R5 3600X sistem mavi ekran hatası

burak_erdgnnn

Centipat
Katılım
27 Ekim 2020
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
Sürekli Mavi ekran hatası alıyorum, bir türlü çözemedim sıkıntıyı bilen arkadaşlar cozebilir mi?
Sistem özellikleri
AMD Ryzen 3600X
Radeon RX590
XPG 8 GB RAM
Gigabyte B450M S2H

Minidump hatalarım: minidump.rar
 
Son düzenleyen: Moderatör:
Memtest yapın.

Vanguard kaldırın. Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd80560b484a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd80560b483f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 30267

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd80560b484a0

BUGCHECK_P3: ffffd80560b483f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd80560b484a0 -- (.trap 0xffffd80560b484a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800d3fac34d8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045ba5ac39 rsp=ffffd80560b48630 rbp=ffff800d3f178cf8
 r8=ffff800d32f4f080  r9=ffff800d3f178d00 r10=0000000000000002
r11=ffff96fc85200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
dxgmms2!VidSchWaitForSingleSyncObject+0x13de9:
fffff804`5ba5ac39 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd80560b483f8 -- (.exr 0xffffd80560b483f8)
ExceptionAddress: fffff8045ba5ac39 (dxgmms2!VidSchWaitForSingleSyncObject+0x0000000000013de9)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffd805`60b48178 fffff804`50006569     : 00000000`00000139 00000000`00000003 ffffd805`60b484a0 ffffd805`60b483f8 : nt!KeBugCheckEx
ffffd805`60b48180 fffff804`50006990     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`4fedcaf0 : nt!KiBugCheckDispatch+0x69
ffffd805`60b482c0 fffff804`50004d23     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd805`60b484a0 fffff804`5ba5ac39     : ffff800d`3f5cda70 ffffbe03`00000001 ffff800d`39b32000 00000000`00000abe : nt!KiRaiseSecurityCheckFailure+0x323
ffffd805`60b48630 fffff804`5af3a4e1     : 00000000`00000abe 00000000`00000000 ffffbe03`f8e70da0 ffffffff`ffffff68 : dxgmms2!VidSchWaitForSingleSyncObject+0x13de9
ffffd805`60b486f0 fffff804`5af3afb6     : ffff800d`3e5ee180 00000000`00000004 00000000`00000000 00000000`00000000 : dxgkrnl!WaitForSynchronizationObjectFromGpu+0x651
ffffd805`60b48990 fffff804`5af39e76     : 00000000`00000001 00000000`00000000 ffffd805`60b48b08 00000000`00000000 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpuInternal+0x3f6
ffffd805`60b48ac0 fffff804`50005fb8     : ffff800d`3e5ee180 ffff800d`3c1c1060 00000000`00000000 ffffd805`60b48b80 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpu+0x16
ffffd805`60b48b00 00007ffd`22675ca4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e5`151ff6d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`22675ca4


SYMBOL_NAME:  dxgmms2!VidSchWaitForSingleSyncObject+13de9

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  13de9

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchWaitForSingleSyncObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b7e36f41-8c28-15a4-b4d1-c1c5a5e82d74}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8026d6123a4, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff8026c59c65b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5655

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6602

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8026d6123a4

BUGCHECK_P2: 3

BUGCHECK_P3: fffff8026c59c65b

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff8026e2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff8026d6123a4

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

TRAP_FRAME:  ffffbb8c7fde89a0 -- (.trap 0xffffbb8c7fde89a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8026c5d0d40 rbx=0000000000000000 rcx=ffffbb8c7fde8b30
rdx=ffffbb8c898f5d98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026c59c65b rsp=ffffbb8c7fde8b38 rbp=ffffbb8c7fde8d40
 r8=fffff8026d6123a4  r9=fffff8026c580000 r10=0000fffff8026c5d
r11=ffff727b61600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
msrpc!NdrpComputeConformance+0x7:
fffff802`6c59c65b 6c              ins     byte ptr [rdi],dx ds:00000000`00000000=??
Resetting default scope

