R5 3600X sistem mavi ekran hatası

burak_erdgnnn

Centipat
Katılım
27 Ekim 2020
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
Sürekli Mavi ekran hatası alıyorum, bir türlü çözemedim sıkıntıyı bilen arkadaşlar cozebilir mi?
Sistem özellikleri
AMD Ryzen 3600X
Radeon RX590
XPG 8 GB RAM
Gigabyte B450M S2H

Minidump hatalarım: minidump.rar
 
Son düzenleyen: Moderatör:
Memtest yapın.

Vanguard kaldırın. Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd80560b484a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd80560b483f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 30267

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd80560b484a0

BUGCHECK_P3: ffffd80560b483f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd80560b484a0 -- (.trap 0xffffd80560b484a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800d3fac34d8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045ba5ac39 rsp=ffffd80560b48630 rbp=ffff800d3f178cf8
 r8=ffff800d32f4f080  r9=ffff800d3f178d00 r10=0000000000000002
r11=ffff96fc85200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
dxgmms2!VidSchWaitForSingleSyncObject+0x13de9:
fffff804`5ba5ac39 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd80560b483f8 -- (.exr 0xffffd80560b483f8)
ExceptionAddress: fffff8045ba5ac39 (dxgmms2!VidSchWaitForSingleSyncObject+0x0000000000013de9)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffd805`60b48178 fffff804`50006569     : 00000000`00000139 00000000`00000003 ffffd805`60b484a0 ffffd805`60b483f8 : nt!KeBugCheckEx
ffffd805`60b48180 fffff804`50006990     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`4fedcaf0 : nt!KiBugCheckDispatch+0x69
ffffd805`60b482c0 fffff804`50004d23     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd805`60b484a0 fffff804`5ba5ac39     : ffff800d`3f5cda70 ffffbe03`00000001 ffff800d`39b32000 00000000`00000abe : nt!KiRaiseSecurityCheckFailure+0x323
ffffd805`60b48630 fffff804`5af3a4e1     : 00000000`00000abe 00000000`00000000 ffffbe03`f8e70da0 ffffffff`ffffff68 : dxgmms2!VidSchWaitForSingleSyncObject+0x13de9
ffffd805`60b486f0 fffff804`5af3afb6     : ffff800d`3e5ee180 00000000`00000004 00000000`00000000 00000000`00000000 : dxgkrnl!WaitForSynchronizationObjectFromGpu+0x651
ffffd805`60b48990 fffff804`5af39e76     : 00000000`00000001 00000000`00000000 ffffd805`60b48b08 00000000`00000000 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpuInternal+0x3f6
ffffd805`60b48ac0 fffff804`50005fb8     : ffff800d`3e5ee180 ffff800d`3c1c1060 00000000`00000000 ffffd805`60b48b80 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpu+0x16
ffffd805`60b48b00 00007ffd`22675ca4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e5`151ff6d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`22675ca4


SYMBOL_NAME:  dxgmms2!VidSchWaitForSingleSyncObject+13de9

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  13de9

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchWaitForSingleSyncObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b7e36f41-8c28-15a4-b4d1-c1c5a5e82d74}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8026d6123a4, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff8026c59c65b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5655

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6602

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8026d6123a4

BUGCHECK_P2: 3

BUGCHECK_P3: fffff8026c59c65b

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff8026e2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff8026d6123a4

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

TRAP_FRAME:  ffffbb8c7fde89a0 -- (.trap 0xffffbb8c7fde89a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8026c5d0d40 rbx=0000000000000000 rcx=ffffbb8c7fde8b30
rdx=ffffbb8c898f5d98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026c59c65b rsp=ffffbb8c7fde8b38 rbp=ffffbb8c7fde8d40
 r8=fffff8026d6123a4  r9=fffff8026c580000 r10=0000fffff8026c5d
r11=ffff727b61600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
msrpc!NdrpComputeConformance+0x7:
fffff802`6c59c65b 6c              ins     byte ptr [rdi],dx ds:00000000`00000000=??
Resetting default scope

