KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd80560b484a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd80560b483f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7609
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 30267
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd80560b484a0
BUGCHECK_P3: ffffd80560b483f8
BUGCHECK_P4: 0
TRAP_FRAME: ffffd80560b484a0 -- (.trap 0xffffd80560b484a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800d3fac34d8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045ba5ac39 rsp=ffffd80560b48630 rbp=ffff800d3f178cf8
r8=ffff800d32f4f080 r9=ffff800d3f178d00 r10=0000000000000002
r11=ffff96fc85200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
dxgmms2!VidSchWaitForSingleSyncObject+0x13de9:
fffff804`5ba5ac39 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd80560b483f8 -- (.exr 0xffffd80560b483f8)
ExceptionAddress: fffff8045ba5ac39 (dxgmms2!VidSchWaitForSingleSyncObject+0x0000000000013de9)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffd805`60b48178 fffff804`50006569 : 00000000`00000139 00000000`00000003 ffffd805`60b484a0 ffffd805`60b483f8 : nt!KeBugCheckEx
ffffd805`60b48180 fffff804`50006990 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`4fedcaf0 : nt!KiBugCheckDispatch+0x69
ffffd805`60b482c0 fffff804`50004d23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd805`60b484a0 fffff804`5ba5ac39 : ffff800d`3f5cda70 ffffbe03`00000001 ffff800d`39b32000 00000000`00000abe : nt!KiRaiseSecurityCheckFailure+0x323
ffffd805`60b48630 fffff804`5af3a4e1 : 00000000`00000abe 00000000`00000000 ffffbe03`f8e70da0 ffffffff`ffffff68 : dxgmms2!VidSchWaitForSingleSyncObject+0x13de9
ffffd805`60b486f0 fffff804`5af3afb6 : ffff800d`3e5ee180 00000000`00000004 00000000`00000000 00000000`00000000 : dxgkrnl!WaitForSynchronizationObjectFromGpu+0x651
ffffd805`60b48990 fffff804`5af39e76 : 00000000`00000001 00000000`00000000 ffffd805`60b48b08 00000000`00000000 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpuInternal+0x3f6
ffffd805`60b48ac0 fffff804`50005fb8 : ffff800d`3e5ee180 ffff800d`3c1c1060 00000000`00000000 ffffd805`60b48b80 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpu+0x16
ffffd805`60b48b00 00007ffd`22675ca4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e5`151ff6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`22675ca4
SYMBOL_NAME: dxgmms2!VidSchWaitForSingleSyncObject+13de9
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 13de9
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchWaitForSingleSyncObject
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b7e36f41-8c28-15a4-b4d1-c1c5a5e82d74}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8026d6123a4, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff8026c59c65b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5655
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6602
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff8026d6123a4
BUGCHECK_P2: 3
BUGCHECK_P3: fffff8026c59c65b
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff8026e2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8026d6123a4
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffffbb8c7fde89a0 -- (.trap 0xffffbb8c7fde89a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8026c5d0d40 rbx=0000000000000000 rcx=ffffbb8c7fde8b30
rdx=ffffbb8c898f5d98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026c59c65b rsp=ffffbb8c7fde8b38 rbp=ffffbb8c7fde8d40
r8=fffff8026d6123a4 r9=fffff8026c580000 r10=0000fffff8026c5d
r11=ffff727b61600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
msrpc!NdrpComputeConformance+0x7:
fffff802`6c59c65b 6c ins byte ptr [rdi],dx ds:00000000`00000000=??
Resetting default scope
BAD_STACK_POINTER: ffffbb8c7fde86f8
STACK_TEXT:
ffffbb8c`7fde86f8 fffff802`6da79b57 : 00000000`00000050 fffff802`6d6123a4 00000000`00000003 ffffbb8c`7fde89a0 : nt!KeBugCheckEx
ffffbb8c`7fde8700 fffff802`6d8ea5e0 : 00000000`00000000 00000000`00000003 ffffbb8c`7fde8a20 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffbb8c`7fde8800 fffff802`6da0275e : ffffbb8c`7fde88d0 ffffbb8c`7fde8a70 ffffbb8c`7fde8a70 ffffbb8c`7fde89f8 : nt!MmAccessFault+0x400
ffffbb8c`7fde89a0 fffff802`6c59c65b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffbb8c`7fde8b38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000018 : msrpc!NdrpComputeConformance+0x7
CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc
fffff8026c59c65a - msrpc!NdrpComputeConformance+6
[ 89:c9 ]
1 error : !msrpc (fffff8026c59c65a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8f7e787d2900, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806219232f9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12299
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8f7e787d2900
BUGCHECK_P2: 0
BUGCHECK_P3: fffff806219232f9
BUGCHECK_P4: 2
READ_ADDRESS: fffff806156fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8f7e787d2900
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffee00a42df480 -- (.trap 0xffffee00a42df480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fc3136e948245489 rbx=0000000000000000 rcx=ffffb1043490c3f0
rdx=ffffee00a42df640 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806219232f9 rsp=ffffee00a42df618 rbp=ffffee00a42df6d9
r8=0000000000000000 r9=fffff806218d7bb0 r10=0000fc3136e94824
r11=ffff6ff851a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
<Unloaded_vgk.sys>+0x1232f9:
fffff806`219232f9 4d0fa313 bt qword ptr [r11],r10 ds:ffff6ff8`51a00000=????????????????
