf10 fffff807`8cc65056 : 00000000`00000018 fffff807`8366bfb0 ffff920e`9197d710 ffff920e`000b000b : nt!IofCompleteRequest+0x17
fffff807`8366bf40 fffff807`8cc43aa7 : 00000000`00000002 ffff920e`8c9fe500 ffff920e`86c45190 fffff807`8366c024 : mouclass!MouseClassServiceCallback+0x476
fffff807`8366bfe0 fffff807`7cec2fce : 00000000`00000000 fffffff6`00000000 ffff920e`8cb78101 fffff807`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`8366c080 fffff807`7cec2e97 : 00000000`00000000 ffff920e`8c0fb406 ffff920e`8a1ff150 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`8366c170 fffff807`8cc0aef5 : ffff920e`8c913a88 ffff920e`897b2502 00000000`00000000 00000000`00000008 : nt!IofCompleteRequest+0x17
fffff807`8366c1a0 fffff807`8cc0a7ed : ffff920e`897b25e0 ffff920e`897b2502 ffff920e`897b25e0 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`8366c2a0 fffff807`7cec2fce : ffff920e`8cb0a0d0 ffff920e`8cb0a0d0 fffff807`8366c301 ffff920e`8cb0a54b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`8366c340 fffff807`7cec2e97 : 00000000`00000001 00000000`00000000 ffff920e`8cadd020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`8366c430 fffff807`81fb811a : 00000000`00000000 ffff920e`8a2b7a60 ffff920e`8cb0a0d0 fffff807`8366c510 : nt!IofCompleteRequest+0x17
fffff807`8366c460 fffff807`81fb5bbf : ffff920e`89430b02 ffff920e`8ca82750 ffff920e`8cb0a0d0 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`8366c4f0 fffff807`8d05b91c : 00000000`ffffff02 ffff920e`894309c0 ffff920e`8cadd400 ffff920e`8cadd400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`8366c550 fffff807`8d05b7e1 : ffff920e`89430b60 00000000`00000007 ffff920e`89430bf0 fffff807`8366c768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`8366c5b0 fffff807`8d05b5d0 : 00000000`00000004 fffff807`8366c720 00000000`00000000 ffff920e`8cadc5e0 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`8366c660 fffff807`8d056570 : 00000000`00000004 fffff807`8366c738 00000000`00000008 fffff807`8366c740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`8366c690 fffff807`8d0560a5 : 00000000`00000780 00006df1`76847500 ffff920e`8a6fbec0 ffff920e`89bd0470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`8366c6f0 fffff807`8d055d7c : ffff920e`8c810328 fffff807`7b67c180 00006df1`737ee328 fffff807`8366c810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`8366c7f0 fffff807`81fb38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`8366c820 fffff807`7cee535e : fffff807`7b67f240 00000000`00000000 fffff807`8366cb20 fffff807`7b67c180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`8366c860 fffff807`7cee4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`8366c9d0 fffff807`7cff8d7e : 00000000`00000000 fffff807`7b67c180 fffff807`7d927600 ffff920e`8f7d00c0 : nt!KiRetireDpcList+0x1f4
fffff807`8366cc60 00000000`00000000 : fffff807`8366d000 fffff807`83667000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}
Followup: MachineOwner
---------
KERNEL_THREAD_PRIORITY_FLOOR_VIOLATION (157)
An illegal operation was attempted on the priority floor of a particular
thread.
Arguments:
Arg1: ffffc50621bce380, The address of the thread
Arg2: 0000000000000004, The target priority value
Arg3: 0000000000000002, The priority counter for the target priority underflowed
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4311
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9504
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 157
BUGCHECK_P1: ffffc50621bce380
BUGCHECK_P2: 4
BUGCHECK_P3: 2
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffda0a`1f1fc7e8 fffff800`510462f8 : 00000000`00000157 ffffc506`21bce380 00000000`00000004 00000000`00000002 : nt!KeBugCheckEx
ffffda0a`1f1fc7f0 fffff800`50edb4bd : ffffda0a`1f1fc8f8 00000000`00000000 ffffda0a`00000003 0000002a`00000000 : nt!KiAbThreadUnboostCpuPriority+0x1b8374
ffffda0a`1f1fc860 fffff800`50edaa7d : ffffc506`21bce380 ffffb481`d5ea1100 00000000`00000003 00000000`00000003 : nt!KiAbThreadRemoveBoosts+0x5d
ffffda0a`1f1fc890 fffff800`51063dc7 : ffffc506`21bcefd0 ffffda0a`1f1fc9a9 ffffc506`21bce380 ffffc506`00002348 : nt!KeAbPreAcquire+0xed
ffffda0a`1f1fc8e0 fffff800`5d42d13d : ffffda0a`1f1fca01 00000000`00989680 0000006f`a00d8f02 00000000`00000002 : nt!KeWaitForMultipleObjects+0x1a5bb7
ffffda0a`1f1fc9f0 fffff800`5d3bb9ca : 00000000`00000000 ffffc506`21b60000 ffffda0a`1f1fcb19 ffffc506`21b60000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffffda0a`1f1fcac0 fffff800`5d43ad45 : ffffc506`21fad000 ffffc506`21b60000 ffffc506`21fad010 ffffc506`272bf8a0 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffffda0a`1f1fcb80 fffff800`5d43acfa : ffffc506`21b60400 fffff800`5d43ac30 ffffc506`21b60000 ffffb481`d5ea1100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffda0a`1f1fcbd0 fffff800`50ea29a5 : ffffc506`21bce380 fffff800`00000001 ffffc506`21b60000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffda0a`1f1fcc10 fffff800`50ffc868 : ffffb481`d5ea1180 ffffc506`21bce380 fffff800`50ea2950 03c81d58`00000005 : nt!PspSystemThreadStartup+0x55
ffffda0a`1f1fcc60 00000000`00000000 : ffffda0a`1f1fd000 ffffda0a`1f1f7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VidSchiWaitForSchedulerEvents+25d
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1124
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 25d
FAILURE_BUCKET_ID: 0x157_dxgmms2!VidSchiWaitForSchedulerEvents
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {08e8de48-145f-7450-09b2-c895ecb87fe8}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe08f69312c20, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffe08f69312c20, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3889
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5837
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe08f69312c20
BUGCHECK_P2: 11
BUGCHECK_P3: ffffe08f69312c20
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff806312fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8063120f340: Unable to get Flags value from nt!KdVersionBlock
fffff8063120f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe08f69312c20
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffff8281ced105e0 -- (.trap 0xffff8281ced105e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe08f68f44368 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000e5 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe08f69312c20 rsp=ffff8281ced10770 rbp=ffff9080f2d5c180
r8=000000010000012c r9=ffff9080f2dd5180 r10=ffffe08f6548d080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffe08f`69312c20 202c31 and byte ptr [rcx+rsi],ch ds:00000000`00000000=??
Resetting default scope
STACK_TEXT:
ffff8281`ced10338 fffff806`30a7a665 : 00000000`00000050 ffffe08f`69312c20 00000000`00000011 ffff8281`ced105e0 : nt!KeBugCheckEx
ffff8281`ced10340 fffff806`308ea4a0 : 00000000`00000000 00000000`00000011 ffff8281`ced10660 00000000`00000000 : nt!MiSystemFault+0x172315
ffff8281`ced10440 fffff806`30a0335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8281`ced105e0 ffffe08f`69312c20 : ffffe08f`69312c20 00000000`00000001 00000000`00000000 ffff9080`f2d5c180 : nt!KiPageFault+0x35e
ffff8281`ced10770 ffffe08f`69312c20 : 00000000`00000001 00000000`00000000 ffff9080`f2d5c180 ffffe08f`5e0b2000 : 0xffffe08f`69312c20
ffff8281`ced10778 00000000`00000001 : 00000000`00000000 ffff9080`f2d5c180 ffffe08f`5e0b2000 ffffe08f`6757c848 : 0xffffe08f`69312c20
ffff8281`ced10780 00000000`00000000 : ffff9080`f2d5c180 ffffe08f`5e0b2000 ffffe08f`6757c848 ffffe08f`00000000 : 0x1
SYMBOL_NAME: nt!MiSystemFault+172315
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 172315
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffea0e17661940, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffea0e17661898, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21397
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffea0e17661940
BUGCHECK_P3: ffffea0e17661898
BUGCHECK_P4: 0
TRAP_FRAME: ffffea0e17661940 -- (.trap 0xffffea0e17661940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff928adf442c68 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff928adb552140 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80126067e27 rsp=ffffea0e17661ad8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff928ad01db1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x19ebe7:
fffff801`26067e27 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffea0e17661898 -- (.exr 0xffffea0e17661898)
ExceptionAddress: fffff80126067e27 (nt!RtlRbRemoveNode+0x000000000019ebe7)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffea0e`17661618 fffff801`26007169 : 00000000`00000139 00000000`0000001d ffffea0e`17661940 ffffea0e`17661898 : nt!KeBugCheckEx
ffffea0e`17661620 fffff801`26007590 : 00000000`00000000 fffff801`25ffbf96 00000000`00000000 fffff801`25e5905b : nt!KiBugCheckDispatch+0x69
ffffea0e`17661760 fffff801`26005923 : 00000000`00000000 ffffce01`f392c180 ffff928a`d9479040 fffff801`25edf38f : nt!KiFastFailDispatch+0xd0