BAD_STACK_POINTER:  ffffbb8c7fde86f8

STACK_TEXT: 
ffffbb8c`7fde86f8 fffff802`6da79b57     : 00000000`00000050 fffff802`6d6123a4 00000000`00000003 ffffbb8c`7fde89a0 : nt!KeBugCheckEx
ffffbb8c`7fde8700 fffff802`6d8ea5e0     : 00000000`00000000 00000000`00000003 ffffbb8c`7fde8a20 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffbb8c`7fde8800 fffff802`6da0275e     : ffffbb8c`7fde88d0 ffffbb8c`7fde8a70 ffffbb8c`7fde8a70 ffffbb8c`7fde89f8 : nt!MmAccessFault+0x400
ffffbb8c`7fde89a0 fffff802`6c59c65b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffbb8c`7fde8b38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000018 : msrpc!NdrpComputeConformance+0x7


CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc
    fffff8026c59c65a - msrpc!NdrpComputeConformance+6
    [ 89:c9 ]
1 error : !msrpc (fffff8026c59c65a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8f7e787d2900, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806219232f9, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12299

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff8f7e787d2900

BUGCHECK_P2: 0

BUGCHECK_P3: fffff806219232f9

BUGCHECK_P4: 2

READ_ADDRESS: fffff806156fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff8f7e787d2900

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffee00a42df480 -- (.trap 0xffffee00a42df480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fc3136e948245489 rbx=0000000000000000 rcx=ffffb1043490c3f0
rdx=ffffee00a42df640 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806219232f9 rsp=ffffee00a42df618 rbp=ffffee00a42df6d9
 r8=0000000000000000  r9=fffff806218d7bb0 r10=0000fc3136e94824
r11=ffff6ff851a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
<Unloaded_vgk.sys>+0x1232f9:
fffff806`219232f9 4d0fa313        bt      qword ptr [r11],r10 ds:ffff6ff8`51a00000=????????????????
Resetting default scope

IP_MODULE_UNLOADED:
vgk.sys+1232f9
fffff806`219232f9 4d0fa313        bt      qword ptr [r11],r10

STACK_TEXT: 
ffffee00`a42df1d8 fffff806`14e79b57     : 00000000`00000050 ffff8f7e`787d2900 00000000`00000000 ffffee00`a42df480 : nt!KeBugCheckEx
ffffee00`a42df1e0 fffff806`14cea5e0     : ffffb104`339e7080 00000000`00000000 ffffee00`a42df500 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffee00`a42df2e0 fffff806`14e0275e     : 00000000`00000000 00000000`00000000 ffffb104`26010340 00000000`00000220 : nt!MmAccessFault+0x400
ffffee00`a42df480 fffff806`219232f9     : fffff806`218d26a3 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffee00`a42df618 fffff806`218d26a3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_vgk.sys>+0x1232f9
ffffee00`a42df620 fffff806`218b2dc1     : ffffb104`337e5da0 00000000`00000000 00000000`00000000 ffff8000`0cede180 : afd!AfdTLCloseEndpoint+0x47
ffffee00`a42df660 fffff806`218cf824     : ffffb104`337e5da0 ffffb104`337e5eb0 ffffb104`337e5da0 ffffee00`a42df778 : afd!AfdCloseTransportEndpoint+0x89
ffffee00`a42df740 fffff806`218cfc6c     : ffffb104`28d34d50 ffffb104`337e5da0 ffffb104`3371e460 ffffb104`28d34d50 : afd!AfdCleanupCore+0x3b8
ffffee00`a42df840 fffff806`14ccd805     : ffffb104`3490b970 00000000`00000000 00000000`00000000 ffffb104`3371e460 : afd!AfdDispatch+0xec
ffffee00`a42df880 fffff806`150c297a     : 00000000`00000000 ffffb104`3490b970 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55
ffffee00`a42df8c0 fffff806`150ed6bc     : 00000000`00000000 00000000`00007fd9 ffffffff`00000000 ffffb104`25ef6400 : nt!IopCloseFile+0x17a
ffffee00`a42df950 fffff806`150f138c     : 00000000`000006fc 0000007d`535ff8c8 ffffee00`a42dfaa8 00000180`a96004b0 : nt!ObCloseHandleTableEntry+0x24c
ffffee00`a42dfa90 fffff806`14e05fb8     : ffffb104`339e7000 00000180`aa0b0000 ffffee00`a42dfb80 ffffb104`33a36300 : nt!NtClose+0xec
ffffee00`a42dfb00 00007ffd`6820bf74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`535ff218 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6820bf74