BAD_STACK_POINTER:  ffffbb8c7fde86f8

STACK_TEXT: 
ffffbb8c`7fde86f8 fffff802`6da79b57     : 00000000`00000050 fffff802`6d6123a4 00000000`00000003 ffffbb8c`7fde89a0 : nt!KeBugCheckEx
ffffbb8c`7fde8700 fffff802`6d8ea5e0     : 00000000`00000000 00000000`00000003 ffffbb8c`7fde8a20 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffbb8c`7fde8800 fffff802`6da0275e     : ffffbb8c`7fde88d0 ffffbb8c`7fde8a70 ffffbb8c`7fde8a70 ffffbb8c`7fde89f8 : nt!MmAccessFault+0x400
ffffbb8c`7fde89a0 fffff802`6c59c65b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffbb8c`7fde8b38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000018 : msrpc!NdrpComputeConformance+0x7


CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc
    fffff8026c59c65a - msrpc!NdrpComputeConformance+6
    [ 89:c9 ]
1 error : !msrpc (fffff8026c59c65a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8f7e787d2900, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806219232f9, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12299

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff8f7e787d2900

BUGCHECK_P2: 0

BUGCHECK_P3: fffff806219232f9

BUGCHECK_P4: 2

READ_ADDRESS: fffff806156fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff8f7e787d2900

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffee00a42df480 -- (.trap 0xffffee00a42df480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fc3136e948245489 rbx=0000000000000000 rcx=ffffb1043490c3f0
rdx=ffffee00a42df640 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806219232f9 rsp=ffffee00a42df618 rbp=ffffee00a42df6d9
 r8=0000000000000000  r9=fffff806218d7bb0 r10=0000fc3136e94824
r11=ffff6ff851a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
<Unloaded_vgk.sys>+0x1232f9:
fffff806`219232f9 4d0fa313        bt      qword ptr [r11],r10 ds:ffff6ff8`51a00000=????????????????
Resetting default scope

IP_MODULE_UNLOADED:
vgk.sys+1232f9
fffff806`219232f9 4d0fa313        bt      qword ptr [r11],r10

STACK_TEXT: 
ffffee00`a42df1d8 fffff806`14e79b57     : 00000000`00000050 ffff8f7e`787d2900 00000000`00000000 ffffee00`a42df480 : nt!KeBugCheckEx
ffffee00`a42df1e0 fffff806`14cea5e0     : ffffb104`339e7080 00000000`00000000 ffffee00`a42df500 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffee00`a42df2e0 fffff806`14e0275e     : 00000000`00000000 00000000`00000000 ffffb104`26010340 00000000`00000220 : nt!MmAccessFault+0x400
ffffee00`a42df480 fffff806`219232f9     : fffff806`218d26a3 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffee00`a42df618 fffff806`218d26a3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_vgk.sys>+0x1232f9
ffffee00`a42df620 fffff806`218b2dc1     : ffffb104`337e5da0 00000000`00000000 00000000`00000000 ffff8000`0cede180 : afd!AfdTLCloseEndpoint+0x47
ffffee00`a42df660 fffff806`218cf824     : ffffb104`337e5da0 ffffb104`337e5eb0 ffffb104`337e5da0 ffffee00`a42df778 : afd!AfdCloseTransportEndpoint+0x89
ffffee00`a42df740 fffff806`218cfc6c     : ffffb104`28d34d50 ffffb104`337e5da0 ffffb104`3371e460 ffffb104`28d34d50 : afd!AfdCleanupCore+0x3b8
ffffee00`a42df840 fffff806`14ccd805     : ffffb104`3490b970 00000000`00000000 00000000`00000000 ffffb104`3371e460 : afd!AfdDispatch+0xec
ffffee00`a42df880 fffff806`150c297a     : 00000000`00000000 ffffb104`3490b970 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55
ffffee00`a42df8c0 fffff806`150ed6bc     : 00000000`00000000 00000000`00007fd9 ffffffff`00000000 ffffb104`25ef6400 : nt!IopCloseFile+0x17a
ffffee00`a42df950 fffff806`150f138c     : 00000000`000006fc 0000007d`535ff8c8 ffffee00`a42dfaa8 00000180`a96004b0 : nt!ObCloseHandleTableEntry+0x24c
ffffee00`a42dfa90 fffff806`14e05fb8     : ffffb104`339e7000 00000180`aa0b0000 ffffee00`a42dfb80 ffffb104`33a36300 : nt!NtClose+0xec
ffffee00`a42dfb00 00007ffd`6820bf74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`535ff218 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6820bf74