ffffea0e`17661940 fffff801`26067e27 : ffff928a`db552100 ffff928a`db552140 fffff801`3447251c 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffea0e`17661ad8 fffff801`3447251c : 00000000`00000000 ffff928a`db552100 00000000`00000000 fffff801`34477190 : nt!RtlRbRemoveNode+0x19ebe7
ffffea0e`17661af0 fffff801`34472f29 : 00000000`00000010 00000000`00000016 00000000`00000002 fffff801`34477150 : mmcss!CiSchedulerWait+0x37c
ffffea0e`17661bc0 fffff801`25ea29a5 : ffff928a`00000030 ffff928a`d9479040 00000000`00000080 fffff801`34472d50 : mmcss!CiSchedulerThreadFunction+0x1d9
ffffea0e`17661c10 fffff801`25ffc868 : ffffce01`f39e6180 ffff928a`d9479040 fffff801`25ea2950 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffea0e`17661c60 00000000`00000000 : ffffea0e`17662000 ffffea0e`1765c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: mmcss!CiSchedulerWait+37c
MODULE_NAME: mmcss
IMAGE_NAME: mmcss.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 37c
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_mmcss!CiSchedulerWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5875fdc-2064-6d97-04f6-3d8302607b2b}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffaa0daa3ee630, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffaa0daa3ee588, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11174
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffaa0daa3ee630
BUGCHECK_P3: ffffaa0daa3ee588
BUGCHECK_P4: 0
TRAP_FRAME: ffffaa0daa3ee630 -- (.trap 0xffffaa0daa3ee630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb10569b2e4a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb1056caf9a40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077507048d rsp=ffffaa0daa3ee7c0 rbp=000000d3013ee53a
r8=000000d3013c4b98 r9=fffff8076f90c6b0 r10=fffff8076f909ac0
r11=ffffaa0daa3ee800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiInsertTimerTable+0x18f1fd:
fffff807`7507048d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffaa0daa3ee588 -- (.exr 0xffffaa0daa3ee588)
ExceptionAddress: fffff8077507048d (nt!KiInsertTimerTable+0x000000000018f1fd)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffaa0d`aa3ee308 fffff807`75007169 : 00000000`00000139 00000000`00000003 ffffaa0d`aa3ee630 ffffaa0d`aa3ee588 : nt!KeBugCheckEx
ffffaa0d`aa3ee310 fffff807`75007590 : 00000000`00000000 ffffaa0d`aa3ee740 00000000`00000000 719c0700`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa0d`aa3ee450 fffff807`75005923 : 00000000`00000000 00000000`00000000 ffff1ba5`f8d95979 ffffb105`6621ac10 : nt!KiFastFailDispatch+0xd0
ffffaa0d`aa3ee630 fffff807`7507048d : ffffaa0d`aa3ee800 fffff807`837e41c2 00000000`00000081 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffaa0d`aa3ee7c0 fffff807`74edf5fd : ffffb105`69b2e380 fffff807`837e496b ffffaa0d`aa3ee8f8 00000000`00000000 : nt!KiInsertTimerTable+0x18f1fd
ffffaa0d`aa3ee840 fffff807`74ebe4ce : ffffb105`0000004f ffffb105`00000000 ffffb105`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffffaa0d`aa3ee8e0 fffff807`8383d13d : ffffaa0d`aa3eea01 00000000`00989680 000000d3`01b88119 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffffaa0d`aa3ee9f0 fffff807`837cb9ca : 00000000`00000000 ffffb105`69ae0000 ffffaa0d`aa3eeb19 ffffb105`69ae0000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffffaa0d`aa3eeac0 fffff807`8384ad45 : ffffb105`6b273000 ffffb105`69ae0000 ffffb105`6b273010 ffffb105`6cc59010 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffffaa0d`aa3eeb80 fffff807`8384acfa : ffffb105`69ae0400 fffff807`8384ac30 ffffb105`69ae0000 ffffd800`ee6c0100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffffaa0d`aa3eebd0 fffff807`74ea29a5 : ffffb105`69b2e380 fffff807`00000001 ffffb105`69ae0000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffaa0d`aa3eec10 fffff807`74ffc868 : ffffd800`ee6c0180 ffffb105`69b2e380 fffff807`74ea2950 00000004`00000000 : nt!PspSystemThreadStartup+0x55
ffffaa0d`aa3eec60 00000000`00000000 : ffffaa0d`aa3ef000 ffffaa0d`aa3e9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiInsertTimerTable+18f1fd
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18f1fd
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077231cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffec078ef02b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3639
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7132
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 77231cfc
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffffec078ef02b80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: wgc_renderer.exe
STACK_TEXT:
ffffec07`8ef029b8 fffff803`0e007169 : 00000000`00000001 00000000`77231cfc 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffffec07`8ef029c0 fffff803`0e007033 : ffffae03`70965080 ffffae03`715541e0 ffffec07`8ef02b18 ffffffff`fffdb610 : nt!KiBugCheckDispatch+0x69
ffffec07`8ef02b00 00000000`77231cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`09fef058 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77231cfc
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_d0004_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1e5e8093-a7e6-a911-7b9b-47d4229c250f}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000007a, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80443f8a85b, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5889
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9439
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: ff
BUGCHECK_P3: 7a
BUGCHECK_P4: fffff80443f8a85b
READ_ADDRESS: fffff804448fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044480f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044480f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb80553637480 -- (.trap 0xffffb80553637480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc301ed35c180 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb80553637698 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80443f8a85b rsp=ffffb80553637610 rbp=0000000000000200
r8=ffffb80553637678 r9=0000000000000000 r10=00000039f03c5b74
r11=ffffd78dd9419608 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!HvlGetPpmStatsForProcessor+0x37:
fffff804`43f8a85b 4d8b04c9 mov r8,qword ptr [r9+rcx*8] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffb805`53637338 fffff804`44007169 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`0000007a : nt!KeBugCheckEx
ffffb805`53637340 fffff804`44003469 : ffffd78d`d7e9ab00 fffff804`43ebb48c 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb805`53637480 fffff804`43f8a85b : ffffb805`53637680 ffffd3d9`25bdacee 00000000`00000001 ffffd78d`dbfdb3d8 : nt!KiPageFault+0x469
ffffb805`53637610 fffff804`44087280 : ffffd78d`dbfd4330 ffffc301`ed364218 00000042`daa7c404 ffffc301`ed364210 : nt!HvlGetPpmStatsForProcessor+0x37
ffffb805`53637640 fffff804`43f27d13 : 00000000`00006c48 00000000`00000064 00000000`00000000 00000000`00000000 : nt!PpmUpdatePerformanceFeedback+0x15e570
ffffb805`536376f0 fffff804`43f27004 : 00000000`00000000 00001f80`0000001e 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xb93
ffffb805`53637af0 fffff804`43ff8d34 : ffffffff`00000000 ffffc301`ed3671c0 ffffd78d`e000a580 00000000`000002f4 : nt!PoIdle+0x374
ffffb805`53637c60 00000000`00000000 : ffffb805`53638000 ffffb805`53632000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!HvlGetPpmStatsForProcessor+37
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 37
FAILURE_BUCKET_ID: AV_CODE_AV_nt!HvlGetPpmStatsForProcessor
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {13479a0b-4a53-66a3-46a3-dd0f4e63ec64}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffcf05cfe34760, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffcf05cfe34760, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12205
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffcf05cfe34760
BUGCHECK_P2: 11
BUGCHECK_P3: ffffcf05cfe34760
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff801216fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8012160f340: Unable to get Flags value from nt!KdVersionBlock
fffff8012160f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffcf05cfe34760
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffcf05cfe345e0 -- (.trap 0xffffcf05cfe345e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800209c06a08 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000009e rsi=0000000000000000 rdi=0000000000000000
rip=ffffcf05cfe34760 rsp=ffffcf05cfe34770 rbp=ffffd6809a95c180
r8=0000000100000e0c r9=ffffd6809a95c180 r10=ffff80020d29b080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffcf05`cfe34760 7047 jo ffffcf05`cfe347a9 [br=0]
Resetting default scope
STACK_TEXT:
ffffcf05`cfe34338 fffff801`20e7a665 : 00000000`00000050 ffffcf05`cfe34760 00000000`00000011 ffffcf05`cfe345e0 : nt!KeBugCheckEx
ffffcf05`cfe34340 fffff801`20cea4a0 : ffff8002`00000000 00000000`00000011 ffffcf05`cfe34660 00000000`00000000 : nt!MiSystemFault+0x172315
ffffcf05`cfe34440 fffff801`20e0335e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffcf05`cfe345e0 ffffcf05`cfe34760 : ffff8002`00000002 fffff801`00000003 00000000`00000000 ffff8001`00000000 : nt!KiPageFault+0x35e