SYMBOL_NAME:  vgk.sys+1232f9

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1232f9

FAILURE_BUCKET_ID:  AV_R_INVALID_vgk.sys!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3d64d291-67d4-9959-5945-89965388792c}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffff868000741998
Arg3: 80000001d7a24867
Arg4: ffff868000341998

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8049

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff868000741998

BUGCHECK_P3: 80000001d7a24867

BUGCHECK_P4: ffff868000341998

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csgo.exe

STACK_TEXT: 
ffffcf07`7e9101f8 fffff803`607494f9     : 00000000`0000001a 00000000`00000403 ffff8680`00741998 80000001`d7a24867 : nt!KeBugCheckEx
ffffcf07`7e910200 fffff803`60749cae     : ffffcf07`7e9107d8 ffffcf07`7e910590 00000000`00000000 ffffcf07`7e9104e0 : nt!MiDeletePteRun+0x17b9
ffffcf07`7e910410 fffff803`6074a88b     : ffffcf07`7e910540 00000000`00000000 ffff8680`00741bf8 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffffcf07`7e910440 fffff803`60722ae0     : 00000000`00000001 ffffcf07`00000000 ffff948c`1b796550 ffff948c`1848f080 : nt!MiDeletePagablePteRange+0x4ab
ffffcf07`7e910750 fffff803`60b0391b     : ffff948c`1848f080 00000000`00000000 ffff948c`00000000 ffff948c`00000000 : nt!MiDeleteVad+0x360
ffffcf07`7e910860 fffff803`60b027af     : ffff948c`1c01b900 ffff948c`1c01b900 ffff948c`1c019c40 ffff948c`1b796080 : nt!MiCleanVad+0x43
ffffcf07`7e910890 fffff803`609f164f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff948c`1b796080 : nt!MmCleanProcessAddressSpace+0x137
ffffcf07`7e910910 fffff803`609e6f96     : ffff948c`1b796080 ffffbd03`12f57630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffcf07`7e910990 fffff803`60a4a7ee     : ffff948c`00000001 00000000`00000001 00000000`00000000 00000000`00f90000 : nt!PspExitThread+0x5f6
ffffcf07`7e910a90 fffff803`60805fb8     : ffff948c`1b796080 ffff948c`1848f080 ffffcf07`7e910b80 ffff948c`1a580080 : nt!NtTerminateProcess+0xde
ffffcf07`7e910b00 00000000`779a1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`2489edf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a1cfc


SYMBOL_NAME:  nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17b9

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffaccf1f209fa8, Address of the instruction which caused the bugcheck
Arg3: ffffaf0c94fc8d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7858