Resetting default scope
IP_MODULE_UNLOADED:
vgk.sys+1232f9
fffff806`219232f9 4d0fa313 bt qword ptr [r11],r10
STACK_TEXT:
ffffee00`a42df1d8 fffff806`14e79b57 : 00000000`00000050 ffff8f7e`787d2900 00000000`00000000 ffffee00`a42df480 : nt!KeBugCheckEx
ffffee00`a42df1e0 fffff806`14cea5e0 : ffffb104`339e7080 00000000`00000000 ffffee00`a42df500 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffee00`a42df2e0 fffff806`14e0275e : 00000000`00000000 00000000`00000000 ffffb104`26010340 00000000`00000220 : nt!MmAccessFault+0x400
ffffee00`a42df480 fffff806`219232f9 : fffff806`218d26a3 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffee00`a42df618 fffff806`218d26a3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_vgk.sys>+0x1232f9
ffffee00`a42df620 fffff806`218b2dc1 : ffffb104`337e5da0 00000000`00000000 00000000`00000000 ffff8000`0cede180 : afd!AfdTLCloseEndpoint+0x47
ffffee00`a42df660 fffff806`218cf824 : ffffb104`337e5da0 ffffb104`337e5eb0 ffffb104`337e5da0 ffffee00`a42df778 : afd!AfdCloseTransportEndpoint+0x89
ffffee00`a42df740 fffff806`218cfc6c : ffffb104`28d34d50 ffffb104`337e5da0 ffffb104`3371e460 ffffb104`28d34d50 : afd!AfdCleanupCore+0x3b8
ffffee00`a42df840 fffff806`14ccd805 : ffffb104`3490b970 00000000`00000000 00000000`00000000 ffffb104`3371e460 : afd!AfdDispatch+0xec
ffffee00`a42df880 fffff806`150c297a : 00000000`00000000 ffffb104`3490b970 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55
ffffee00`a42df8c0 fffff806`150ed6bc : 00000000`00000000 00000000`00007fd9 ffffffff`00000000 ffffb104`25ef6400 : nt!IopCloseFile+0x17a
ffffee00`a42df950 fffff806`150f138c : 00000000`000006fc 0000007d`535ff8c8 ffffee00`a42dfaa8 00000180`a96004b0 : nt!ObCloseHandleTableEntry+0x24c
ffffee00`a42dfa90 fffff806`14e05fb8 : ffffb104`339e7000 00000180`aa0b0000 ffffee00`a42dfb80 ffffb104`33a36300 : nt!NtClose+0xec
ffffee00`a42dfb00 00007ffd`6820bf74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`535ff218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6820bf74
SYMBOL_NAME: vgk.sys+1232f9
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1232f9
FAILURE_BUCKET_ID: AV_R_INVALID_vgk.sys!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3d64d291-67d4-9959-5945-89965388792c}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffff868000741998
Arg3: 80000001d7a24867
Arg4: ffff868000341998
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8049
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff868000741998
BUGCHECK_P3: 80000001d7a24867
BUGCHECK_P4: ffff868000341998
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csgo.exe
STACK_TEXT:
ffffcf07`7e9101f8 fffff803`607494f9 : 00000000`0000001a 00000000`00000403 ffff8680`00741998 80000001`d7a24867 : nt!KeBugCheckEx
ffffcf07`7e910200 fffff803`60749cae : ffffcf07`7e9107d8 ffffcf07`7e910590 00000000`00000000 ffffcf07`7e9104e0 : nt!MiDeletePteRun+0x17b9
ffffcf07`7e910410 fffff803`6074a88b : ffffcf07`7e910540 00000000`00000000 ffff8680`00741bf8 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffffcf07`7e910440 fffff803`60722ae0 : 00000000`00000001 ffffcf07`00000000 ffff948c`1b796550 ffff948c`1848f080 : nt!MiDeletePagablePteRange+0x4ab
ffffcf07`7e910750 fffff803`60b0391b : ffff948c`1848f080 00000000`00000000 ffff948c`00000000 ffff948c`00000000 : nt!MiDeleteVad+0x360
ffffcf07`7e910860 fffff803`60b027af : ffff948c`1c01b900 ffff948c`1c01b900 ffff948c`1c019c40 ffff948c`1b796080 : nt!MiCleanVad+0x43