ffffcf05`cfe34770 ffff8002`00000002 : fffff801`00000003 00000000`00000000 ffff8001`00000000 ffff8002`040e7d00 : 0xffffcf05`cfe34760
ffffcf05`cfe34778 fffff801`00000003 : 00000000`00000000 ffff8001`00000000 ffff8002`040e7d00 00000000`00000000 : 0xffff8002`00000002
ffffcf05`cfe34780 00000000`00000000 : ffff8001`00000000 ffff8002`040e7d00 00000000`00000000 ffff8002`00000000 : 0xfffff801`00000003
SYMBOL_NAME: nt!MiSystemFault+172315
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 172315
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8282de668740, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8282de668698, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4733
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12313
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff8282de668740
BUGCHECK_P3: ffff8282de668698
BUGCHECK_P4: 0
TRAP_FRAME: ffff8282de668740 -- (.trap 0xffff8282de668740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf00b1b33d80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa601dcbc9158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046e4df803 rsp=ffff8282de6688d0 rbp=ffffdf00b1b2c180
r8=0000000000000000 r9=00000001219cf4d4 r10=0000000000000002
r11=ffff8282de668968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff804`6e4df803 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff8282de668698 -- (.exr 0xffff8282de668698)
ExceptionAddress: fffff8046e4df803 (nt!KiCommitThreadWait+0x00000000000005c3)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff8282`de668418 fffff804`6e607169 : 00000000`00000139 00000000`00000003 ffff8282`de668740 ffff8282`de668698 : nt!KeBugCheckEx
ffff8282`de668420 fffff804`6e607590 : ffffdf00`00000000 00000000`00000000 00000000`00000000 00001f80`00000200 : nt!KiBugCheckDispatch+0x69
ffff8282`de668560 fffff804`6e605923 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8282`de668740 fffff804`6e4df803 : ffffa601`00000005 00000000`00000002 ffff8282`de6689e0 fffff804`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8282`de6688d0 fffff804`6e4dec33 : ffff8282`00000000 fffff804`00000000 00000000`00000000 ffffa601`de20e200 : nt!KiCommitThreadWait+0x5c3
ffff8282`de668970 fffff804`6e8f1531 : ffffa601`de58e5e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffff8282`de668a60 fffff804`6e8f15da : ffffa601`de20e0c0 00000060`51fcf788 00000000`00000000 fffff804`6e606a71 : nt!ObWaitForSingleObject+0x91
ffff8282`de668ac0 fffff804`6e606bb8 : 000001de`f5069000 00000000`00000000 ffff8282`de668b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffff8282`de668b00 00007ffd`cbf4be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`51fcf758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`cbf4be24
SYMBOL_NAME: nt!KiCommitThreadWait+5c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff506f6e37750, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff506f6e376a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15224
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff506f6e37750
BUGCHECK_P3: fffff506f6e376a8
BUGCHECK_P4: 0
TRAP_FRAME: fffff506f6e37750 -- (.trap 0xfffff506f6e37750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9c8b800b10e8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077fabf758 rsp=fffff506f6e378e0 rbp=ffff9c8b800b10e0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiProcessExpiredTimerList+0x248:
fffff807`7fabf758 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff506f6e376a8 -- (.exr 0xfffff506f6e376a8)
ExceptionAddress: fffff8077fabf758 (nt!KiProcessExpiredTimerList+0x0000000000000248)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff506`f6e37428 fffff807`7fc07169 : 00000000`00000139 00000000`00000003 fffff506`f6e37750 fffff506`f6e376a8 : nt!KeBugCheckEx
fffff506`f6e37430 fffff807`7fc07590 : 00000000`000a0a0a 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff506`f6e37570 fffff807`7fc05923 : fffff506`f6e378e8 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff506`f6e37750 fffff807`7fabf758 : ffff9c8b`801ad1c0 00000000`00000000 ffff9c8b`7d8961f0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff506`f6e378e0 fffff807`7fae4e29 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`000090ff : nt!KiProcessExpiredTimerList+0x248
fffff506`f6e379d0 fffff807`7fbf8d7e : ffffffff`00000000 ffffe080`19d2c180 ffffe080`19d371c0 ffff9c8b`7d896080 : nt!KiRetireDpcList+0x9d9
fffff506`f6e37c60 00000000`00000000 : fffff506`f6e38000 fffff506`f6e32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiProcessExpiredTimerList+248
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 248
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffff9001e6b8b320, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9001e6b8b278, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 59086
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 2
BUGCHECK_P2: ffff9001e6b8b320
BUGCHECK_P3: ffff9001e6b8b278
BUGCHECK_P4: 0
TRAP_FRAME: ffff9001e6b8b320 -- (.trap 0xffff9001e6b8b320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff89838000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff898380d1155 rsp=ffff9001e6b8b4b8 rbp=ffff9001e6b8ba90
r8=ffffbf81143f4000 r9=00002f80f2878a20 r10=ffff9001e6b8ca20
r11=00000000000001c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
win32kbase!_report_gsfailure+0x5:
fffff898`380d1155 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff9001e6b8b278 -- (.exr 0xffff9001e6b8b278)
ExceptionAddress: fffff898380d1155 (win32kbase!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff9001`e6b8aff8 fffff807`2e007169 : 00000000`00000139 00000000`00000002 ffff9001`e6b8b320 ffff9001`e6b8b278 : nt!KeBugCheckEx
ffff9001`e6b8b000 fffff807`2e007590 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd38d`e62f8370 : nt!KiBugCheckDispatch+0x69
ffff9001`e6b8b140 fffff807`2e005923 : 00000000`0000003f fffff807`2e1194df 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9001`e6b8b320 fffff898`380d1155 : fffff898`380d2d06 ffff9001`e6b8ba90 fffff807`2de52fcf fffff898`38263b88 : nt!KiRaiseSecurityCheckFailure+0x323
ffff9001`e6b8b4b8 fffff898`380d2d06 : ffff9001`e6b8ba90 fffff807`2de52fcf fffff898`38263b88 ffff9001`00000000 : win32kbase!_report_gsfailure+0x5
ffff9001`e6b8b4c0 fffff898`380d2c9b : ffff9001`e6b8b590 00000000`00000000 ffff9001`e6b8bac8 ffff9001`e6b8baa0 : win32kbase!_GSHandlerCheckCommon+0x5a
ffff9001`e6b8b4f0 fffff807`2dffe0d2 : fffff898`380d2c88 00000000`00000000 00000000`00000000 00000000`00000000 : win32kbase!_GSHandlerCheck+0x13
ffff9001`e6b8b520 fffff807`2de52db7 : ffff9001`e6b8ba90 00000000`00000000 ffff9001`e6b8ca20 fffff898`3804f329 : nt!RtlpExecuteHandlerForException+0x12
ffff9001`e6b8b550 fffff807`2de519a6 : ffff9001`e6b8c468 ffff9001`e6b8c1a0 ffff9001`e6b8c468 00000000`00000031 : nt!RtlDispatchException+0x297
ffff9001`e6b8bc70 fffff807`2e0072ac : ffff44cb`aa0b36c8 00000000`0000080b 00000000`00001000 ffff9001`e6b8c510 : nt!KiDispatchException+0x186
ffff9001`e6b8c330 fffff807`2e003443 : ffffe60e`1b094720 ffffd38d`d9492000 ffffe60e`00d82820 ffff9001`e6b8c5d0 : nt!KiExceptionDispatch+0x12c
ffff9001`e6b8c510 fffff807`2e2c0146 : ffff9001`e6b8c700 00000000`00002000 00000000`d5f45000 00000001`00000000 : nt!KiPageFault+0x443
ffff9001`e6b8c6a0 fffff807`2e2bff08 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x1e6
ffff9001`e6b8c700 fffff807`2dedb967 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd38d`ec973190 : nt!ObpRemoveObjectRoutine+0x88
ffff9001`e6b8c760 fffff807`2de82245 : ffffd38d`e2fed830 00000000`00000000 ffffd38d`dd697080 fffff807`2e1e7658 : nt!ObfDereferenceObjectWithTag+0xc7
ffff9001`e6b8c7a0 fffff807`2e1e75cf : ffffd38d`dd697648 ffff9001`e6b8ca01 00000000`00000000 ffffd38d`dd697080 : nt!PspRemoveProperty+0x91
ffff9001`e6b8c7d0 fffff807`2e1e6a68 : ffffd38d`dd697080 00000000`00000000 ffff44cb`aa0b3238 00000000`00000000 : nt!PspEmptyPropertySet+0x27
ffff9001`e6b8c800 fffff807`2e1e99b3 : ffffd38d`00000000 fffff807`3c82f823 00000000`00000007 ffffe60e`1b094720 : nt!PspExitThread+0xc8
ffff9001`e6b8c900 fffff807`2e2935b4 : ffffd38d`e2fedb90 ffff9001`e6b8cac0 00000000`00000002 fffff8ce`06f6d020 : nt!PspTerminateThreadByPointer+0x53
ffff9001`e6b8c940 fffff807`3c8977a9 : ffffd38d`00000000 ffff9001`e6b8cac0 00000000`00000000 ffffd38d`e0b2b380 : nt!PsTerminateSystemThread+0x24
ffff9001`e6b8c970 ffffd38d`00000000 : ffff9001`e6b8cac0 00000000`00000000 ffffd38d`e0b2b380 00000439`ffffffff : dxgkrnl+0x1577a9
ffff9001`e6b8c978 ffff9001`e6b8cac0 : 00000000`00000000 ffffd38d`e0b2b380 00000439`ffffffff ffffd38d`ec973190 : 0xffffd38d`00000000
ffff9001`e6b8c980 00000000`00000000 : ffffd38d`e0b2b380 00000439`ffffffff ffffd38d`ec973190 00000000`00000000 : 0xffff9001`e6b8cac0
SYMBOL_NAME: win32kbase!_report_gsfailure+5
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f22c2e43-4b0d-a5dc-7d6c-399075f6e217}
Followup: MachineOwner
---------
Dediğim şekilde dener misin?