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25527

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffaccf1f209fa8

BUGCHECK_P3: ffffaf0c94fc8d20

BUGCHECK_P4: 0

CONTEXT:  ffffaf0c94fc8d20 -- (.cxr 0xffffaf0c94fc8d20)
rax=000000000000183b rbx=ffffac8c42f4f610 rcx=ffffac8c42af6010
rdx=ff333333ff333333 rsi=ffffac8c461bcab8 rdi=0000000000000200
rip=ffffaccf1f209fa8 rsp=ffffaf0c94fc9720 rbp=ffffac8c42f4f658
 r8=0000000000000000  r9=0000000000000000 r10=ffffaccf1e060090
r11=ffffaf0c94fc9790 r12=0000000000000060 r13=0000000000000060
r14=ffffac8c42f4f644 r15=ffffac8c42f4f640
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
win32kfull+0xb9fa8:
ffffaccf`1f209fa8 8b8a10040000    mov     ecx,dword ptr [rdx+410h] ds:002b:ff333333`ff333743=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
ffffaf0c`94fc9720 ffffac8c`42f4f390     : ffffaf0c`94fc9730 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 : win32kfull+0xb9fa8
ffffaf0c`94fc9728 ffffaf0c`94fc9730     : 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 : 0xffffac8c`42f4f390
ffffaf0c`94fc9730 00000000`00000001     : ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffaf0c`94fc9730
ffffaf0c`94fc9738 ffffaccf`1e055ab1     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffac8c`42f4f610 : 0x1
ffffaf0c`94fc9740 ffffaccf`1f209aa6     : 00000000`00000010 00000000`004e9203 00000000`00000001 00000000`00000004 : win32kbase!UserSessionSwitchLeaveCrit+0x81
ffffaf0c`94fc97b0 00000000`00000010     : 00000000`004e9203 00000000`00000001 00000000`00000004 ffffaf0c`00000005 : win32kfull+0xb9aa6
ffffaf0c`94fc97b8 00000000`004e9203     : 00000000`00000001 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 : 0x10
ffffaf0c`94fc97c0 00000000`00000001     : 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 : 0x4e9203
ffffaf0c`94fc97c8 00000000`00000004     : ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 : 0x1
ffffaf0c`94fc97d0 ffffaf0c`00000005     : ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 ffffac8c`4069b790 : 0x4
ffffaf0c`94fc97d8 ffffaf0c`94fc98b0     : 00000000`00000000 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 : 0xffffaf0c`00000005
ffffaf0c`94fc97e0 00000000`00000000     : 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 ffffffff`80001884 : 0xffffaf0c`94fc98b0


SYMBOL_NAME:  win32kfull+b9fa8

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

STACK_COMMAND:  .cxr 0xffffaf0c94fc8d20 ; kb

BUCKET_ID_FUNC_OFFSET:  b9fa8

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c8562915-20db-1d44-10f6-80418b3fecc4}

Followup:     MachineOwner
---------
 
Memtest yapın.

Vanguard kaldırın. Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd80560b484a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd80560b483f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 30267

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd80560b484a0

BUGCHECK_P3: ffffd80560b483f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd80560b484a0 -- (.trap 0xffffd80560b484a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800d3fac34d8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045ba5ac39 rsp=ffffd80560b48630 rbp=ffff800d3f178cf8
r8=ffff800d32f4f080  r9=ffff800d3f178d00 r10=0000000000000002
r11=ffff96fc85200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
dxgmms2!VidSchWaitForSingleSyncObject+0x13de9:
fffff804`5ba5ac39 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd80560b483f8 -- (.exr 0xffffd80560b483f8)
ExceptionAddress: fffff8045ba5ac39 (dxgmms2!VidSchWaitForSingleSyncObject+0x0000000000013de9)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffd805`60b48178 fffff804`50006569     : 00000000`00000139 00000000`00000003 ffffd805`60b484a0 ffffd805`60b483f8 : nt!KeBugCheckEx
ffffd805`60b48180 fffff804`50006990     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`4fedcaf0 : nt!KiBugCheckDispatch+0x69
ffffd805`60b482c0 fffff804`50004d23     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd805`60b484a0 fffff804`5ba5ac39     : ffff800d`3f5cda70 ffffbe03`00000001 ffff800d`39b32000 00000000`00000abe : nt!KiRaiseSecurityCheckFailure+0x323
ffffd805`60b48630 fffff804`5af3a4e1     : 00000000`00000abe 00000000`00000000 ffffbe03`f8e70da0 ffffffff`ffffff68 : dxgmms2!VidSchWaitForSingleSyncObject+0x13de9
ffffd805`60b486f0 fffff804`5af3afb6     : ffff800d`3e5ee180 00000000`00000004 00000000`00000000 00000000`00000000 : dxgkrnl!WaitForSynchronizationObjectFromGpu+0x651
ffffd805`60b48990 fffff804`5af39e76     : 00000000`00000001 00000000`00000000 ffffd805`60b48b08 00000000`00000000 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpuInternal+0x3f6
ffffd805`60b48ac0 fffff804`50005fb8     : ffff800d`3e5ee180 ffff800d`3c1c1060 00000000`00000000 ffffd805`60b48b80 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpu+0x16
ffffd805`60b48b00 00007ffd`22675ca4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e5`151ff6d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`22675ca4