SYMBOL_NAME:  vgk.sys+1232f9

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1232f9

FAILURE_BUCKET_ID:  AV_R_INVALID_vgk.sys!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3d64d291-67d4-9959-5945-89965388792c}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffff868000741998
Arg3: 80000001d7a24867
Arg4: ffff868000341998

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8049

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff868000741998

BUGCHECK_P3: 80000001d7a24867

BUGCHECK_P4: ffff868000341998

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csgo.exe

STACK_TEXT: 
ffffcf07`7e9101f8 fffff803`607494f9     : 00000000`0000001a 00000000`00000403 ffff8680`00741998 80000001`d7a24867 : nt!KeBugCheckEx
ffffcf07`7e910200 fffff803`60749cae     : ffffcf07`7e9107d8 ffffcf07`7e910590 00000000`00000000 ffffcf07`7e9104e0 : nt!MiDeletePteRun+0x17b9
ffffcf07`7e910410 fffff803`6074a88b     : ffffcf07`7e910540 00000000`00000000 ffff8680`00741bf8 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffffcf07`7e910440 fffff803`60722ae0     : 00000000`00000001 ffffcf07`00000000 ffff948c`1b796550 ffff948c`1848f080 : nt!MiDeletePagablePteRange+0x4ab
ffffcf07`7e910750 fffff803`60b0391b     : ffff948c`1848f080 00000000`00000000 ffff948c`00000000 ffff948c`00000000 : nt!MiDeleteVad+0x360
ffffcf07`7e910860 fffff803`60b027af     : ffff948c`1c01b900 ffff948c`1c01b900 ffff948c`1c019c40 ffff948c`1b796080 : nt!MiCleanVad+0x43
ffffcf07`7e910890 fffff803`609f164f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff948c`1b796080 : nt!MmCleanProcessAddressSpace+0x137
ffffcf07`7e910910 fffff803`609e6f96     : ffff948c`1b796080 ffffbd03`12f57630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffcf07`7e910990 fffff803`60a4a7ee     : ffff948c`00000001 00000000`00000001 00000000`00000000 00000000`00f90000 : nt!PspExitThread+0x5f6
ffffcf07`7e910a90 fffff803`60805fb8     : ffff948c`1b796080 ffff948c`1848f080 ffffcf07`7e910b80 ffff948c`1a580080 : nt!NtTerminateProcess+0xde
ffffcf07`7e910b00 00000000`779a1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`2489edf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a1cfc


SYMBOL_NAME:  nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17b9

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffaccf1f209fa8, Address of the instruction which caused the bugcheck
Arg3: ffffaf0c94fc8d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7858