ffffcf07`7e910890 fffff803`609f164f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff948c`1b796080 : nt!MmCleanProcessAddressSpace+0x137
ffffcf07`7e910910 fffff803`609e6f96 : ffff948c`1b796080 ffffbd03`12f57630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffcf07`7e910990 fffff803`60a4a7ee : ffff948c`00000001 00000000`00000001 00000000`00000000 00000000`00f90000 : nt!PspExitThread+0x5f6
ffffcf07`7e910a90 fffff803`60805fb8 : ffff948c`1b796080 ffff948c`1848f080 ffffcf07`7e910b80 ffff948c`1a580080 : nt!NtTerminateProcess+0xde
ffffcf07`7e910b00 00000000`779a1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`2489edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a1cfc
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffaccf1f209fa8, Address of the instruction which caused the bugcheck
Arg3: ffffaf0c94fc8d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25527
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffaccf1f209fa8
BUGCHECK_P3: ffffaf0c94fc8d20
BUGCHECK_P4: 0
CONTEXT: ffffaf0c94fc8d20 -- (.cxr 0xffffaf0c94fc8d20)
rax=000000000000183b rbx=ffffac8c42f4f610 rcx=ffffac8c42af6010
rdx=ff333333ff333333 rsi=ffffac8c461bcab8 rdi=0000000000000200
rip=ffffaccf1f209fa8 rsp=ffffaf0c94fc9720 rbp=ffffac8c42f4f658
r8=0000000000000000 r9=0000000000000000 r10=ffffaccf1e060090
r11=ffffaf0c94fc9790 r12=0000000000000060 r13=0000000000000060
r14=ffffac8c42f4f644 r15=ffffac8c42f4f640
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull+0xb9fa8:
ffffaccf`1f209fa8 8b8a10040000 mov ecx,dword ptr [rdx+410h] ds:002b:ff333333`ff333743=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffaf0c`94fc9720 ffffac8c`42f4f390 : ffffaf0c`94fc9730 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 : win32kfull+0xb9fa8
ffffaf0c`94fc9728 ffffaf0c`94fc9730 : 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 : 0xffffac8c`42f4f390
ffffaf0c`94fc9730 00000000`00000001 : ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffaf0c`94fc9730
ffffaf0c`94fc9738 ffffaccf`1e055ab1 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffac8c`42f4f610 : 0x1
ffffaf0c`94fc9740 ffffaccf`1f209aa6 : 00000000`00000010 00000000`004e9203 00000000`00000001 00000000`00000004 : win32kbase!UserSessionSwitchLeaveCrit+0x81
ffffaf0c`94fc97b0 00000000`00000010 : 00000000`004e9203 00000000`00000001 00000000`00000004 ffffaf0c`00000005 : win32kfull+0xb9aa6
ffffaf0c`94fc97b8 00000000`004e9203 : 00000000`00000001 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 : 0x10
ffffaf0c`94fc97c0 00000000`00000001 : 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 : 0x4e9203
ffffaf0c`94fc97c8 00000000`00000004 : ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 : 0x1
ffffaf0c`94fc97d0 ffffaf0c`00000005 : ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 ffffac8c`4069b790 : 0x4
ffffaf0c`94fc97d8 ffffaf0c`94fc98b0 : 00000000`00000000 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 : 0xffffaf0c`00000005
ffffaf0c`94fc97e0 00000000`00000000 : 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 ffffffff`80001884 : 0xffffaf0c`94fc98b0
SYMBOL_NAME: win32kfull+b9fa8
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
STACK_COMMAND: .cxr 0xffffaf0c94fc8d20 ; kb
BUCKET_ID_FUNC_OFFSET: b9fa8
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c8562915-20db-1d44-10f6-80418b3fecc4}
Followup: MachineOwner
---------