SYMBOL_NAME:  dxgmms2!VidSchWaitForSingleSyncObject+13de9

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  13de9

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchWaitForSingleSyncObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b7e36f41-8c28-15a4-b4d1-c1c5a5e82d74}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8026d6123a4, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff8026c59c65b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5655

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6602

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8026d6123a4

BUGCHECK_P2: 3

BUGCHECK_P3: fffff8026c59c65b

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff8026e2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8026d6123a4

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

TRAP_FRAME:  ffffbb8c7fde89a0 -- (.trap 0xffffbb8c7fde89a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8026c5d0d40 rbx=0000000000000000 rcx=ffffbb8c7fde8b30
rdx=ffffbb8c898f5d98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026c59c65b rsp=ffffbb8c7fde8b38 rbp=ffffbb8c7fde8d40
r8=fffff8026d6123a4  r9=fffff8026c580000 r10=0000fffff8026c5d
r11=ffff727b61600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
msrpc!NdrpComputeConformance+0x7:
fffff802`6c59c65b 6c              ins     byte ptr [rdi],dx ds:00000000`00000000=??
Resetting default scope

BAD_STACK_POINTER:  ffffbb8c7fde86f8

STACK_TEXT:
ffffbb8c`7fde86f8 fffff802`6da79b57     : 00000000`00000050 fffff802`6d6123a4 00000000`00000003 ffffbb8c`7fde89a0 : nt!KeBugCheckEx
ffffbb8c`7fde8700 fffff802`6d8ea5e0     : 00000000`00000000 00000000`00000003 ffffbb8c`7fde8a20 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffbb8c`7fde8800 fffff802`6da0275e     : ffffbb8c`7fde88d0 ffffbb8c`7fde8a70 ffffbb8c`7fde8a70 ffffbb8c`7fde89f8 : nt!MmAccessFault+0x400
ffffbb8c`7fde89a0 fffff802`6c59c65b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffbb8c`7fde8b38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000018 : msrpc!NdrpComputeConformance+0x7


CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc
    fffff8026c59c65a - msrpc!NdrpComputeConformance+6
    [ 89:c9 ]
1 error : !msrpc (fffff8026c59c65a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8f7e787d2900, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806219232f9, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12299

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff8f7e787d2900

BUGCHECK_P2: 0

BUGCHECK_P3: fffff806219232f9

BUGCHECK_P4: 2

READ_ADDRESS: fffff806156fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8f7e787d2900

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffee00a42df480 -- (.trap 0xffffee00a42df480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fc3136e948245489 rbx=0000000000000000 rcx=ffffb1043490c3f0
rdx=ffffee00a42df640 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806219232f9 rsp=ffffee00a42df618 rbp=ffffee00a42df6d9
r8=0000000000000000  r9=fffff806218d7bb0 r10=0000fc3136e94824
r11=ffff6ff851a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
<Unloaded_vgk.sys>+0x1232f9:
fffff806`219232f9 4d0fa313        bt      qword ptr [r11],r10 ds:ffff6ff8`51a00000=????????????????
Resetting default scope

IP_MODULE_UNLOADED:
vgk.sys+1232f9
fffff806`219232f9 4d0fa313        bt      qword ptr [r11],r10

