burak_erdgnnn
Centipat
- Katılım
- 27 Ekim 2020
- Mesajlar
- 4
Daha fazla
- Cinsiyet
- Erkek
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd80560b484a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd80560b483f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7609
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 30267
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd80560b484a0
BUGCHECK_P3: ffffd80560b483f8
BUGCHECK_P4: 0
TRAP_FRAME: ffffd80560b484a0 -- (.trap 0xffffd80560b484a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800d3fac34d8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045ba5ac39 rsp=ffffd80560b48630 rbp=ffff800d3f178cf8
r8=ffff800d32f4f080 r9=ffff800d3f178d00 r10=0000000000000002
r11=ffff96fc85200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
dxgmms2!VidSchWaitForSingleSyncObject+0x13de9:
fffff804`5ba5ac39 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd80560b483f8 -- (.exr 0xffffd80560b483f8)
ExceptionAddress: fffff8045ba5ac39 (dxgmms2!VidSchWaitForSingleSyncObject+0x0000000000013de9)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd805`60b48178 fffff804`50006569 : 00000000`00000139 00000000`00000003 ffffd805`60b484a0 ffffd805`60b483f8 : nt!KeBugCheckEx
ffffd805`60b48180 fffff804`50006990 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`4fedcaf0 : nt!KiBugCheckDispatch+0x69
ffffd805`60b482c0 fffff804`50004d23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd805`60b484a0 fffff804`5ba5ac39 : ffff800d`3f5cda70 ffffbe03`00000001 ffff800d`39b32000 00000000`00000abe : nt!KiRaiseSecurityCheckFailure+0x323
ffffd805`60b48630 fffff804`5af3a4e1 : 00000000`00000abe 00000000`00000000 ffffbe03`f8e70da0 ffffffff`ffffff68 : dxgmms2!VidSchWaitForSingleSyncObject+0x13de9
ffffd805`60b486f0 fffff804`5af3afb6 : ffff800d`3e5ee180 00000000`00000004 00000000`00000000 00000000`00000000 : dxgkrnl!WaitForSynchronizationObjectFromGpu+0x651
ffffd805`60b48990 fffff804`5af39e76 : 00000000`00000001 00000000`00000000 ffffd805`60b48b08 00000000`00000000 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpuInternal+0x3f6
ffffd805`60b48ac0 fffff804`50005fb8 : ffff800d`3e5ee180 ffff800d`3c1c1060 00000000`00000000 ffffd805`60b48b80 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpu+0x16
ffffd805`60b48b00 00007ffd`22675ca4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e5`151ff6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`22675ca4
SYMBOL_NAME: dxgmms2!VidSchWaitForSingleSyncObject+13de9
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 13de9
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchWaitForSingleSyncObject
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b7e36f41-8c28-15a4-b4d1-c1c5a5e82d74}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8026d6123a4, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff8026c59c65b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5655
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6602
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff8026d6123a4
BUGCHECK_P2: 3
BUGCHECK_P3: fffff8026c59c65b
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff8026e2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8026d6123a4
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffbb8c7fde89a0 -- (.trap 0xffffbb8c7fde89a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8026c5d0d40 rbx=0000000000000000 rcx=ffffbb8c7fde8b30
rdx=ffffbb8c898f5d98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026c59c65b rsp=ffffbb8c7fde8b38 rbp=ffffbb8c7fde8d40
r8=fffff8026d6123a4 r9=fffff8026c580000 r10=0000fffff8026c5d
r11=ffff727b61600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
msrpc!NdrpComputeConformance+0x7:
fffff802`6c59c65b 6c ins byte ptr [rdi],dx ds:00000000`00000000=??