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffcb8162686e70
Arg3: 0000000006e01083
Arg4: fffff8007c206e34
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8077
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 130633
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffffcb8162686e70
BUGCHECK_P3: 6e01083
BUGCHECK_P4: fffff8007c206e34
TRAP_FRAME: ffffcb8162686e70 -- (.trap 0xffffcb8162686e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000001b832f33c18
rdx=00000000000002d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007c206e34 rsp=0000000006e01083 rbp=0000000000000002
r8=ffffbb86b2835c10 r9=ffffcb816259d180 r10=ffffbb86a8124b60
r11=ffffbb86b224f080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSystemServiceExit+0x274:
fffff800`7c206e34 c3 ret
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
BAD_STACK_POINTER: 0000000006e01083
UNALIGNED_STACK_POINTER: 0000000006e01083
STACK_TEXT:
ffffcb81`62686d28 fffff800`7c207169 : 00000000`0000007f 00000000`00000008 ffffcb81`62686e70 00000000`06e01083 : nt!KeBugCheckEx
ffffcb81`62686d30 fffff800`7c201f83 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffcb81`62686e70 fffff800`7c206e34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`06e01083 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x274
SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c3
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8033d31cb3b, Address of the instruction which caused the bugcheck
Arg3: ffffdb004c3ca500, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5827
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 122910
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8033d31cb3b
BUGCHECK_P3: ffffdb004c3ca500
BUGCHECK_P4: 0
CONTEXT: ffffdb004c3ca500 -- (.cxr 0xffffdb004c3ca500)
rax=ffffde88aafad080 rbx=0000000000000003 rcx=850fc0854818418b
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000001
rip=fffff8033d31cb3b rsp=ffffdb004c3caf00 rbp=ffffdb004c3cb000
r8=0000000000000000 r9=0000000000000003 r10=fffff803326dbb10
r11=ffffdb004c3cae70 r12=ffffdb004c3cb210 r13=ffffdb004c3cafd0
r14=ffffa3826ef9c380 r15=fffff80341dd4189
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
dxgkrnl!DXGDEVICE::DestroyAllocations+0x4a3:
fffff803`3d31cb3b 488b8180020000 mov rax,qword ptr [rcx+280h] ds:002b:850fc085`4818440b=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffdb00`4c3caf00 fffff803`3d300abd : ffffdb00`4c3cb110 fffff803`3d2034bd 00000000`00000003 ffffa382`6d207de0 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4a3
ffffdb00`4c3cb0a0 fffff803`3d2fff6b : 00000000`001a0000 00000000`00000000 ffffa382`00000000 ffffa382`6ef9c380 : dxgkrnl!DXGDEVICE::TerminateAllocations+0x92d
ffffdb00`4c3cb140 fffff803`3d3011c8 : ffffde88`a3c78528 ffffdb00`4c3cb650 ffffffff`ffffffff ffffa382`6ea8c7a0 : dxgkrnl!DxgkDestroyAllocationInternal+0xefb
ffffdb00`4c3cb550 fffff803`3d3017eb : 000000d5`6518f6c0 000001f3`e57ec501 ffffde88`aafad080 fffff803`32aefbce : dxgkrnl!DxgkDestroyAllocationHelper+0x568
ffffdb00`4c3cba20 fffff803`32806bb8 : ffffde88`aafad080 ffffde88`aafad080 000001f3`e57ec5a0 ffffde88`00000000 : dxgkrnl!DxgkDestroyAllocation2+0x21b
ffffdb00`4c3cbb00 00007ffe`f92049c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d5`6518f628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f92049c4
SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyAllocations+4a3
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.631
STACK_COMMAND: .cxr 0xffffdb004c3ca500 ; kb
BUCKET_ID_FUNC_OFFSET: 4a3
FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!DXGDEVICE::DestroyAllocations
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ccc144cd-d714-261c-fcd3-8a2e39d89516}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffa207265831e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa20726583138, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25965
Key : Analysis.Memory.CommitPeak.Mb
Value: 109
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 2
BUGCHECK_P2: ffffa207265831e0
BUGCHECK_P3: ffffa20726583138
BUGCHECK_P4: 0
TRAP_FRAME: ffffa207265831e0 -- (.trap 0xffffa207265831e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800081d9fb5 rsp=ffffa20726583378 rbp=ffffa20726583509
r8=0000000000000002 r9=0000000000000000 r10=fffff80004c75490
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
storport!_report_gsfailure+0x5:
fffff800`081d9fb5 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffa20726583138 -- (.exr 0xffffa20726583138)
ExceptionAddress: fffff800081d9fb5 (storport!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffa207`26582eb8 fffff800`04e07169 : 00000000`00000139 00000000`00000002 ffffa207`265831e0 ffffa207`26583138 : nt!KeBugCheckEx
ffffa207`26582ec0 fffff800`04e07590 : ffffa207`26583038 ffffa207`26583140 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa207`26583000 fffff800`04e05923 : fffff800`04ca45d0 fffff800`04c2a0a3 ffff8d0a`3e15a5f0 ffffffff`ffffffff : nt!KiFastFailDispatch+0xd0
ffffa207`265831e0 fffff800`081d9fb5 : fffff800`081cb18f ffff8d0a`44b9d368 ffffffff`ffffffff 00020000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa207`26583378 fffff800`081cb18f : ffff8d0a`44b9d368 ffffffff`ffffffff 00020000`00000000 ffff8d0a`3e15c100 : storport!_report_gsfailure+0x5
ffffa207`26583380 fffff800`081caa44 : 00000000`00000028 00000000`40200342 ffffa207`265834e0 ffff8d0a`00000001 : storport!RaidInsertDeviceQueue+0x18f
ffffa207`26583440 fffff800`081ca4ec : 00000000`00000000 00000000`00000002 ffff8d0a`00000000 ffff8d0a`3e094101 : storport!RaidStartIoPacket+0x314
ffffa207`26583570 fffff800`081ca28a : ffff8d0a`44ef8550 0000000b`383ce000 000072f5`c1769748 fffff800`04ccd6c5 : storport!RaUnitScsiIrp+0x21c
ffffa207`26583610 fffff800`04ccd6c5 : 00000000`00000000 ffff8d0a`44b9d2f0 00000000`00000000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a
ffffa207`26583650 fffff800`082b5bf3 : ffff8d0a`3e8968b0 ffff8d0a`3e9312e0 00000000`00000000 ffff8d0a`44b9d2f0 : nt!IofCallDriver+0x55
ffffa207`26583690 fffff800`07bba976 : ffff8d0a`44b9d2f0 00000000`0000000f ffff8d0a`3e8968b0 000072f5`c1769748 : EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess+0x223
ffffa207`265836c0 fffff800`04ccd6c5 : 00000000`00000001 00000000`00000000 ffff8d0a`3e7c5c90 ffff8d0a`449b3730 : Wdf01000!FxDevice::DispatchWithLock+0x266 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1447]
ffffa207`26583720 fffff800`08f170ed : ffff8d0a`449b3730 00000000`00020000 ffff8d0a`3e921040 ffff8d0a`3e921040 : nt!IofCallDriver+0x55
ffffa207`26583760 fffff800`08f1660c : 00000000`00000000 00000000`00000000 00000000`00020000 fffff800`00000100 : CLASSPNP!SubmitTransferPacket+0x29d
ffffa207`265837b0 fffff800`08f1636b : ffff8d0a`449b3730 ffff8d0a`44ef8550 ffff8d0a`44ef8500 00000000`00000000 : CLASSPNP!ServiceTransferRequest+0x21c
ffffa207`26583840 fffff800`08f183e3 : 00000000`00000000 ffff8d0a`3e877a20 00000010`55754000 00000000`00989680 : CLASSPNP!ClassReadWrite+0x14b
ffffa207`26583890 fffff800`04ccd6c5 : ffff8d0a`3e8698a0 ffff8d0a`44ef8550 ffff8d0a`3e8aea20 00000000`00000000 : CLASSPNP!ClassGlobalDispatch+0x23
ffffa207`265838c0 fffff800`07fe39cb : 00000064`e7ccf2c2 00000000`00000000 00000000`00000000 3036382e`305b3a22 : nt!IofCallDriver+0x55
ffffa207`26583900 fffff800`07fe3cff : 00000001`00000001 00000065`d921e2e7 00000000`00000000 ffff8d0a`3e81e870 : partmgr!PmIo+0xeb
ffffa207`26583980 fffff800`04ccd6c5 : 00000000`00060403 ffffa207`26583c03 00000000`00000001 ffff8d0a`3bf02080 : partmgr!PmGlobalDispatch+0x1f
ffffa207`265839b0 fffff800`07fe3534 : ffffa207`26583cb0 00000000`00020000 fffff800`00000000 ffffa207`26583a30 : nt!IofCallDriver+0x55
ffffa207`265839f0 fffff800`07fe3cff : 00000000`00020000 ffff8d0a`44ef8818 ffffa207`26583c19 00000000`00000000 : partmgr!PartitionIo+0x1d4
ffffa207`26583aa0 fffff800`04ccd6c5 : ffffa207`26583c19 fffff800`07fe3c7d 00000064`e7ccf2c2 ffffa207`26583b10 : partmgr!PmGlobalDispatch+0x1f
ffffa207`26583ad0 fffff800`080d1109 : ffff8d0a`3e81e9c0 00000000`00000001 00000065`d921e2e6 ffff8d0a`3e81e870 : nt!IofCallDriver+0x55
ffffa207`26583b10 fffff800`04ccd6c5 : ffffa207`26583c19 ffff8d0a`3e95c180 00000000`00000002 00000000`00000000 : volmgr!VmReadWrite+0xf9
ffffa207`26583b50 fffff800`08ce4ece : ffff8d0a`3e95c180 ffffa207`26583c19 ffff8d0a`3e95c1b8 ffff8d0a`3e95c180 : nt!IofCallDriver+0x55
ffffa207`26583b90 fffff800`08ce4b77 : 00000000`00000000 ffffa207`26583d70 00000000`00000000 ffff8d0a`44ef8550 : fvevol!FveFilterRundownReadWrite+0x33e
ffffa207`26583c80 fffff800`04ccd6c5 : 00000000`00000004 ffff8d0a`44ef88f0 00000000`00000000 00000000`00000000 : fvevol!FveFilterRundownRead+0x27
ffffa207`26583cb0 fffff800`08eb3cb7 : ffff1146`c8a756bb ffff8d0a`44ef8550 00000000`00000004 ffffa207`25c30078 : nt!IofCallDriver+0x55
ffffa207`26583cf0 fffff800`08eb4fe5 : 00000000`00000002 ffffa207`25c2ff00 ffff8d0a`3e9199a0 ffff8d0a`44ef8550 : iorate!IoRateIssueAndRecordIo+0x7f
ffffa207`26583d30 fffff800`08eb519f : ffff8d0a`3e9561d0 ffff8d0a`3bf02080 00000000`005dd188 00000000`00000200 : iorate!IoRateProcessIrpWrapper+0x69
ffffa207`26583dc0 fffff800`04ccd6c5 : ffff8d0a`44461040 ffffa207`280e5f00 fffff800`08da1010 fffff800`04ccd6c5 : iorate!IoRateDispatchReadWrite+0x5f
ffffa207`26583e00 fffff800`08da1033 : ffff8d0a`3e91d4e0 fffff800`08db1a98 ffffa207`00000000 fffff800`08db115d : nt!IofCallDriver+0x55
ffffa207`26583e40 fffff800`04ccd6c5 : ffff8d0a`3e965190 fffff800`08dfacf8 00000000`00000018 00000000`074bbd88 : volume!VolumePassThrough+0x23
ffffa207`26583e70 fffff800`08db1230 : 00000000`00000000 ffffa207`25c2fb98 ffffa207`25c2f980 ffff8d0a`3bf02080 : nt!IofCallDriver+0x55
ffffa207`26583eb0 fffff800`08db11a9 : ffffa207`25c30078 00000000`00003fff ffffa207`25c2fa00 00000000`00000000 : volsnap!VolSnapReadFilter+0x70
ffffa207`26583ee0 fffff800`04ccd6c5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : volsnap!VolSnapRead+0x19
ffffa207`26583f10 fffff800`083cf9cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffa207`26583f50 fffff800`04df8aee : 00000000`00000000 00000000`074be160 00000000`074be218 00000000`075bf9c8 : Ntfs!NtfsStorageDriverCallout+0x1c
ffffa207`26583f80 fffff800`04df8aac : ffffa207`26583fd0 ffff8d0a`3bf02080 ffffa207`26584000 fffff800`04c0d7cd : nt!KxSwitchKernelStackCallout+0x2e
ffffa207`25c2fe60 fffff800`04c0d7cd : ffffa207`26583fd0 ffff8d0a`3bf02080 ffffa207`25c2ff00 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffffa207`25c2fe80 fffff800`04c0d5c2 : fffff800`083cf9b0 ffffa207`25c30078 ffffa207`00000002 ffff8d0a`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d
ffffa207`25c2ff20 fffff800`04c0d423 : ffffa207`25c30100 00000000`00000001 00000000`00000000 ffff8d0a`3e956080 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2
ffffa207`25c2ff90 fffff800`04c0d3dd : fffff800`083cf9b0 ffffa207`25c30078 ffff8d0a`44d81708 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x33
ffffa207`25c30000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
SYMBOL_NAME: EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess+223
MODULE_NAME: EhStorClass
IMAGE_NAME: EhStorClass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 223
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e4b56203-85f7-ffae-6cad-b785d917afb1}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80558423e53, Address of the instruction which caused the bugcheck
Arg3: ffffb20c1de4b520, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18130
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80558423e53
BUGCHECK_P3: ffffb20c1de4b520
BUGCHECK_P4: 0
CONTEXT: ffffb20c1de4b520 -- (.cxr 0xffffb20c1de4b520)
rax=0000000000000000 rbx=ffffaf84842e7950 rcx=ffffaf8480200200
rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffaf8480200100
rip=fffff80558423e53 rsp=ffffb20c1de4bf28 rbp=00000000ff80ffa0
r8=0000000000000000 r9=ffffaf84842e7950 r10=0000000000000000
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000030 r15=0000000079737355
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlpHpSegDescriptorValidate+0x13:
fffff805`58423e53 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SystemSettings.exe
STACK_TEXT:
ffffb20c`1de4bf28 fffff805`5878e459 : 00000000`00000000 ffff8d79`2b600000 ffffafb0`8925b6e0 00500030`8904f008 : nt!RtlpHpSegDescriptorValidate+0x13
ffffb20c`1de4bf30 fffff805`5878e387 : ffffaf84`80200100 ffffb20c`1de4cb80 ffffaf84`842e7950 ffffb20c`1de4cb80 : nt!RtlpHpSizeHeapInternal+0x89
ffffb20c`1de4bf80 fffff805`58667a7a : ffffaf84`80200100 00000000`11000000 ffffb20c`1de4cb80 ffffaf84`00000000 : nt!RtlpHpSizeHeap+0x5f
ffffb20c`1de4bfb0 fffff805`58bb1019 : 00000000`00000000 ffffb20c`1de4c001 ffffafb0`893c4410 01000000`00100000 : nt!ExFreeHeapPool+0x1a0b7a
ffffb20c`1de4c090 ffffafb0`893c4462 : 00000000`00000000 ffffaf84`84326010 00000000`00061cff ffffb387`8e162080 : nt!ExFreePool+0x9
ffffb20c`1de4c0c0 ffffafb0`89036707 : 00000000`00000000 ffffaf84`842e7960 ffffaf84`842e7960 ffffaf84`84326010 : win32kfull!Win32FreePoolImpl+0x52
ffffb20c`1de4c0f0 ffffafb0`89337f18 : 00000068`00000003 ffffaf84`84326010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
ffffb20c`1de4c120 ffffafb0`897c6fcf : ffffb387`8e162080 00000068`7a8ff610 ffffb387`ffffffff ffff700a`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
ffffb20c`1de4ca50 fffff805`58606bb8 : 00000000`00000000 00000000`00000000 00000000`000002d0 fffff805`58862c10 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
ffffb20c`1de4ca90 00007ff9`a094a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000068`7a8ff4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a094a104
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.630
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xffffb20c1de4b520 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000094, The exception code that was not handled
Arg2: fffff80046c69336, The address that the exception occurred at
Arg3: ffffb005d4fb0a30, Parameter 0 of the exception
Arg4: 000000000000005a, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32kbase.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6467
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17689
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000094
BUGCHECK_P2: fffff80046c69336
BUGCHECK_P3: ffffb005d4fb0a30
BUGCHECK_P4: 5a
EXCEPTION_PARAMETER1: ffffb005d4fb0a30
EXCEPTION_PARAMETER2: 000000000000005a
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WorldOfTanks.exe
TRAP_FRAME: 2b4c00000350b941 -- (.trap 0x2b4c00000350b941)
Unable to read trap frame at 2b4c0000`0350b941
BAD_STACK_POINTER: ffff8000e86f6158
STACK_TEXT:
ffff8000`e86f6158 fffff800`46ef451e : 00000000`0000001e ffffffff`c0000094 fffff800`46c69336 ffffb005`d4fb0a30 : nt!KeBugCheckEx
ffff8000`e86f6160 fffff800`46dfe0d2 : fffff800`46ef44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff8000`e86f61a0 fffff800`46c52db7 : ffff8000`e86f6710 00000000`00000000 fffff606`c3e4cfb0 fffff800`46dfc255 : nt!RtlpExecuteHandlerForException+0x12
ffff8000`e86f61d0 fffff800`46c519a6 : fffff606`c3e4c7b8 ffff8000`e86f6e20 fffff606`c3e4c7b8 00000000`00000064 : nt!RtlDispatchException+0x297
ffff8000`e86f68f0 fffff800`46df60a2 : 3b4840c0`83480018 0000006a`b8f472c1 2b4c0000`0350b941 48c8d349`ca8b4102 : nt!KiDispatchException+0x186
ffff8000`e86f6fb0 fffff800`46df6070 : fffff800`46e072a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff606`c3e4c678 fffff800`46e072a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff606`c3e4c680 fffff800`46dfff0a : 00000000`00000000 fffff800`571b2d6d 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff606`c3e4c860 fffff800`46c69336 : ffffb005`d44f4d3e fffff800`46c66afe ffffb005`d44f4cb0 00000000`00000000 : nt!KiDivideErrorFault+0x30a
fffff606`c3e4c9f0 fffff800`46c6915e : 00000621`3145f800 00000000`00000000 fffff800`476fc4e0 ffffb005`d8e46a20 : nt!PpmPerfSelectProcessorState+0x1a6
fffff606`c3e4cb10 fffff800`46d2f410 : ffff8000`e86d9240 fffff606`c3e4ce80 fffff606`c3e4ccb0 fffff606`c3e4ce80 : nt!PpmPerfSelectProcessorStates+0x5e
fffff606`c3e4cb40 fffff800`46ce535e : ffff8000`e86d9240 ffffb005`d1820000 00000000`00000000 ffffb005`00000002 : nt!PpmCheckRun+0x40
fffff606`c3e4cbb0 fffff800`46ce4644 : ffff8000`e86d6180 00000000`00000000 00000000`00000008 00000000`00011663 : nt!KiExecuteAllDpcs+0x30e
fffff606`c3e4cd20 fffff800`46dfc255 : 00000000`00000000 ffff8000`e86d6180 00000000`00000000 00000000`83eecbf0 : nt!KiRetireDpcList+0x1f4
fffff606`c3e4cfb0 fffff800`46dfc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff606`c5f4fad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffff97dbcaaa9740-ffff97dbcaaa9771 50 bytes - win32kbase!CInputThread::_CalledOnInputThread+18
[ 0f 94 c0 48 83 c4 20 5b:48 8b 02 49 3b 00 77 09 ]
ffff97dbcaaa977e-ffff97dbcaaa9786 9 bytes - win32kbase!CInputThread::InputThreadState::Init+2e (+0x3e)
[ 89 43 18 c7 03 01 00 00:74 66 83 ea 01 74 55 83 ]
ffff97dbcaaa9793-ffff97dbcaaa979b 9 bytes - win32kbase!CInputThread::InputThreadState::Init+43 (+0x15)
[ 48 85 c0 74 07 c7 40 30:00 8d 4a 58 eb 08 b8 40 ]
ffff97dbcaaa979e - win32kbase!CInputThread::InputThreadState::Init+4e (+0x0b)
[ 00:8d ]
ffff97dbcaaa97a0-ffff97dbcaaa97d6 55 bytes - win32kbase!CInputThread::InputThreadState::Init+50 (+0x02)
[ 83 c4 20 5b c3 cc cc cc:10 49 8d 14 0a 48 85 d2 ]
ffff97dbcaaa97d8-ffff97dbcaaa97e0 9 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+28 (+0x38)
[ e8 07 dd f8 ff 48 83 67:eb c7 b8 00 01 00 00 b9 ]
ffff97dbcaaa97e2-ffff97dbcaaa9834 83 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+32 (+0x0a)
[ 48 8b 5c 24 30 48 83 c4:00 00 eb bb b8 00 04 00 ]
ffff97dbcaaa9836-ffff97dbcaaa983f 10 bytes - win32kbase!W32PIDLOCK::vInit+16 (+0x54)
[ 61 0c 00 83 61 08 00 83:63 10 df b2 01 8a c2 48 ]
ffff97dbcaab2910-ffff97dbcaab2955 70 bytes - win32kbase!NtMITUpdateInputGlobals+1a0 (+0x90da)
[ c0 0f 84 81 00 00 00 f7:48 83 ec 28 48 8b ca e8 ]
ffff97dbcaab2962-ffff97dbcaab296c 11 bytes - win32kbase!NtMITUpdateInputGlobals+1f2 (+0x52)
[ 3c 01 0f 84 7a 8a 06 00:b5 9e 06 00 41 83 e8 01 ]
ffff97dbcaab2979-ffff97dbcaab298b 19 bytes - win32kbase!NtMITUpdateInputGlobals+209 (+0x17)
[ 48 8b 35 78 33 1a 00 48:00 41 83 f8 02 0f 85 3a ]
ffff97dbcaab2998-ffff97dbcaab299e 7 bytes - win32kbase!NtMITUpdateInputGlobals+228 (+0x1f)
[ 48 8b 35 51 4d 1a 00:00 c6 00 01 0f ba 69 ]
ffff97dbcaab29ab-ffff97dbcaab29af 5 bytes - win32kbase!NtMITUpdateInputGlobals+23b (+0x13)
[ 33 d2 48 8b ce:c0 e8 03 24 01 ]
ffff97dbcaab29c8-ffff97dbcaab29d2 11 bytes - win32kbase!NtMITUpdateInputGlobals+258 (+0x1d)
[ 8b 5e 28 33 d2 48 8b ce:c6 00 01 41 0f ba 6a 10 ]
ffff97dbcaab29eb-ffff97dbcaab2a0f 37 bytes - win32kbase!NtMITUpdateInputGlobals+27b (+0x23)
[ 3b fb 75 32 41 8b cd e8:e1 ef eb cb cc cc cc cc ]
ffff97dbcaab4781-ffff97dbcaab4799 25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+a9 (+0x1d96)
[ 8b 5c 24 50 48 8b 74 24:83 ec 28 8b ca 45 33 c0 ]
ffff97dbcaab479b-ffff97dbcaab47b3 25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+c3 (+0x1a)
[ b8 bb 00 00 c0 eb 9b cc:cc cc cc cc cc 48 8b c4 ]
ffff97dbcaab47b5-ffff97dbcaab47f5 65 bytes - win32kbase!DirectComposition::CSharedInteractionMarshaler::OpenSharedHandle+5 (+0x1a)
[ 8b 89 50 01 00 00 48 85:21 58 20 0f 57 c0 0f 11 ]
ffff97dbcaab47f8-ffff97dbcaab47fb 4 bytes - win32kbase!PostPlaySoundMessage+c (+0x43)
[ 85 c0 74 0c:89 44 24 58 ]
ffff97dbcaab4802-ffff97dbcaab480a 9 bytes - win32kbase!PostPlaySoundMessage+16 (+0x0a)
[ 48 83 c4 28 c3 cc b8 bb:ca 72 0c 48 8b 05 1c 8b ]
ffff97dbcaab480c-ffff97dbcaab4865 90 bytes - win32kbase!PostPlaySoundMessage+20 (+0x0a)
[ c0 eb f3 cc cc cc cc cc:48 3b 08 76 1e 48 8b 05 ]
ffff97dbcaab4872-ffff97dbcaab4876 5 bytes - win32kbase!CSpatialProcessor::CheckAndSendPointerPositionEffectsUpdate+3a (+0x66)
[ 33 d2 48 8b ce:20 e8 24 1a 00 ]
609 errors : !win32kbase (ffff97dbcaaa9740-ffff97dbcaab4876)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
Sorunun bellekle ilgili gibi. XMP kapatıp dener misin bir süre?
Kod:UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind. that the kernel isn't allowed to have/catch (bound trap) or that. is always instant death (double fault). The first number in the. bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these. traps are. Here is a *portion* of those codes: If kv shows a taskGate. use .tss on the part before the colon, then kv. Else if kv shows a trapframe. use .trap on that value. Else. .trap on the appropriate frame will show where the trap was taken. (on x86, this will be the ebp that goes with the procedure KiTrap) Endif. kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT. Arg2: ffffcb8162686e70. Arg3: 0000000006e01083. Arg4: fffff8007c206e34. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 8077. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-KTSBH2V. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 130633. Key : Analysis.Memory.CommitPeak.Mb. Value: 77. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 7f. BUGCHECK_P1: 8. BUGCHECK_P2: ffffcb8162686e70. BUGCHECK_P3: 6e01083. BUGCHECK_P4: fffff8007c206e34. TRAP_FRAME: ffffcb8162686e70 -- (.trap 0xffffcb8162686e70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=000001b832f33c18. rdx=00000000000002d0 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8007c206e34 rsp=0000000006e01083 rbp=0000000000000002. r8=ffffbb86b2835c10 r9=ffffcb816259d180 r10=ffffbb86a8124b60. r11=ffffbb86b224f080 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl zr na po nc. nt!KiSystemServiceExit+0x274: fffff800`7c206e34 c3 ret. Resetting default scope. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: chrome.exe. BAD_STACK_POINTER: 0000000006e01083. UNALIGNED_STACK_POINTER: 0000000006e01083. STACK_TEXT: ffffcb81`62686d28 fffff800`7c207169 : 00000000`0000007f 00000000`00000008 ffffcb81`62686e70 00000000`06e01083 : nt!KeBugCheckEx. ffffcb81`62686d30 fffff800`7c201f83 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69. ffffcb81`62686e70 fffff800`7c206e34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3. 00000000`06e01083 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x274. SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.19041.630. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 2c3. FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff8033d31cb3b, Address of the instruction which caused the bugcheck. Arg3: ffffdb004c3ca500, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 5827. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-KTSBH2V. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 122910. Key : Analysis.Memory.CommitPeak.Mb. Value: 84. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff8033d31cb3b. BUGCHECK_P3: ffffdb004c3ca500. BUGCHECK_P4: 0. CONTEXT: ffffdb004c3ca500 -- (.cxr 0xffffdb004c3ca500) rax=ffffde88aafad080 rbx=0000000000000003 rcx=850fc0854818418b. rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000001. rip=fffff8033d31cb3b rsp=ffffdb004c3caf00 rbp=ffffdb004c3cb000. r8=0000000000000000 r9=0000000000000003 r10=fffff803326dbb10. r11=ffffdb004c3cae70 r12=ffffdb004c3cb210 r13=ffffdb004c3cafd0. r14=ffffa3826ef9c380 r15=fffff80341dd4189. iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246. dxgkrnl!DXGDEVICE::DestroyAllocations+0x4a3: fffff803`3d31cb3b 488b8180020000 mov rax,qword ptr [rcx+280h] ds:002b:850fc085`4818440b=???????????????? Resetting default scope. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: chrome.exe. STACK_TEXT: ffffdb00`4c3caf00 fffff803`3d300abd : ffffdb00`4c3cb110 fffff803`3d2034bd 00000000`00000003 ffffa382`6d207de0 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4a3. ffffdb00`4c3cb0a0 fffff803`3d2fff6b : 00000000`001a0000 00000000`00000000 ffffa382`00000000 ffffa382`6ef9c380 : dxgkrnl!DXGDEVICE::TerminateAllocations+0x92d. ffffdb00`4c3cb140 fffff803`3d3011c8 : ffffde88`a3c78528 ffffdb00`4c3cb650 ffffffff`ffffffff ffffa382`6ea8c7a0 : dxgkrnl!DxgkDestroyAllocationInternal+0xefb. ffffdb00`4c3cb550 fffff803`3d3017eb : 000000d5`6518f6c0 000001f3`e57ec501 ffffde88`aafad080 fffff803`32aefbce : dxgkrnl!DxgkDestroyAllocationHelper+0x568. ffffdb00`4c3cba20 fffff803`32806bb8 : ffffde88`aafad080 ffffde88`aafad080 000001f3`e57ec5a0 ffffde88`00000000 : dxgkrnl!DxgkDestroyAllocation2+0x21b. ffffdb00`4c3cbb00 00007ffe`f92049c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 000000d5`6518f628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f92049c4. SYMBOL_NAME: dxgkrnl!DXGDEVICE::DestroyAllocations+4a3. MODULE_NAME: dxgkrnl. IMAGE_NAME: dxgkrnl.sys. IMAGE_VERSION: 10.0.19041.631. STACK_COMMAND: .cxr 0xffffdb004c3ca500 ; kb. BUCKET_ID_FUNC_OFFSET: 4a3. FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!DXGDEVICE::DestroyAllocations. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {ccc144cd-d714-261c-fcd3-8a2e39d89516} Followup: MachineOwner. --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption. could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based. buffer overrun. Arg2: ffffa207265831e0, Address of the trap frame for the exception that caused the bugcheck. Arg3: ffffa20726583138, Address of the exception record for the exception that caused the bugcheck. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 5905. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-KTSBH2V. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 25965. Key : Analysis.Memory.CommitPeak.Mb. Value: 109. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 139. BUGCHECK_P1: 2. BUGCHECK_P2: ffffa207265831e0. BUGCHECK_P3: ffffa20726583138. BUGCHECK_P4: 0. TRAP_FRAME: ffffa207265831e0 -- (.trap 0xffffa207265831e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff800081d9fb5 rsp=ffffa20726583378 rbp=ffffa20726583509. r8=0000000000000002 r9=0000000000000000 r10=fffff80004c75490. r11=0000000000000002 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei ng nz ac pe nc. storport!_report_gsfailure+0x5: fffff800`081d9fb5 cd29 int 29h. Resetting default scope. EXCEPTION_RECORD: ffffa20726583138 -- (.exr 0xffffa20726583138) ExceptionAddress: fffff800081d9fb5 (storport!_report_gsfailure+0x0000000000000005) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001. NumberParameters: 1. Parameter[0]: 0000000000000002. Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. WATSON_BKT_EVENT: BEX. ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409. EXCEPTION_PARAMETER1: 0000000000000002. EXCEPTION_STR: 0xc0000409. STACK_TEXT: ffffa207`26582eb8 fffff800`04e07169 : 00000000`00000139 00000000`00000002 ffffa207`265831e0 ffffa207`26583138 : nt!KeBugCheckEx. ffffa207`26582ec0 fffff800`04e07590 : ffffa207`26583038 ffffa207`26583140 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69. ffffa207`26583000 fffff800`04e05923 : fffff800`04ca45d0 fffff800`04c2a0a3 ffff8d0a`3e15a5f0 ffffffff`ffffffff : nt!KiFastFailDispatch+0xd0. ffffa207`265831e0 fffff800`081d9fb5 : fffff800`081cb18f ffff8d0a`44b9d368 ffffffff`ffffffff 00020000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323. ffffa207`26583378 fffff800`081cb18f : ffff8d0a`44b9d368 ffffffff`ffffffff 00020000`00000000 ffff8d0a`3e15c100 : storport!_report_gsfailure+0x5. ffffa207`26583380 fffff800`081caa44 : 00000000`00000028 00000000`40200342 ffffa207`265834e0 ffff8d0a`00000001 : storport!RaidInsertDeviceQueue+0x18f. ffffa207`26583440 fffff800`081ca4ec : 00000000`00000000 00000000`00000002 ffff8d0a`00000000 ffff8d0a`3e094101 : storport!RaidStartIoPacket+0x314. ffffa207`26583570 fffff800`081ca28a : ffff8d0a`44ef8550 0000000b`383ce000 000072f5`c1769748 fffff800`04ccd6c5 : storport!RaUnitScsiIrp+0x21c. ffffa207`26583610 fffff800`04ccd6c5 : 00000000`00000000 ffff8d0a`44b9d2f0 00000000`00000000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a. ffffa207`26583650 fffff800`082b5bf3 : ffff8d0a`3e8968b0 ffff8d0a`3e9312e0 00000000`00000000 ffff8d0a`44b9d2f0 : nt!IofCallDriver+0x55. ffffa207`26583690 fffff800`07bba976 : ffff8d0a`44b9d2f0 00000000`0000000f ffff8d0a`3e8968b0 000072f5`c1769748 : EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess+0x223. ffffa207`265836c0 fffff800`04ccd6c5 : 00000000`00000001 00000000`00000000 ffff8d0a`3e7c5c90 ffff8d0a`449b3730 : Wdf01000!FxDevice::DispatchWithLock+0x266 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1447] ffffa207`26583720 fffff800`08f170ed : ffff8d0a`449b3730 00000000`00020000 ffff8d0a`3e921040 ffff8d0a`3e921040 : nt!IofCallDriver+0x55. ffffa207`26583760 fffff800`08f1660c : 00000000`00000000 00000000`00000000 00000000`00020000 fffff800`00000100 : CLASSPNP!SubmitTransferPacket+0x29d. ffffa207`265837b0 fffff800`08f1636b : ffff8d0a`449b3730 ffff8d0a`44ef8550 ffff8d0a`44ef8500 00000000`00000000 : CLASSPNP!ServiceTransferRequest+0x21c. ffffa207`26583840 fffff800`08f183e3 : 00000000`00000000 ffff8d0a`3e877a20 00000010`55754000 00000000`00989680 : CLASSPNP!ClassReadWrite+0x14b. ffffa207`26583890 fffff800`04ccd6c5 : ffff8d0a`3e8698a0 ffff8d0a`44ef8550 ffff8d0a`3e8aea20 00000000`00000000 : CLASSPNP!ClassGlobalDispatch+0x23. ffffa207`265838c0 fffff800`07fe39cb : 00000064`e7ccf2c2 00000000`00000000 00000000`00000000 3036382e`305b3a22 : nt!IofCallDriver+0x55. ffffa207`26583900 fffff800`07fe3cff : 00000001`00000001 00000065`d921e2e7 00000000`00000000 ffff8d0a`3e81e870 : partmgr!PmIo+0xeb. ffffa207`26583980 fffff800`04ccd6c5 : 00000000`00060403 ffffa207`26583c03 00000000`00000001 ffff8d0a`3bf02080 : partmgr!PmGlobalDispatch+0x1f. ffffa207`265839b0 fffff800`07fe3534 : ffffa207`26583cb0 00000000`00020000 fffff800`00000000 ffffa207`26583a30 : nt!IofCallDriver+0x55. ffffa207`265839f0 fffff800`07fe3cff : 00000000`00020000 ffff8d0a`44ef8818 ffffa207`26583c19 00000000`00000000 : partmgr!PartitionIo+0x1d4. ffffa207`26583aa0 fffff800`04ccd6c5 : ffffa207`26583c19 fffff800`07fe3c7d 00000064`e7ccf2c2 ffffa207`26583b10 : partmgr!PmGlobalDispatch+0x1f. ffffa207`26583ad0 fffff800`080d1109 : ffff8d0a`3e81e9c0 00000000`00000001 00000065`d921e2e6 ffff8d0a`3e81e870 : nt!IofCallDriver+0x55. ffffa207`26583b10 fffff800`04ccd6c5 : ffffa207`26583c19 ffff8d0a`3e95c180 00000000`00000002 00000000`00000000 : volmgr!VmReadWrite+0xf9. ffffa207`26583b50 fffff800`08ce4ece : ffff8d0a`3e95c180 ffffa207`26583c19 ffff8d0a`3e95c1b8 ffff8d0a`3e95c180 : nt!IofCallDriver+0x55. ffffa207`26583b90 fffff800`08ce4b77 : 00000000`00000000 ffffa207`26583d70 00000000`00000000 ffff8d0a`44ef8550 : fvevol!FveFilterRundownReadWrite+0x33e. ffffa207`26583c80 fffff800`04ccd6c5 : 00000000`00000004 ffff8d0a`44ef88f0 00000000`00000000 00000000`00000000 : fvevol!FveFilterRundownRead+0x27. ffffa207`26583cb0 fffff800`08eb3cb7 : ffff1146`c8a756bb ffff8d0a`44ef8550 00000000`00000004 ffffa207`25c30078 : nt!IofCallDriver+0x55. ffffa207`26583cf0 fffff800`08eb4fe5 : 00000000`00000002 ffffa207`25c2ff00 ffff8d0a`3e9199a0 ffff8d0a`44ef8550 : iorate!IoRateIssueAndRecordIo+0x7f. ffffa207`26583d30 fffff800`08eb519f : ffff8d0a`3e9561d0 ffff8d0a`3bf02080 00000000`005dd188 00000000`00000200 : iorate!IoRateProcessIrpWrapper+0x69. ffffa207`26583dc0 fffff800`04ccd6c5 : ffff8d0a`44461040 ffffa207`280e5f00 fffff800`08da1010 fffff800`04ccd6c5 : iorate!IoRateDispatchReadWrite+0x5f. ffffa207`26583e00 fffff800`08da1033 : ffff8d0a`3e91d4e0 fffff800`08db1a98 ffffa207`00000000 fffff800`08db115d : nt!IofCallDriver+0x55. ffffa207`26583e40 fffff800`04ccd6c5 : ffff8d0a`3e965190 fffff800`08dfacf8 00000000`00000018 00000000`074bbd88 : volume!VolumePassThrough+0x23. ffffa207`26583e70 fffff800`08db1230 : 00000000`00000000 ffffa207`25c2fb98 ffffa207`25c2f980 ffff8d0a`3bf02080 : nt!IofCallDriver+0x55. ffffa207`26583eb0 fffff800`08db11a9 : ffffa207`25c30078 00000000`00003fff ffffa207`25c2fa00 00000000`00000000 : volsnap!VolSnapReadFilter+0x70. ffffa207`26583ee0 fffff800`04ccd6c5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : volsnap!VolSnapRead+0x19. ffffa207`26583f10 fffff800`083cf9cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55. ffffa207`26583f50 fffff800`04df8aee : 00000000`00000000 00000000`074be160 00000000`074be218 00000000`075bf9c8 : Ntfs!NtfsStorageDriverCallout+0x1c. ffffa207`26583f80 fffff800`04df8aac : ffffa207`26583fd0 ffff8d0a`3bf02080 ffffa207`26584000 fffff800`04c0d7cd : nt!KxSwitchKernelStackCallout+0x2e. ffffa207`25c2fe60 fffff800`04c0d7cd : ffffa207`26583fd0 ffff8d0a`3bf02080 ffffa207`25c2ff00 00000000`00000000 : nt!KiSwitchKernelStackContinue. ffffa207`25c2fe80 fffff800`04c0d5c2 : fffff800`083cf9b0 ffffa207`25c30078 ffffa207`00000002 ffff8d0a`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d. ffffa207`25c2ff20 fffff800`04c0d423 : ffffa207`25c30100 00000000`00000001 00000000`00000000 ffff8d0a`3e956080 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2. ffffa207`25c2ff90 fffff800`04c0d3dd : fffff800`083cf9b0 ffffa207`25c30078 ffff8d0a`44d81708 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x33. ffffa207`25c30000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d. SYMBOL_NAME: EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess+223. MODULE_NAME: EhStorClass. IMAGE_NAME: EhStorClass.sys. IMAGE_VERSION: 10.0.19041.1030. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 223. FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_EhStorClass!FilterDeviceEvtWdmIoctlIrpPreprocess. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {e4b56203-85f7-ffae-6cad-b785d917afb1} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff80558423e53, Address of the instruction which caused the bugcheck. Arg3: ffffb20c1de4b520, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 4140. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-KTSBH2V. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 18130. Key : Analysis.Memory.CommitPeak.Mb. Value: 94. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff80558423e53. BUGCHECK_P3: ffffb20c1de4b520. BUGCHECK_P4: 0. CONTEXT: ffffb20c1de4b520 -- (.cxr 0xffffb20c1de4b520) rax=0000000000000000 rbx=ffffaf84842e7950 rcx=ffffaf8480200200. rdx=a2e64eada2e64ead rsi=0000000000000000 rdi=ffffaf8480200100. rip=fffff80558423e53 rsp=ffffb20c1de4bf28 rbp=00000000ff80ffa0. r8=0000000000000000 r9=ffffaf84842e7950 r10=0000000000000000. r11=00000000000000ff r12=000000000000002b r13=00000000000000a9. r14=0000000000000030 r15=0000000079737355. iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246. nt!RtlpHpSegDescriptorValidate+0x13: fffff805`58423e53 498b4010 mov rax,qword ptr [r8+10h] ds:002b:00000000`00000010=???????????????? Resetting default scope. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: SystemSettings.exe. STACK_TEXT: ffffb20c`1de4bf28 fffff805`5878e459 : 00000000`00000000 ffff8d79`2b600000 ffffafb0`8925b6e0 00500030`8904f008 : nt!RtlpHpSegDescriptorValidate+0x13. ffffb20c`1de4bf30 fffff805`5878e387 : ffffaf84`80200100 ffffb20c`1de4cb80 ffffaf84`842e7950 ffffb20c`1de4cb80 : nt!RtlpHpSizeHeapInternal+0x89. ffffb20c`1de4bf80 fffff805`58667a7a : ffffaf84`80200100 00000000`11000000 ffffb20c`1de4cb80 ffffaf84`00000000 : nt!RtlpHpSizeHeap+0x5f. ffffb20c`1de4bfb0 fffff805`58bb1019 : 00000000`00000000 ffffb20c`1de4c001 ffffafb0`893c4410 01000000`00100000 : nt!ExFreeHeapPool+0x1a0b7a. ffffb20c`1de4c090 ffffafb0`893c4462 : 00000000`00000000 ffffaf84`84326010 00000000`00061cff ffffb387`8e162080 : nt!ExFreePool+0x9. ffffb20c`1de4c0c0 ffffafb0`89036707 : 00000000`00000000 ffffaf84`842e7960 ffffaf84`842e7960 ffffaf84`84326010 : win32kfull!Win32FreePoolImpl+0x52. ffffb20c`1de4c0f0 ffffafb0`89337f18 : 00000068`00000003 ffffaf84`84326010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37. ffffb20c`1de4c120 ffffafb0`897c6fcf : ffffb387`8e162080 00000068`7a8ff610 ffffb387`ffffffff ffff700a`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508. ffffb20c`1de4ca50 fffff805`58606bb8 : 00000000`00000000 00000000`00000000 00000000`000002d0 fffff805`58862c10 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f. ffffb20c`1de4ca90 00007ff9`a094a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 00000068`7a8ff4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a094a104. SYMBOL_NAME: nt!ExFreePool+9. IMAGE_NAME: Pool_Corruption. IMAGE_VERSION: 10.0.19041.630. MODULE_NAME: Pool_Corruption. STACK_COMMAND: .cxr 0xffffb20c1de4b520 ; kb. BUCKET_ID_FUNC_OFFSET: 9. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064} Followup: Pool_corruption. --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000094, The exception code that was not handled. Arg2: fffff80046c69336, The address that the exception occurred at. Arg3: ffffb005d4fb0a30, Parameter 0 of the exception. Arg4: 000000000000005a, Parameter 1 of the exception. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32kbase.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 6467. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-KTSBH2V. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 17689. Key : Analysis.Memory.CommitPeak.Mb. Value: 79. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 1e. BUGCHECK_P1: ffffffffc0000094. BUGCHECK_P2: fffff80046c69336. BUGCHECK_P3: ffffb005d4fb0a30. BUGCHECK_P4: 5a. EXCEPTION_PARAMETER1: ffffb005d4fb0a30. EXCEPTION_PARAMETER2: 000000000000005a. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: WorldOfTanks.exe. TRAP_FRAME: 2b4c00000350b941 -- (.trap 0x2b4c00000350b941) Unable to read trap frame at 2b4c0000`0350b941. BAD_STACK_POINTER: ffff8000e86f6158. STACK_TEXT: ffff8000`e86f6158 fffff800`46ef451e : 00000000`0000001e ffffffff`c0000094 fffff800`46c69336 ffffb005`d4fb0a30 : nt!KeBugCheckEx. ffff8000`e86f6160 fffff800`46dfe0d2 : fffff800`46ef44fc 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22. ffff8000`e86f61a0 fffff800`46c52db7 : ffff8000`e86f6710 00000000`00000000 fffff606`c3e4cfb0 fffff800`46dfc255 : nt!RtlpExecuteHandlerForException+0x12. ffff8000`e86f61d0 fffff800`46c519a6 : fffff606`c3e4c7b8 ffff8000`e86f6e20 fffff606`c3e4c7b8 00000000`00000064 : nt!RtlDispatchException+0x297. ffff8000`e86f68f0 fffff800`46df60a2 : 3b4840c0`83480018 0000006a`b8f472c1 2b4c0000`0350b941 48c8d349`ca8b4102 : nt!KiDispatchException+0x186. ffff8000`e86f6fb0 fffff800`46df6070 : fffff800`46e072a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12. fffff606`c3e4c678 fffff800`46e072a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue. fffff606`c3e4c680 fffff800`46dfff0a : 00000000`00000000 fffff800`571b2d6d 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125. fffff606`c3e4c860 fffff800`46c69336 : ffffb005`d44f4d3e fffff800`46c66afe ffffb005`d44f4cb0 00000000`00000000 : nt!KiDivideErrorFault+0x30a. fffff606`c3e4c9f0 fffff800`46c6915e : 00000621`3145f800 00000000`00000000 fffff800`476fc4e0 ffffb005`d8e46a20 : nt!PpmPerfSelectProcessorState+0x1a6. fffff606`c3e4cb10 fffff800`46d2f410 : ffff8000`e86d9240 fffff606`c3e4ce80 fffff606`c3e4ccb0 fffff606`c3e4ce80 : nt!PpmPerfSelectProcessorStates+0x5e. fffff606`c3e4cb40 fffff800`46ce535e : ffff8000`e86d9240 ffffb005`d1820000 00000000`00000000 ffffb005`00000002 : nt!PpmCheckRun+0x40. fffff606`c3e4cbb0 fffff800`46ce4644 : ffff8000`e86d6180 00000000`00000000 00000000`00000008 00000000`00011663 : nt!KiExecuteAllDpcs+0x30e. fffff606`c3e4cd20 fffff800`46dfc255 : 00000000`00000000 ffff8000`e86d6180 00000000`00000000 00000000`83eecbf0 : nt!KiRetireDpcList+0x1f4. fffff606`c3e4cfb0 fffff800`46dfc040 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5. fffff606`c5f4fad0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue. CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase. ffff97dbcaaa9740-ffff97dbcaaa9771 50 bytes - win32kbase!CInputThread::_CalledOnInputThread+18. [ 0f 94 c0 48 83 c4 20 5b:48 8b 02 49 3b 00 77 09 ] ffff97dbcaaa977e-ffff97dbcaaa9786 9 bytes - win32kbase!CInputThread::InputThreadState::Init+2e (+0x3e) [ 89 43 18 c7 03 01 00 00:74 66 83 ea 01 74 55 83 ] ffff97dbcaaa9793-ffff97dbcaaa979b 9 bytes - win32kbase!CInputThread::InputThreadState::Init+43 (+0x15) [ 48 85 c0 74 07 c7 40 30:00 8d 4a 58 eb 08 b8 40 ] ffff97dbcaaa979e - win32kbase!CInputThread::InputThreadState::Init+4e (+0x0b) [ 00:8d ] ffff97dbcaaa97a0-ffff97dbcaaa97d6 55 bytes - win32kbase!CInputThread::InputThreadState::Init+50 (+0x02) [ 83 c4 20 5b c3 cc cc cc:10 49 8d 14 0a 48 85 d2 ] ffff97dbcaaa97d8-ffff97dbcaaa97e0 9 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+28 (+0x38) [ e8 07 dd f8 ff 48 83 67:eb c7 b8 00 01 00 00 b9 ] ffff97dbcaaa97e2-ffff97dbcaaa9834 83 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+32 (+0x0a) [ 48 8b 5c 24 30 48 83 c4:00 00 eb bb b8 00 04 00 ] ffff97dbcaaa9836-ffff97dbcaaa983f 10 bytes - win32kbase!W32PIDLOCK::vInit+16 (+0x54) [ 61 0c 00 83 61 08 00 83:63 10 df b2 01 8a c2 48 ] ffff97dbcaab2910-ffff97dbcaab2955 70 bytes - win32kbase!NtMITUpdateInputGlobals+1a0 (+0x90da) [ c0 0f 84 81 00 00 00 f7:48 83 ec 28 48 8b ca e8 ] ffff97dbcaab2962-ffff97dbcaab296c 11 bytes - win32kbase!NtMITUpdateInputGlobals+1f2 (+0x52) [ 3c 01 0f 84 7a 8a 06 00:b5 9e 06 00 41 83 e8 01 ] ffff97dbcaab2979-ffff97dbcaab298b 19 bytes - win32kbase!NtMITUpdateInputGlobals+209 (+0x17) [ 48 8b 35 78 33 1a 00 48:00 41 83 f8 02 0f 85 3a ] ffff97dbcaab2998-ffff97dbcaab299e 7 bytes - win32kbase!NtMITUpdateInputGlobals+228 (+0x1f) [ 48 8b 35 51 4d 1a 00:00 c6 00 01 0f ba 69 ] ffff97dbcaab29ab-ffff97dbcaab29af 5 bytes - win32kbase!NtMITUpdateInputGlobals+23b (+0x13) [ 33 d2 48 8b ce:c0 e8 03 24 01 ] ffff97dbcaab29c8-ffff97dbcaab29d2 11 bytes - win32kbase!NtMITUpdateInputGlobals+258 (+0x1d) [ 8b 5e 28 33 d2 48 8b ce:c6 00 01 41 0f ba 6a 10 ] ffff97dbcaab29eb-ffff97dbcaab2a0f 37 bytes - win32kbase!NtMITUpdateInputGlobals+27b (+0x23) [ 3b fb 75 32 41 8b cd e8:e1 ef eb cb cc cc cc cc ] ffff97dbcaab4781-ffff97dbcaab4799 25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+a9 (+0x1d96) [ 8b 5c 24 50 48 8b 74 24:83 ec 28 8b ca 45 33 c0 ] ffff97dbcaab479b-ffff97dbcaab47b3 25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+c3 (+0x1a) [ b8 bb 00 00 c0 eb 9b cc:cc cc cc cc cc 48 8b c4 ] ffff97dbcaab47b5-ffff97dbcaab47f5 65 bytes - win32kbase!DirectComposition::CSharedInteractionMarshaler::OpenSharedHandle+5 (+0x1a) [ 8b 89 50 01 00 00 48 85:21 58 20 0f 57 c0 0f 11 ] ffff97dbcaab47f8-ffff97dbcaab47fb 4 bytes - win32kbase!PostPlaySoundMessage+c (+0x43) [ 85 c0 74 0c:89 44 24 58 ] ffff97dbcaab4802-ffff97dbcaab480a 9 bytes - win32kbase!PostPlaySoundMessage+16 (+0x0a) [ 48 83 c4 28 c3 cc b8 bb:ca 72 0c 48 8b 05 1c 8b ] ffff97dbcaab480c-ffff97dbcaab4865 90 bytes - win32kbase!PostPlaySoundMessage+20 (+0x0a) [ c0 eb f3 cc cc cc cc cc:48 3b 08 76 1e 48 8b 05 ] ffff97dbcaab4872-ffff97dbcaab4876 5 bytes - win32kbase!CSpatialProcessor::CheckAndSendPointerPositionEffectsUpdate+3a (+0x66) [ 33 d2 48 8b ce:20 e8 24 1a 00 ] 609 errors : !win32kbase (ffff97dbcaaa9740-ffff97dbcaab4876) MODULE_NAME: memory_corruption. IMAGE_NAME: memory_corruption. MEMORY_CORRUPTOR: LARGE. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption. ---------
Ben ekran kartı veya bir ihtiml PSU'dan olduğunu düşünüyorum. Son durumdan haberdar edin.
Mümkünse dediğim parçaları özellikle ekran kartını kontrol ettirirsen iyi olur.