STACK_TEXT:
ffffee00`a42df1d8 fffff806`14e79b57     : 00000000`00000050 ffff8f7e`787d2900 00000000`00000000 ffffee00`a42df480 : nt!KeBugCheckEx
ffffee00`a42df1e0 fffff806`14cea5e0     : ffffb104`339e7080 00000000`00000000 ffffee00`a42df500 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffee00`a42df2e0 fffff806`14e0275e     : 00000000`00000000 00000000`00000000 ffffb104`26010340 00000000`00000220 : nt!MmAccessFault+0x400
ffffee00`a42df480 fffff806`219232f9     : fffff806`218d26a3 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffee00`a42df618 fffff806`218d26a3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_vgk.sys>+0x1232f9
ffffee00`a42df620 fffff806`218b2dc1     : ffffb104`337e5da0 00000000`00000000 00000000`00000000 ffff8000`0cede180 : afd!AfdTLCloseEndpoint+0x47
ffffee00`a42df660 fffff806`218cf824     : ffffb104`337e5da0 ffffb104`337e5eb0 ffffb104`337e5da0 ffffee00`a42df778 : afd!AfdCloseTransportEndpoint+0x89
ffffee00`a42df740 fffff806`218cfc6c     : ffffb104`28d34d50 ffffb104`337e5da0 ffffb104`3371e460 ffffb104`28d34d50 : afd!AfdCleanupCore+0x3b8
ffffee00`a42df840 fffff806`14ccd805     : ffffb104`3490b970 00000000`00000000 00000000`00000000 ffffb104`3371e460 : afd!AfdDispatch+0xec
ffffee00`a42df880 fffff806`150c297a     : 00000000`00000000 ffffb104`3490b970 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55
ffffee00`a42df8c0 fffff806`150ed6bc     : 00000000`00000000 00000000`00007fd9 ffffffff`00000000 ffffb104`25ef6400 : nt!IopCloseFile+0x17a
ffffee00`a42df950 fffff806`150f138c     : 00000000`000006fc 0000007d`535ff8c8 ffffee00`a42dfaa8 00000180`a96004b0 : nt!ObCloseHandleTableEntry+0x24c
ffffee00`a42dfa90 fffff806`14e05fb8     : ffffb104`339e7000 00000180`aa0b0000 ffffee00`a42dfb80 ffffb104`33a36300 : nt!NtClose+0xec
ffffee00`a42dfb00 00007ffd`6820bf74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`535ff218 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6820bf74


SYMBOL_NAME:  vgk.sys+1232f9

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1232f9

FAILURE_BUCKET_ID:  AV_R_INVALID_vgk.sys!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3d64d291-67d4-9959-5945-89965388792c}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffff868000741998
Arg3: 80000001d7a24867
Arg4: ffff868000341998

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8049

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff868000741998

BUGCHECK_P3: 80000001d7a24867

BUGCHECK_P4: ffff868000341998

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csgo.exe

STACK_TEXT:
ffffcf07`7e9101f8 fffff803`607494f9     : 00000000`0000001a 00000000`00000403 ffff8680`00741998 80000001`d7a24867 : nt!KeBugCheckEx
ffffcf07`7e910200 fffff803`60749cae     : ffffcf07`7e9107d8 ffffcf07`7e910590 00000000`00000000 ffffcf07`7e9104e0 : nt!MiDeletePteRun+0x17b9
ffffcf07`7e910410 fffff803`6074a88b     : ffffcf07`7e910540 00000000`00000000 ffff8680`00741bf8 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffffcf07`7e910440 fffff803`60722ae0     : 00000000`00000001 ffffcf07`00000000 ffff948c`1b796550 ffff948c`1848f080 : nt!MiDeletePagablePteRange+0x4ab
ffffcf07`7e910750 fffff803`60b0391b     : ffff948c`1848f080 00000000`00000000 ffff948c`00000000 ffff948c`00000000 : nt!MiDeleteVad+0x360
ffffcf07`7e910860 fffff803`60b027af     : ffff948c`1c01b900 ffff948c`1c01b900 ffff948c`1c019c40 ffff948c`1b796080 : nt!MiCleanVad+0x43
ffffcf07`7e910890 fffff803`609f164f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff948c`1b796080 : nt!MmCleanProcessAddressSpace+0x137
ffffcf07`7e910910 fffff803`609e6f96     : ffff948c`1b796080 ffffbd03`12f57630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffcf07`7e910990 fffff803`60a4a7ee     : ffff948c`00000001 00000000`00000001 00000000`00000000 00000000`00f90000 : nt!PspExitThread+0x5f6
ffffcf07`7e910a90 fffff803`60805fb8     : ffff948c`1b796080 ffff948c`1848f080 ffffcf07`7e910b80 ffff948c`1a580080 : nt!NtTerminateProcess+0xde
ffffcf07`7e910b00 00000000`779a1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`2489edf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a1cfc