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25527

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffaccf1f209fa8

BUGCHECK_P3: ffffaf0c94fc8d20

BUGCHECK_P4: 0

CONTEXT:  ffffaf0c94fc8d20 -- (.cxr 0xffffaf0c94fc8d20)
rax=000000000000183b rbx=ffffac8c42f4f610 rcx=ffffac8c42af6010
rdx=ff333333ff333333 rsi=ffffac8c461bcab8 rdi=0000000000000200
rip=ffffaccf1f209fa8 rsp=ffffaf0c94fc9720 rbp=ffffac8c42f4f658
 r8=0000000000000000  r9=0000000000000000 r10=ffffaccf1e060090
r11=ffffaf0c94fc9790 r12=0000000000000060 r13=0000000000000060
r14=ffffac8c42f4f644 r15=ffffac8c42f4f640
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
win32kfull+0xb9fa8:
ffffaccf`1f209fa8 8b8a10040000    mov     ecx,dword ptr [rdx+410h] ds:002b:ff333333`ff333743=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
ffffaf0c`94fc9720 ffffac8c`42f4f390     : ffffaf0c`94fc9730 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 : win32kfull+0xb9fa8
ffffaf0c`94fc9728 ffffaf0c`94fc9730     : 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 : 0xffffac8c`42f4f390
ffffaf0c`94fc9730 00000000`00000001     : ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffaf0c`94fc9730
ffffaf0c`94fc9738 ffffaccf`1e055ab1     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffac8c`42f4f610 : 0x1
ffffaf0c`94fc9740 ffffaccf`1f209aa6     : 00000000`00000010 00000000`004e9203 00000000`00000001 00000000`00000004 : win32kbase!UserSessionSwitchLeaveCrit+0x81
ffffaf0c`94fc97b0 00000000`00000010     : 00000000`004e9203 00000000`00000001 00000000`00000004 ffffaf0c`00000005 : win32kfull+0xb9aa6
ffffaf0c`94fc97b8 00000000`004e9203     : 00000000`00000001 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 : 0x10
ffffaf0c`94fc97c0 00000000`00000001     : 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 : 0x4e9203
ffffaf0c`94fc97c8 00000000`00000004     : ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 : 0x1
ffffaf0c`94fc97d0 ffffaf0c`00000005     : ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 ffffac8c`4069b790 : 0x4
ffffaf0c`94fc97d8 ffffaf0c`94fc98b0     : 00000000`00000000 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 : 0xffffaf0c`00000005
ffffaf0c`94fc97e0 00000000`00000000     : 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 ffffffff`80001884 : 0xffffaf0c`94fc98b0


SYMBOL_NAME:  win32kfull+b9fa8

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

STACK_COMMAND:  .cxr 0xffffaf0c94fc8d20 ; kb

BUCKET_ID_FUNC_OFFSET:  b9fa8

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c8562915-20db-1d44-10f6-80418b3fecc4}

Followup:     MachineOwner
---------
 
Memtest yapın.

Vanguard kaldırın. Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd80560b484a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd80560b483f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 30267

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd80560b484a0

BUGCHECK_P3: ffffd80560b483f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd80560b484a0 -- (.trap 0xffffd80560b484a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800d3fac34d8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045ba5ac39 rsp=ffffd80560b48630 rbp=ffff800d3f178cf8
r8=ffff800d32f4f080  r9=ffff800d3f178d00 r10=0000000000000002
r11=ffff96fc85200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
dxgmms2!VidSchWaitForSingleSyncObject+0x13de9:
fffff804`5ba5ac39 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd80560b483f8 -- (.exr 0xffffd80560b483f8)
ExceptionAddress: fffff8045ba5ac39 (dxgmms2!VidSchWaitForSingleSyncObject+0x0000000000013de9)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffd805`60b48178 fffff804`50006569     : 00000000`00000139 00000000`00000003 ffffd805`60b484a0 ffffd805`60b483f8 : nt!KeBugCheckEx
ffffd805`60b48180 fffff804`50006990     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`4fedcaf0 : nt!KiBugCheckDispatch+0x69
ffffd805`60b482c0 fffff804`50004d23     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd805`60b484a0 fffff804`5ba5ac39     : ffff800d`3f5cda70 ffffbe03`00000001 ffff800d`39b32000 00000000`00000abe : nt!KiRaiseSecurityCheckFailure+0x323
ffffd805`60b48630 fffff804`5af3a4e1     : 00000000`00000abe 00000000`00000000 ffffbe03`f8e70da0 ffffffff`ffffff68 : dxgmms2!VidSchWaitForSingleSyncObject+0x13de9
ffffd805`60b486f0 fffff804`5af3afb6     : ffff800d`3e5ee180 00000000`00000004 00000000`00000000 00000000`00000000 : dxgkrnl!WaitForSynchronizationObjectFromGpu+0x651
ffffd805`60b48990 fffff804`5af39e76     : 00000000`00000001 00000000`00000000 ffffd805`60b48b08 00000000`00000000 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpuInternal+0x3f6
ffffd805`60b48ac0 fffff804`50005fb8     : ffff800d`3e5ee180 ffff800d`3c1c1060 00000000`00000000 ffffd805`60b48b80 : dxgkrnl!DxgkWaitForSynchronizationObjectFromGpu+0x16
ffffd805`60b48b00 00007ffd`22675ca4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e5`151ff6d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`22675ca4


SYMBOL_NAME:  dxgmms2!VidSchWaitForSingleSyncObject+13de9

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  13de9

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchWaitForSingleSyncObject

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b7e36f41-8c28-15a4-b4d1-c1c5a5e82d74}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8026d6123a4, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff8026c59c65b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5655

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6602

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8026d6123a4

BUGCHECK_P2: 3

BUGCHECK_P3: fffff8026c59c65b

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff8026e2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8026e20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8026d6123a4

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

TRAP_FRAME:  ffffbb8c7fde89a0 -- (.trap 0xffffbb8c7fde89a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8026c5d0d40 rbx=0000000000000000 rcx=ffffbb8c7fde8b30
rdx=ffffbb8c898f5d98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8026c59c65b rsp=ffffbb8c7fde8b38 rbp=ffffbb8c7fde8d40
r8=fffff8026d6123a4  r9=fffff8026c580000 r10=0000fffff8026c5d
r11=ffff727b61600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
msrpc!NdrpComputeConformance+0x7:
fffff802`6c59c65b 6c              ins     byte ptr [rdi],dx ds:00000000`00000000=??
Resetting default scope

BAD_STACK_POINTER:  ffffbb8c7fde86f8

STACK_TEXT:
ffffbb8c`7fde86f8 fffff802`6da79b57     : 00000000`00000050 fffff802`6d6123a4 00000000`00000003 ffffbb8c`7fde89a0 : nt!KeBugCheckEx
ffffbb8c`7fde8700 fffff802`6d8ea5e0     : 00000000`00000000 00000000`00000003 ffffbb8c`7fde8a20 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffbb8c`7fde8800 fffff802`6da0275e     : ffffbb8c`7fde88d0 ffffbb8c`7fde8a70 ffffbb8c`7fde8a70 ffffbb8c`7fde89f8 : nt!MmAccessFault+0x400
ffffbb8c`7fde89a0 fffff802`6c59c65b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffbb8c`7fde8b38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000018 : msrpc!NdrpComputeConformance+0x7


CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc
    fffff8026c59c65a - msrpc!NdrpComputeConformance+6
    [ 89:c9 ]
1 error : !msrpc (fffff8026c59c65a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8f7e787d2900, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff806219232f9, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12299

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff8f7e787d2900

BUGCHECK_P2: 0

BUGCHECK_P3: fffff806219232f9

BUGCHECK_P4: 2

READ_ADDRESS: fffff806156fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8061560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8f7e787d2900

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffee00a42df480 -- (.trap 0xffffee00a42df480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fc3136e948245489 rbx=0000000000000000 rcx=ffffb1043490c3f0
rdx=ffffee00a42df640 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806219232f9 rsp=ffffee00a42df618 rbp=ffffee00a42df6d9
r8=0000000000000000  r9=fffff806218d7bb0 r10=0000fc3136e94824
r11=ffff6ff851a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po nc
<Unloaded_vgk.sys>+0x1232f9:
fffff806`219232f9 4d0fa313        bt      qword ptr [r11],r10 ds:ffff6ff8`51a00000=????????????????
Resetting default scope

IP_MODULE_UNLOADED:
vgk.sys+1232f9
fffff806`219232f9 4d0fa313        bt      qword ptr [r11],r10

STACK_TEXT:
ffffee00`a42df1d8 fffff806`14e79b57     : 00000000`00000050 ffff8f7e`787d2900 00000000`00000000 ffffee00`a42df480 : nt!KeBugCheckEx
ffffee00`a42df1e0 fffff806`14cea5e0     : ffffb104`339e7080 00000000`00000000 ffffee00`a42df500 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffee00`a42df2e0 fffff806`14e0275e     : 00000000`00000000 00000000`00000000 ffffb104`26010340 00000000`00000220 : nt!MmAccessFault+0x400
ffffee00`a42df480 fffff806`219232f9     : fffff806`218d26a3 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffee00`a42df618 fffff806`218d26a3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : <Unloaded_vgk.sys>+0x1232f9
ffffee00`a42df620 fffff806`218b2dc1     : ffffb104`337e5da0 00000000`00000000 00000000`00000000 ffff8000`0cede180 : afd!AfdTLCloseEndpoint+0x47
ffffee00`a42df660 fffff806`218cf824     : ffffb104`337e5da0 ffffb104`337e5eb0 ffffb104`337e5da0 ffffee00`a42df778 : afd!AfdCloseTransportEndpoint+0x89
ffffee00`a42df740 fffff806`218cfc6c     : ffffb104`28d34d50 ffffb104`337e5da0 ffffb104`3371e460 ffffb104`28d34d50 : afd!AfdCleanupCore+0x3b8
ffffee00`a42df840 fffff806`14ccd805     : ffffb104`3490b970 00000000`00000000 00000000`00000000 ffffb104`3371e460 : afd!AfdDispatch+0xec
ffffee00`a42df880 fffff806`150c297a     : 00000000`00000000 ffffb104`3490b970 00000000`00000000 00000000`00040000 : nt!IofCallDriver+0x55
ffffee00`a42df8c0 fffff806`150ed6bc     : 00000000`00000000 00000000`00007fd9 ffffffff`00000000 ffffb104`25ef6400 : nt!IopCloseFile+0x17a
ffffee00`a42df950 fffff806`150f138c     : 00000000`000006fc 0000007d`535ff8c8 ffffee00`a42dfaa8 00000180`a96004b0 : nt!ObCloseHandleTableEntry+0x24c
ffffee00`a42dfa90 fffff806`14e05fb8     : ffffb104`339e7000 00000180`aa0b0000 ffffee00`a42dfb80 ffffb104`33a36300 : nt!NtClose+0xec
ffffee00`a42dfb00 00007ffd`6820bf74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`535ff218 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6820bf74


SYMBOL_NAME:  vgk.sys+1232f9

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1232f9

FAILURE_BUCKET_ID:  AV_R_INVALID_vgk.sys!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3d64d291-67d4-9959-5945-89965388792c}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffff868000741998
Arg3: 80000001d7a24867
Arg4: ffff868000341998

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8049

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffff868000741998

BUGCHECK_P3: 80000001d7a24867

BUGCHECK_P4: ffff868000341998

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csgo.exe

STACK_TEXT:
ffffcf07`7e9101f8 fffff803`607494f9     : 00000000`0000001a 00000000`00000403 ffff8680`00741998 80000001`d7a24867 : nt!KeBugCheckEx
ffffcf07`7e910200 fffff803`60749cae     : ffffcf07`7e9107d8 ffffcf07`7e910590 00000000`00000000 ffffcf07`7e9104e0 : nt!MiDeletePteRun+0x17b9
ffffcf07`7e910410 fffff803`6074a88b     : ffffcf07`7e910540 00000000`00000000 ffff8680`00741bf8 00000000`00000000 : nt!MiDeleteVaTail+0x6e
ffffcf07`7e910440 fffff803`60722ae0     : 00000000`00000001 ffffcf07`00000000 ffff948c`1b796550 ffff948c`1848f080 : nt!MiDeletePagablePteRange+0x4ab
ffffcf07`7e910750 fffff803`60b0391b     : ffff948c`1848f080 00000000`00000000 ffff948c`00000000 ffff948c`00000000 : nt!MiDeleteVad+0x360
ffffcf07`7e910860 fffff803`60b027af     : ffff948c`1c01b900 ffff948c`1c01b900 ffff948c`1c019c40 ffff948c`1b796080 : nt!MiCleanVad+0x43
ffffcf07`7e910890 fffff803`609f164f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff948c`1b796080 : nt!MmCleanProcessAddressSpace+0x137
ffffcf07`7e910910 fffff803`609e6f96     : ffff948c`1b796080 ffffbd03`12f57630 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffcf07`7e910990 fffff803`60a4a7ee     : ffff948c`00000001 00000000`00000001 00000000`00000000 00000000`00f90000 : nt!PspExitThread+0x5f6
ffffcf07`7e910a90 fffff803`60805fb8     : ffff948c`1b796080 ffff948c`1848f080 ffffcf07`7e910b80 ffff948c`1a580080 : nt!NtTerminateProcess+0xde
ffffcf07`7e910b00 00000000`779a1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`2489edf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779a1cfc


SYMBOL_NAME:  nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  17b9

FAILURE_BUCKET_ID:  0x1a_403_nt!MiDeletePteRun

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffaccf1f209fa8, Address of the instruction which caused the bugcheck
Arg3: ffffaf0c94fc8d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7858

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25527

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffaccf1f209fa8

BUGCHECK_P3: ffffaf0c94fc8d20

BUGCHECK_P4: 0

CONTEXT:  ffffaf0c94fc8d20 -- (.cxr 0xffffaf0c94fc8d20)
rax=000000000000183b rbx=ffffac8c42f4f610 rcx=ffffac8c42af6010
rdx=ff333333ff333333 rsi=ffffac8c461bcab8 rdi=0000000000000200
rip=ffffaccf1f209fa8 rsp=ffffaf0c94fc9720 rbp=ffffac8c42f4f658
r8=0000000000000000  r9=0000000000000000 r10=ffffaccf1e060090
r11=ffffaf0c94fc9790 r12=0000000000000060 r13=0000000000000060
r14=ffffac8c42f4f644 r15=ffffac8c42f4f640
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
win32kfull+0xb9fa8:
ffffaccf`1f209fa8 8b8a10040000    mov     ecx,dword ptr [rdx+410h] ds:002b:ff333333`ff333743=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT:
ffffaf0c`94fc9720 ffffac8c`42f4f390     : ffffaf0c`94fc9730 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 : win32kfull+0xb9fa8
ffffaf0c`94fc9728 ffffaf0c`94fc9730     : 00000000`00000001 ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 : 0xffffac8c`42f4f390
ffffaf0c`94fc9730 00000000`00000001     : ffffaccf`1e055ab1 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffaf0c`94fc9730
ffffaf0c`94fc9738 ffffaccf`1e055ab1     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffac8c`42f4f610 : 0x1
ffffaf0c`94fc9740 ffffaccf`1f209aa6     : 00000000`00000010 00000000`004e9203 00000000`00000001 00000000`00000004 : win32kbase!UserSessionSwitchLeaveCrit+0x81
ffffaf0c`94fc97b0 00000000`00000010     : 00000000`004e9203 00000000`00000001 00000000`00000004 ffffaf0c`00000005 : win32kfull+0xb9aa6
ffffaf0c`94fc97b8 00000000`004e9203     : 00000000`00000001 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 : 0x10
ffffaf0c`94fc97c0 00000000`00000001     : 00000000`00000004 ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 : 0x4e9203
ffffaf0c`94fc97c8 00000000`00000004     : ffffaf0c`00000005 ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 : 0x1
ffffaf0c`94fc97d0 ffffaf0c`00000005     : ffffaf0c`94fc98b0 00000000`00000000 00000000`00000000 ffffac8c`4069b790 : 0x4
ffffaf0c`94fc97d8 ffffaf0c`94fc98b0     : 00000000`00000000 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 : 0xffffaf0c`00000005
ffffaf0c`94fc97e0 00000000`00000000     : 00000000`00000000 ffffac8c`4069b790 00001f80`00000000 ffffffff`80001884 : 0xffffaf0c`94fc98b0


SYMBOL_NAME:  win32kfull+b9fa8

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

STACK_COMMAND:  .cxr 0xffffaf0c94fc8d20 ; kb

BUCKET_ID_FUNC_OFFSET:  b9fa8

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c8562915-20db-1d44-10f6-80418b3fecc4}

Followup:     MachineOwner
---------
Teşekkürler hocam, yaptım. Şu an düzeldi mi diye bir bakacağım. Şu an bir sıkıntı yok.
 
Son düzenleme:

Yeni konular

Geri
Yukarı