Resetting default scope
BAD_STACK_POINTER: ffffbb8c7fde86f8
STACK_TEXT:
ffffbb8c`7fde86f8 fffff802`6da79b57 : 00000000`00000050 fffff802`6d6123a4 00000000`00000003 ffffbb8c`7fde89a0 : nt!KeBugCheckEx
ffffbb8c`7fde8700 fffff802`6d8ea5e0 : 00000000`00000000 00000000`00000003 ffffbb8c`7fde8a20 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffbb8c`7fde8800 fffff802`6da0275e : ffffbb8c`7fde88d0 ffffbb8c`7fde8a70 ffffbb8c`7fde8a70 ffffbb8c`7fde89f8 : nt!MmAccessFault+0x400
ffffbb8c`7fde89a0 fffff802`6c59c65b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffbb8c`7fde8b38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000018 : msrpc!NdrpComputeConformance+0x7
CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc
fffff8026c59c65a - msrpc!NdrpComputeConformance+6
[ 89:c9 ]
1 error : !msrpc (fffff8026c59c65a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8f7e787d2900, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806219232f9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12299
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8f7e787d2900
BUGCHECK_P2: 0
BUGCHECK_P3: fffff806219232f9
BUGCHECK_P4: 2
READ_ADDRESS: fffff806156fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8f7e787d2900
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffee00a42df480 -- (.trap 0xffffee00a42df480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fc3136e948245489 rbx=0000000000000000 rcx=ffffb1043490c3f0
rdx=ffffee00a42df640 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806219232f9 rsp=ffffee00a42df618 rbp=ffffee00a42df6d9
r8=0000000000000000 r9=fffff806218d7bb0 r10=0000fc3136e94824
r11=ffff6ff851a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
<Unloaded_vgk.sys>+0x1232f9:
fffff806`219232f9 4d0fa313 bt qword ptr [r11],r10 ds:ffff6ff8`51a00000=????????????????
Resetting default scope
IP_MODULE_UNLOADED:
vgk.sys+1232f9
fffff806`219232f9 4d0fa313 bt qword ptr [r11],r10
STACK_TEXT:
ffffee00`a42df1d8 fffff806`14e79b57 : 00000000`00000050 ffff8f7e`787d2900 00000000`00000000 ffffee00`a42df480 : nt!KeBugCheckEx
ffffee00`a42df1e0 fffff806`14cea5e0 : ffffb104`339e7080 00000000`00000000 ffffee00`a42df500 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffee00`a42df2e0 fffff806`14e0275e : 00000000`00000000 00000000`00000000 ffffb104`26010340 00000000`00000220 : nt!MmAccessFault+0x400
ffffee00`a42df480 fffff806`219232f9 : fffff806`218d26a3 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffee00`a42df618 fffff806`218d26a3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_vgk.sys>+0x1232f9
ffffee00`a42df620 fffff806`218b2dc1 : ffffb104`337e5da0 00000000`00000000 00000000`00000000 ffff8000`0cede180 : afd!AfdTLCloseEndpoint+0x47
ffffee00`a42df660 fffff806`218cf824 : ffffb104`337e5da0 ffffb104`337e5eb0 ffffb104`337e5da0 ffffee00`a42df778 : afd!AfdCloseTransportEndpoint+0x89
ffffee00`a42df740 fffff806`218cfc6c : ffffb104`28d34d50 ffffb104`337e5da0 ffffb104`3371e460 ffffb104`28d34d50 : afd!AfdCleanupCore+0x3b8
ffffee00`a42df840 fffff806`14ccd805 : ffffb104`3490b970 00000000`00000000 00000000`00000000 ffffb104`3371e460 : afd!AfdDispatch+0xec
ffffee00`a42df880 fffff806`150c297a : 00000000`00000000 ffffb104`3490b970 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55
ffffee00`a42df8c0 fffff806`150ed6bc : 00000000`00000000 00000000`00007fd9 ffffffff`00000000 ffffb104`25ef6400 : nt!IopCloseFile+0x17a
ffffee00`a42df950 fffff806`150f138c : 00000000`000006fc 0000007d`535ff8c8 ffffee00`a42dfaa8 00000180`a96004b0 : nt!ObCloseHandleTableEntry+0x24c
ffffee00`a42dfa90 fffff806`14e05fb8 : ffffb104`339e7000 00000180`aa0b0000 ffffee00`a42dfb80 ffffb104`33a36300 : nt!NtClose+0xec
ffffee00`a42dfb00 00007ffd`6820bf74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`535ff218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6820bf74
SYMBOL_NAME: vgk.sys+1232f9
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1232f9
FAILURE_BUCKET_ID: AV_R_INVALID_vgk.sys!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3d64d291-67d4-9959-5945-89965388792c}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffff868000741998
Arg3: 80000001d7a24867
Arg4: ffff868000341998
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8049
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff868000741998
BUGCHECK_P3: 80000001d7a24867
BUGCHECK_P4: ffff868000341998
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
STACK_TEXT:
ffffcf07`7e9101f8 fffff803`607494f9 : 00000000`0000001a 00000000`00000403 ffff8680`00741998 80000001`d7a24867 : nt!KeBugCheckEx
ffffcf07`7e910200 fffff803`60749cae : ffffcf07`7e9107d8 ffffcf07`7e910590 00000000`00000000 ffffcf07`7e9104e0 : nt!MiDeletePteRun+0x17b9
ffffcf07`7e910410 fffff803`6074a88b : ffffcf07`7e910540 00000000`00000000 ffff8680`00741bf8 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffffcf07`7e910440 fffff803`60722ae0 : 00000000`00000001 ffffcf07`00000000 ffff948c`1b796550 ffff948c`1848f080 : nt!MiDeletePagablePteRange+0x4ab
ffffcf07`7e910750 fffff803`60b0391b : ffff948c`1848f080 00000000`00000000 ffff948c`00000000 ffff948c`00000000 : nt!MiDeleteVad+0x360
ffffcf07`7e910860 fffff803`60b027af : ffff948c`1c01b900 ffff948c`1c01b900 ffff948c`1c019c40 ffff948c`1b796080 : nt!MiCleanVad+0x43
ffffcf07`7e910890 fffff803`609f164f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff948c`1b796080 : nt!MmCleanProcessAddressSpace+0x137
ffffcf07`7e910910 fffff803`609e6f96 : ffff948c`1b796080 ffffbd03`12f57630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffcf07`7e910990 fffff803`60a4a7ee : ffff948c`00000001 00000000`00000001 00000000`00000000 00000000`00f90000 : nt!PspExitThread+0x5f6
ffffcf07`7e910a90 fffff803`60805fb8 : ffff948c`1b796080 ffff948c`1848f080 ffffcf07`7e910b80 ffff948c`1a580080 : nt!NtTerminateProcess+0xde
ffffcf07`7e910b00 00000000`779a1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`2489edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a1cfc
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffaccf1f209fa8, Address of the instruction which caused the bugcheck
Arg3: ffffaf0c94fc8d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25527
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffaccf1f209fa8
BUGCHECK_P3: ffffaf0c94fc8d20
BUGCHECK_P4: 0
CONTEXT: ffffaf0c94fc8d20 -- (.cxr 0xffffaf0c94fc8d20)
rax=000000000000183b rbx=ffffac8c42f4f610 rcx=ffffac8c42af6010
rdx=ff333333ff333333 rsi=ffffac8c461bcab8 rdi=0000000000000200
rip=ffffaccf1f209fa8 rsp=ffffaf0c94fc9720 rbp=ffffac8c42f4f658
r8=0000000000000000 r9=0000000000000000 r10=ffffaccf1e060090
r11=ffffaf0c94fc9790 r12=0000000000000060 r13=0000000000000060
r14=ffffac8c42f4f644 r15=ffffac8c42f4f640
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull+0xb9fa8:
ffffaccf`1f209fa8 8b8a10040000 mov ecx,dword ptr [rdx+410h] ds:002b:ff333333`ff333743=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffaf0c`94fc9720 ffffac8c`42f4f390 : ffffaf0c`94fc9730 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 : win32kfull+0xb9fa8
ffffaf0c`94fc9728 ffffaf0c`94fc9730 : 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 : 0xffffac8c`42f4f390
ffffaf0c`94fc9730 00000000`00000001 : ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffaf0c`94fc9730
ffffaf0c`94fc9738 ffffaccf`1e055ab1 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffac8c`42f4f610 : 0x1
ffffaf0c`94fc9740 ffffaccf`1f209aa6 : 00000000`00000010 00000000`004e9203 00000000`00000001 00000000`00000004 : win32kbase!UserSessionSwitchLeaveCrit+0x81
ffffaf0c`94fc97b0 00000000`00000010 : 00000000`004e9203 00000000`00000001 00000000`00000004 ffffaf0c`00000005 : win32kfull+0xb9aa6
ffffaf0c`94fc97b8 00000000`004e9203 : 00000000`00000001 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 : 0x10
ffffaf0c`94fc97c0 00000000`00000001 : 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 : 0x4e9203
ffffaf0c`94fc97c8 00000000`00000004 : ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 : 0x1
ffffaf0c`94fc97d0 ffffaf0c`00000005 : ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 ffffac8c`4069b790 : 0x4
ffffaf0c`94fc97d8 ffffaf0c`94fc98b0 : 00000000`00000000 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 : 0xffffaf0c`00000005
ffffaf0c`94fc97e0 00000000`00000000 : 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 ffffffff`80001884 : 0xffffaf0c`94fc98b0
SYMBOL_NAME: win32kfull+b9fa8
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
STACK_COMMAND: .cxr 0xffffaf0c94fc8d20 ; kb
BUCKET_ID_FUNC_OFFSET: b9fa8
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c8562915-20db-1d44-10f6-80418b3fecc4}
Followup: MachineOwner
---------
Teşekkürler hocam, yaptım. Şu an düzeldi mi diye bir bakacağım. Şu an bir sıkıntı yok.Memtest yapın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Vanguard kaldırın. Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffffd80560b484a0, Address of the trap frame for the exception that caused the bugcheck Arg3: ffffd80560b483f8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7609 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 30267 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 139 BUGCHECK_P1: 3 BUGCHECK_P2: ffffd80560b484a0 BUGCHECK_P3: ffffd80560b483f8 BUGCHECK_P4: 0 TRAP_FRAME: ffffd80560b484a0 -- (.trap 0xffffd80560b484a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff800d3fac34d8 rbx=0000000000000000 rcx=0000000000000003 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8045ba5ac39 rsp=ffffd80560b48630 rbp=ffff800d3f178cf8 r8=ffff800d32f4f080 r9=ffff800d3f178d00 r10=0000000000000002 r11=ffff96fc85200000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc dxgmms2!VidSchWaitForSingleSyncObject+0x13de9: fffff804`5ba5ac39 cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffd80560b483f8 -- (.exr 0xffffd80560b483f8) ExceptionAddress: fffff8045ba5ac39 (dxgmms2!VidSchWaitForSingleSyncObject+0x0000000000013de9) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffffd805`60b48178 fffff804`50006569 : 00000000`00000139 00000000`00000003 ffffd805`60b484a0 ffffd805`60b483f8 : nt!KeBugCheckEx ffffd805`60b48180 fffff804`50006990 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`4fedcaf0 : nt!KiBugCheckDispatch+0x69 ffffd805`60b482c0 fffff804`50004d23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 ffffd805`60b484a0 fffff804`5ba5ac39 : ffff800d`3f5cda70 ffffbe03`00000001 ffff800d`39b32000 00000000`00000abe : nt!KiRaiseSecurityCheckFailure+0x323 ffffd805`60b48630 fffff804`5af3a4e1 : 00000000`00000abe 00000000`00000000 ffffbe03`f8e70da0 ffffffff`ffffff68 : dxgmms2!VidSchWaitForSingleSyncObject+0x13de9 ffffd805`60b486f0 fffff804`5af3afb6 : ffff800d`3e5ee180 00000000`00000004 00000000`00000000 00000000`00000000 : dxgkrnl!WaitForSynchronizationObjectFromGpu+0x651 ffffd805`60b48990 fffff804`5af39e76 : 00000000`00000001 00000000`00000000 ffffd805`60b48b08 00000000`00000000 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpuInternal+0x3f6 ffffd805`60b48ac0 fffff804`50005fb8 : ffff800d`3e5ee180 ffff800d`3c1c1060 00000000`00000000 ffffd805`60b48b80 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpu+0x16 ffffd805`60b48b00 00007ffd`22675ca4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000e5`151ff6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`22675ca4 SYMBOL_NAME: dxgmms2!VidSchWaitForSingleSyncObject+13de9 MODULE_NAME: dxgmms2 IMAGE_NAME: dxgmms2.sys IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 13de9 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchWaitForSingleSyncObject OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {b7e36f41-8c28-15a4-b4d1-c1c5a5e82d74} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8026d6123a4, memory referenced. Arg2: 0000000000000003, value 0 = read operation, 1 = write operation. Arg3: fffff8026c59c65b, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5655 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 6602 Key : Analysis.Memory.CommitPeak.Mb Value: 81 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: fffff8026d6123a4 BUGCHECK_P2: 3 BUGCHECK_P3: fffff8026c59c65b BUGCHECK_P4: 2 WRITE_ADDRESS: fffff8026e2fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse fffff8026d6123a4 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Discord.exe TRAP_FRAME: ffffbb8c7fde89a0 -- (.trap 0xffffbb8c7fde89a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8026c5d0d40 rbx=0000000000000000 rcx=ffffbb8c7fde8b30 rdx=ffffbb8c898f5d98 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8026c59c65b rsp=ffffbb8c7fde8b38 rbp=ffffbb8c7fde8d40 r8=fffff8026d6123a4 r9=fffff8026c580000 r10=0000fffff8026c5d r11=ffff727b61600000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc msrpc!NdrpComputeConformance+0x7: fffff802`6c59c65b 6c ins byte ptr [rdi],dx ds:00000000`00000000=?? Resetting default scope BAD_STACK_POINTER: ffffbb8c7fde86f8 STACK_TEXT: ffffbb8c`7fde86f8 fffff802`6da79b57 : 00000000`00000050 fffff802`6d6123a4 00000000`00000003 ffffbb8c`7fde89a0 : nt!KeBugCheckEx ffffbb8c`7fde8700 fffff802`6d8ea5e0 : 00000000`00000000 00000000`00000003 ffffbb8c`7fde8a20 00000000`00000000 : nt!MiSystemFault+0x1716c7 ffffbb8c`7fde8800 fffff802`6da0275e : ffffbb8c`7fde88d0 ffffbb8c`7fde8a70 ffffbb8c`7fde8a70 ffffbb8c`7fde89f8 : nt!MmAccessFault+0x400 ffffbb8c`7fde89a0 fffff802`6c59c65b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e ffffbb8c`7fde8b38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000018 : msrpc!NdrpComputeConformance+0x7 CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc fffff8026c59c65a - msrpc!NdrpComputeConformance+6 [ 89:c9 ] 1 error : !msrpc (fffff8026c59c65a) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption MEMORY_CORRUPTOR: ONE_BIT STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: memory_corruption --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffff8f7e787d2900, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff806219232f9, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 8608 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 12299 Key : Analysis.Memory.CommitPeak.Mb Value: 77 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: ffff8f7e787d2900 BUGCHECK_P2: 0 BUGCHECK_P3: fffff806219232f9 BUGCHECK_P4: 2 READ_ADDRESS: fffff806156fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse ffff8f7e787d2900 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: chrome.exe TRAP_FRAME: ffffee00a42df480 -- (.trap 0xffffee00a42df480) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fc3136e948245489 rbx=0000000000000000 rcx=ffffb1043490c3f0 rdx=ffffee00a42df640 rsi=0000000000000000 rdi=0000000000000000 rip=fffff806219232f9 rsp=ffffee00a42df618 rbp=ffffee00a42df6d9 r8=0000000000000000 r9=fffff806218d7bb0 r10=0000fc3136e94824 r11=ffff6ff851a00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac po nc <Unloaded_vgk.sys>+0x1232f9: fffff806`219232f9 4d0fa313 bt qword ptr [r11],r10 ds:ffff6ff8`51a00000=???????????????? Resetting default scope IP_MODULE_UNLOADED: vgk.sys+1232f9 fffff806`219232f9 4d0fa313 bt qword ptr [r11],r10 STACK_TEXT: ffffee00`a42df1d8 fffff806`14e79b57 : 00000000`00000050 ffff8f7e`787d2900 00000000`00000000 ffffee00`a42df480 : nt!KeBugCheckEx ffffee00`a42df1e0 fffff806`14cea5e0 : ffffb104`339e7080 00000000`00000000 ffffee00`a42df500 00000000`00000000 : nt!MiSystemFault+0x1716c7 ffffee00`a42df2e0 fffff806`14e0275e : 00000000`00000000 00000000`00000000 ffffb104`26010340 00000000`00000220 : nt!MmAccessFault+0x400 ffffee00`a42df480 fffff806`219232f9 : fffff806`218d26a3 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e ffffee00`a42df618 fffff806`218d26a3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_vgk.sys>+0x1232f9 ffffee00`a42df620 fffff806`218b2dc1 : ffffb104`337e5da0 00000000`00000000 00000000`00000000 ffff8000`0cede180 : afd!AfdTLCloseEndpoint+0x47 ffffee00`a42df660 fffff806`218cf824 : ffffb104`337e5da0 ffffb104`337e5eb0 ffffb104`337e5da0 ffffee00`a42df778 : afd!AfdCloseTransportEndpoint+0x89 ffffee00`a42df740 fffff806`218cfc6c : ffffb104`28d34d50 ffffb104`337e5da0 ffffb104`3371e460 ffffb104`28d34d50 : afd!AfdCleanupCore+0x3b8 ffffee00`a42df840 fffff806`14ccd805 : ffffb104`3490b970 00000000`00000000 00000000`00000000 ffffb104`3371e460 : afd!AfdDispatch+0xec ffffee00`a42df880 fffff806`150c297a : 00000000`00000000 ffffb104`3490b970 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55 ffffee00`a42df8c0 fffff806`150ed6bc : 00000000`00000000 00000000`00007fd9 ffffffff`00000000 ffffb104`25ef6400 : nt!IopCloseFile+0x17a ffffee00`a42df950 fffff806`150f138c : 00000000`000006fc 0000007d`535ff8c8 ffffee00`a42dfaa8 00000180`a96004b0 : nt!ObCloseHandleTableEntry+0x24c ffffee00`a42dfa90 fffff806`14e05fb8 : ffffb104`339e7000 00000180`aa0b0000 ffffee00`a42dfb80 ffffb104`33a36300 : nt!NtClose+0xec ffffee00`a42dfb00 00007ffd`6820bf74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000007d`535ff218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6820bf74 SYMBOL_NAME: vgk.sys+1232f9 MODULE_NAME: vgk IMAGE_NAME: vgk.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1232f9 FAILURE_BUCKET_ID: AV_R_INVALID_vgk.sys!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {3d64d291-67d4-9959-5945-89965388792c} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000403, The subtype of the bugcheck. Arg2: ffff868000741998 Arg3: 80000001d7a24867 Arg4: ffff868000341998 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4921 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 8049 Key : Analysis.Memory.CommitPeak.Mb Value: 79 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1a BUGCHECK_P1: 403 BUGCHECK_P2: ffff868000741998 BUGCHECK_P3: 80000001d7a24867 BUGCHECK_P4: ffff868000341998 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csgo.exe STACK_TEXT: ffffcf07`7e9101f8 fffff803`607494f9 : 00000000`0000001a 00000000`00000403 ffff8680`00741998 80000001`d7a24867 : nt!KeBugCheckEx ffffcf07`7e910200 fffff803`60749cae : ffffcf07`7e9107d8 ffffcf07`7e910590 00000000`00000000 ffffcf07`7e9104e0 : nt!MiDeletePteRun+0x17b9 ffffcf07`7e910410 fffff803`6074a88b : ffffcf07`7e910540 00000000`00000000 ffff8680`00741bf8 00000000`00000000 : nt!MiDeleteVaTail+0x6e ffffcf07`7e910440 fffff803`60722ae0 : 00000000`00000001 ffffcf07`00000000 ffff948c`1b796550 ffff948c`1848f080 : nt!MiDeletePagablePteRange+0x4ab ffffcf07`7e910750 fffff803`60b0391b : ffff948c`1848f080 00000000`00000000 ffff948c`00000000 ffff948c`00000000 : nt!MiDeleteVad+0x360 ffffcf07`7e910860 fffff803`60b027af : ffff948c`1c01b900 ffff948c`1c01b900 ffff948c`1c019c40 ffff948c`1b796080 : nt!MiCleanVad+0x43 ffffcf07`7e910890 fffff803`609f164f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff948c`1b796080 : nt!MmCleanProcessAddressSpace+0x137 ffffcf07`7e910910 fffff803`609e6f96 : ffff948c`1b796080 ffffbd03`12f57630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b ffffcf07`7e910990 fffff803`60a4a7ee : ffff948c`00000001 00000000`00000001 00000000`00000000 00000000`00f90000 : nt!PspExitThread+0x5f6 ffffcf07`7e910a90 fffff803`60805fb8 : ffff948c`1b796080 ffff948c`1848f080 ffffcf07`7e910b80 ffff948c`1a580080 : nt!NtTerminateProcess+0xde ffffcf07`7e910b00 00000000`779a1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`2489edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a1cfc SYMBOL_NAME: nt!MiDeletePteRun+17b9 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.572 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 17b9 FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: ffffaccf1f209fa8, Address of the instruction which caused the bugcheck Arg3: ffffaf0c94fc8d20, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32kfull.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7858 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 25527 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: ffffaccf1f209fa8 BUGCHECK_P3: ffffaf0c94fc8d20 BUGCHECK_P4: 0 CONTEXT: ffffaf0c94fc8d20 -- (.cxr 0xffffaf0c94fc8d20) rax=000000000000183b rbx=ffffac8c42f4f610 rcx=ffffac8c42af6010 rdx=ff333333ff333333 rsi=ffffac8c461bcab8 rdi=0000000000000200 rip=ffffaccf1f209fa8 rsp=ffffaf0c94fc9720 rbp=ffffac8c42f4f658 r8=0000000000000000 r9=0000000000000000 r10=ffffaccf1e060090 r11=ffffaf0c94fc9790 r12=0000000000000060 r13=0000000000000060 r14=ffffac8c42f4f644 r15=ffffac8c42f4f640 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202 win32kfull+0xb9fa8: ffffaccf`1f209fa8 8b8a10040000 mov ecx,dword ptr [rdx+410h] ds:002b:ff333333`ff333743=???????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: ffffaf0c`94fc9720 ffffac8c`42f4f390 : ffffaf0c`94fc9730 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 : win32kfull+0xb9fa8 ffffaf0c`94fc9728 ffffaf0c`94fc9730 : 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 : 0xffffac8c`42f4f390 ffffaf0c`94fc9730 00000000`00000001 : ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffaf0c`94fc9730 ffffaf0c`94fc9738 ffffaccf`1e055ab1 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffac8c`42f4f610 : 0x1 ffffaf0c`94fc9740 ffffaccf`1f209aa6 : 00000000`00000010 00000000`004e9203 00000000`00000001 00000000`00000004 : win32kbase!UserSessionSwitchLeaveCrit+0x81 ffffaf0c`94fc97b0 00000000`00000010 : 00000000`004e9203 00000000`00000001 00000000`00000004 ffffaf0c`00000005 : win32kfull+0xb9aa6 ffffaf0c`94fc97b8 00000000`004e9203 : 00000000`00000001 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 : 0x10 ffffaf0c`94fc97c0 00000000`00000001 : 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 : 0x4e9203 ffffaf0c`94fc97c8 00000000`00000004 : ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 : 0x1 ffffaf0c`94fc97d0 ffffaf0c`00000005 : ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 ffffac8c`4069b790 : 0x4 ffffaf0c`94fc97d8 ffffaf0c`94fc98b0 : 00000000`00000000 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 : 0xffffaf0c`00000005 ffffaf0c`94fc97e0 00000000`00000000 : 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 ffffffff`80001884 : 0xffffaf0c`94fc98b0 SYMBOL_NAME: win32kfull+b9fa8 MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys STACK_COMMAND: .cxr 0xffffaf0c94fc8d20 ; kb BUCKET_ID_FUNC_OFFSET: b9fa8 FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c8562915-20db-1d44-10f6-80418b3fecc4} Followup: MachineOwner ---------
Hala daha sorun yok sanırım. Emin olmak için sorayım, çözüldü mü?Şu an bir sıkıntı yok.
Teşekkürler hocam, yaptım. Şu an düzeldi mi diye bir bakacağım. Şu an bir sıkıntı yok.