SYMBOL_NAME:  nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17b9

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffaccf1f209fa8, Address of the instruction which caused the bugcheck
Arg3: ffffaf0c94fc8d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7858

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25527

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffaccf1f209fa8

BUGCHECK_P3: ffffaf0c94fc8d20

BUGCHECK_P4: 0

CONTEXT:  ffffaf0c94fc8d20 -- (.cxr 0xffffaf0c94fc8d20)
rax=000000000000183b rbx=ffffac8c42f4f610 rcx=ffffac8c42af6010
rdx=ff333333ff333333 rsi=ffffac8c461bcab8 rdi=0000000000000200
rip=ffffaccf1f209fa8 rsp=ffffaf0c94fc9720 rbp=ffffac8c42f4f658
r8=0000000000000000  r9=0000000000000000 r10=ffffaccf1e060090
r11=ffffaf0c94fc9790 r12=0000000000000060 r13=0000000000000060
r14=ffffac8c42f4f644 r15=ffffac8c42f4f640
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
win32kfull+0xb9fa8:
ffffaccf`1f209fa8 8b8a10040000    mov     ecx,dword ptr [rdx+410h] ds:002b:ff333333`ff333743=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffaf0c`94fc9720 ffffac8c`42f4f390     : ffffaf0c`94fc9730 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 : win32kfull+0xb9fa8
ffffaf0c`94fc9728 ffffaf0c`94fc9730     : 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 : 0xffffac8c`42f4f390
ffffaf0c`94fc9730 00000000`00000001     : ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffaf0c`94fc9730
ffffaf0c`94fc9738 ffffaccf`1e055ab1     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffac8c`42f4f610 : 0x1
ffffaf0c`94fc9740 ffffaccf`1f209aa6     : 00000000`00000010 00000000`004e9203 00000000`00000001 00000000`00000004 : win32kbase!UserSessionSwitchLeaveCrit+0x81
ffffaf0c`94fc97b0 00000000`00000010     : 00000000`004e9203 00000000`00000001 00000000`00000004 ffffaf0c`00000005 : win32kfull+0xb9aa6
ffffaf0c`94fc97b8 00000000`004e9203     : 00000000`00000001 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 : 0x10
ffffaf0c`94fc97c0 00000000`00000001     : 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 : 0x4e9203
ffffaf0c`94fc97c8 00000000`00000004     : ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 : 0x1
ffffaf0c`94fc97d0 ffffaf0c`00000005     : ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 ffffac8c`4069b790 : 0x4
ffffaf0c`94fc97d8 ffffaf0c`94fc98b0     : 00000000`00000000 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 : 0xffffaf0c`00000005
ffffaf0c`94fc97e0 00000000`00000000     : 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 ffffffff`80001884 : 0xffffaf0c`94fc98b0


SYMBOL_NAME:  win32kfull+b9fa8

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

STACK_COMMAND:  .cxr 0xffffaf0c94fc8d20 ; kb

BUCKET_ID_FUNC_OFFSET:  b9fa8

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c8562915-20db-1d44-10f6-80418b3fecc4}

Followup:     MachineOwner
---------
Teşekkürler hocam, yaptım. Şu an düzeldi mi diye bir bakacağım. Şu an bir sıkıntı yok.
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı