Çözüldü Sürekli gelen mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

yunus ereng

Decapat
Katılım
27 Aralık 2020
Mesajlar
58
Daha fazla  
Cinsiyet
Erkek
Sistemim:

RX580.
ASUS A320M-C r2.0.
Ryzen5 3500X.
Teamgroup Elite Plus 16 GB 3200MHz tek RAM.

Sistemi hazır aldım bu yüzden sistemin kurulu olduğu M.2'nin markasını bilmiyorum.
O kadar fazla hata almama rağmen neden 3 tane DMP dosyası var bilmiyorum.


Ve çok can sıkıcı bir hal aldı birkaç defada word belgesi kaydedemeden çöp oldu.
 
Son düzenleyen: Moderatör:
Çözüm
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff807162fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4781

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25592

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff807162fa320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffbc0a45e29490 -- (.trap 0xffffbc0a45e29490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020
rdx=fffff8071586f3e5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80725be1415 rsp=ffffbc0a45e29620 rbp=ffffbc0a45e296b1
 r8=ffff800e9e3cc600  r9=ffffbc0a45e29668 r10=fffff8071586b690
r11=ffff95fcb1400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
amdppm!ComputeProcessorEnergyUsingMsr+0x75:
fffff807`25be1415 0fb68770010000  movzx   eax,byte ptr [rdi+170h] ds:00000000`00000170=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffa600`ab87ce18 fffff807`15a3a988     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffa600`ab87ce20 fffff807`1586f9a3     : 00000809`4d223fc1 ffffa600`ab880180 00000000`00000000 ffffa600`ab880180 : nt!KeAccumulateTicks+0x1c8788
ffffa600`ab87ce80 fffff807`1586f48a     : ffff800e`97ed8480 ffffbc0a`45e29510 fffff807`1fd13e00 00000000`00008302 : nt!KeClockInterruptNotify+0x453
ffffa600`ab87cf30 fffff807`15927ef5     : ffff800e`97ed8480 00000000`00000000 00000000`00000000 fffff03f`40d02380 : nt!HalpTimerClockIpiRoutine+0x1a
ffffa600`ab87cf60 fffff807`159f722a     : ffffbc0a`45e29510 ffff800e`97ed8480 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffa600`ab87cfb0 fffff807`159f7797     : ffff800e`9954bae0 ffff800e`9cd85710 fffff807`00000000 00001f80`00d80210 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbc0a`45e29490 fffff807`25be1415     : 00000000`00000000 ffff800e`9eae5408 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbc0a`45e29620 fffff807`15879142     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`15878b71 : amdppm!ComputeProcessorEnergyUsingMsr+0x75
ffffbc0a`45e29710 fffff807`15878610     : ffffa600`ab883240 ffffbc0a`45e29b30 ffffa600`ab880180 fffff807`16220f00 : nt!PpmCheckComputeEnergy+0x1a2
ffffbc0a`45e297f0 fffff807`1580781e     : ffffa600`ab883240 ffff800e`99179000 00000000`00000004 ffffa600`00000002 : nt!PpmCheckRun+0x40
ffffbc0a`45e29860 fffff807`15806b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffbc0a`45e299d0 fffff807`159f92ee     : ffffffff`00000000 ffffa600`ab880180 ffffa600`ab88b1c0 ffff800e`a3c72080 : nt!KiRetireDpcList+0x1f4
ffffbc0a`45e29c60 00000000`00000000     : ffffbc0a`45e2a000 ffffbc0a`45e24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  amdppm!ComputeProcessorEnergyUsingMsr+75

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

IMAGE_VERSION:  10.0.19041.545

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  75

FAILURE_BUCKET_ID:  0x133_DPC_amdppm!ComputeProcessorEnergyUsingMsr

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fe619131-957a-1b34-a16a-187e2a8f3290}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb081048457d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb08104845728, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8094

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffb081048457d0

BUGCHECK_P3: ffffb08104845728

BUGCHECK_P4: 0

TRAP_FRAME:  ffffb081048457d0 -- (.trap 0xffffb081048457d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80163d29968 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9a09162821a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80165c5fbbd rsp=ffffb08104845960 rbp=00000000000000e5
 r8=0000000000000000  r9=ffffb08104845a50 r10=fffff80163d27ac0
r11=000000473b951417 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!KiRemoveEntryTimer+0x171f5d:
fffff801`65c5fbbd cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffb08104845728 -- (.exr 0xffffb08104845728)
ExceptionAddress: fffff80165c5fbbd (nt!KiRemoveEntryTimer+0x0000000000171f5d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffb081`048454a8 fffff801`65c07769     : 00000000`00000139 00000000`00000003 ffffb081`048457d0 ffffb081`04845728 : nt!KeBugCheckEx
ffffb081`048454b0 fffff801`65c07b90     : 00000047`3b94ed03 fffff801`65a7268e 00000047`000186a0 ffffb900`534f5248 : nt!KiBugCheckDispatch+0x69
ffffb081`048455f0 fffff801`65c05f23     : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb081`048457d0 fffff801`65c5fbbd     : ffff9a09`1386a010 00000000`00000000 ffffffff`00000000 ffff9a09`1386a1f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb081`04845960 fffff801`65a072ae     : 00000000`00000000 00000000`00000000 00000000`00140001 ffffb081`04845a50 : nt!KiRemoveEntryTimer+0x171f5d
ffffb081`048459d0 fffff801`65bf92ee     : ffffffff`00000000 ffffb900`265ea180 ffffb900`265f51c0 ffff9a09`1a873080 : nt!KiRetireDpcList+0x99e
ffffb081`04845c60 00000000`00000000     : ffffb081`04846000 ffffb081`04840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiRemoveEntryTimer+171f5d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  171f5d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5cf1a79f-75db-1c81-82ec-116a11522249}

Followup:     MachineOwner
---------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8094

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffb081048457d0

BUGCHECK_P3: ffffb08104845728

BUGCHECK_P4: 0

TRAP_FRAME:  ffffb081048457d0 -- (.trap 0xffffb081048457d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80163d29968 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9a09162821a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80165c5fbbd rsp=ffffb08104845960 rbp=00000000000000e5
 r8=0000000000000000  r9=ffffb08104845a50 r10=fffff80163d27ac0
r11=000000473b951417 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!KiRemoveEntryTimer+0x171f5d:
fffff801`65c5fbbd cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffb08104845728 -- (.exr 0xffffb08104845728)
ExceptionAddress: fffff80165c5fbbd (nt!KiRemoveEntryTimer+0x0000000000171f5d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffb081`048454a8 fffff801`65c07769     : 00000000`00000139 00000000`00000003 ffffb081`048457d0 ffffb081`04845728 : nt!KeBugCheckEx
ffffb081`048454b0 fffff801`65c07b90     : 00000047`3b94ed03 fffff801`65a7268e 00000047`000186a0 ffffb900`534f5248 : nt!KiBugCheckDispatch+0x69
ffffb081`048455f0 fffff801`65c05f23     : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb081`048457d0 fffff801`65c5fbbd     : ffff9a09`1386a010 00000000`00000000 ffffffff`00000000 ffff9a09`1386a1f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb081`04845960 fffff801`65a072ae     : 00000000`00000000 00000000`00000000 00000000`00140001 ffffb081`04845a50 : nt!KiRemoveEntryTimer+0x171f5d
ffffb081`048459d0 fffff801`65bf92ee     : ffffffff`00000000 ffffb900`265ea180 ffffb900`265f51c0 ffff9a09`1a873080 : nt!KiRetireDpcList+0x99e
ffffb081`04845c60 00000000`00000000     : ffffb081`04846000 ffffb081`04840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiRemoveEntryTimer+171f5d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  171f5d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5cf1a79f-75db-1c81-82ec-116a11522249}

Followup:     MachineOwner
---------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4396

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80772efa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff08910587540 -- (.trap 0xfffff08910587540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff089105877dc rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80772719a4e rsp=fffff089105876d0 rbp=fffff08910587739
 r8=0000000000000000  r9=fffff08910587730 r10=000000000000003f
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiHeteroChooseTargetProcessor+0x52e:
fffff807`72719a4e 7339            jae     nt!KiHeteroChooseTargetProcessor+0x569 (fffff807`72719a89) [br=1]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffff8a00`4bc3fc88 fffff807`7263aa0c     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`72efa320 : nt!KeBugCheckEx
ffff8a00`4bc3fc90 fffff807`7247541d     : 00000759`1bd62999 ffff8a00`4bbea180 00000000`00000246 00000000`00022f32 : nt!KeAccumulateTicks+0x1c880c
ffff8a00`4bc3fcf0 fffff807`724759c1     : 00000000`00021100 00000000`00014d4e ffff8a00`4bbea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8a00`4bc3fd40 fffff807`7246f833     : ffff8a00`4bbea180 00000000`00000000 fffff807`72e31550 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8a00`4bc3fe80 fffff807`724781f2     : fffff089`10587540 fffff089`105875c0 fffff089`10587500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8a00`4bc3ff30 fffff807`72527ef5     : 00000005`355c4477 ffffd98b`526c9e60 ffffd98b`526c9f10 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
ffff8a00`4bc3ff60 fffff807`725f722a     : fffff089`105875c0 ffffd98b`526c9e60 ffff8a00`4ba80180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8a00`4bc3ffb0 fffff807`725f7797     : ffff8a00`4bbea180 fffff089`10587724 00000000`00000008 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff089`10587540 fffff807`72719a4e     : ffffd98b`53010100 fffff807`00000000 ffffd98b`53010340 00000000`000000ff : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff089`105876d0 fffff807`7262c6fc     : ffff8a00`4bbea180 fffff807`72454200 ffffd98b`00000004 fffff089`105877dc : nt!KiHeteroChooseTargetProcessor+0x52e
fffff089`105877a0 fffff807`7244a891     : ffff0102`5b2d6492 ffffd98b`00000002 00000000`00000000 fffff807`7282af81 : nt!KiDeferredReadySingleThread+0x1e1bac
fffff089`10587990 fffff807`7244a31a     : 00000000`00000000 00000000`00000000 ffffd98b`6251c560 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff089`10587a00 fffff807`727fae1d     : ffffd98b`00000000 fffff089`10587b80 fffff089`10587aa8 ffffd98b`5e5501c0 : nt!KeSetEvent+0xea
fffff089`10587a90 fffff807`726071b8     : ffffd98b`5ca52080 00000000`00000000 00000000`00000000 ffffd98b`00000000 : nt!NtSetEvent+0xbd
fffff089`10587b00 00007ffb`3f40c174     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`cb1fe5e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3f40c174


SYMBOL_NAME:  nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c880c

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------

3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2137]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5601
BiosReleaseDate = 07/10/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-C R2.0
BaseBoardVersion = Rev X.0x
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80772efa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
SYMSRV:  BYINDEX: 0x13
         https://msdl.microsoft.com/download/symbols
         win32kbase.sys
         5EBD4C642de000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK
SYMSRV:  BYINDEX: 0x14
         https://msdl.microsoft.com/download/symbols
         Wdf01000.sys
         A9A9D36Ed1000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK
SYMSRV:  BYINDEX: 0x15
         https://msdl.microsoft.com/download/symbols
         storport.sys
         8566CB6Ab0000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV:  BYINDEX: 0x16
         https://msdl.microsoft.com/download/symbols
         storport.sys
         8566CB6Ab0000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV:  BYINDEX: 0x17
         https://msdl.microsoft.com/download/symbols
         Npfs.SYS
         9E3E4C731c000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS - mismatched

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4001

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80772efa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff08910587540 -- (.trap 0xfffff08910587540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff089105877dc rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80772719a4e rsp=fffff089105876d0 rbp=fffff08910587739
 r8=0000000000000000  r9=fffff08910587730 r10=000000000000003f
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiHeteroChooseTargetProcessor+0x52e:
fffff807`72719a4e 7339            jae     nt!KiHeteroChooseTargetProcessor+0x569 (fffff807`72719a89) [br=1]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffff8a00`4bc3fc88 fffff807`7263aa0c     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`72efa320 : nt!KeBugCheckEx
ffff8a00`4bc3fc90 fffff807`7247541d     : 00000759`1bd62999 ffff8a00`4bbea180 00000000`00000246 00000000`00022f32 : nt!KeAccumulateTicks+0x1c880c
ffff8a00`4bc3fcf0 fffff807`724759c1     : 00000000`00021100 00000000`00014d4e ffff8a00`4bbea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8a00`4bc3fd40 fffff807`7246f833     : ffff8a00`4bbea180 00000000`00000000 fffff807`72e31550 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8a00`4bc3fe80 fffff807`724781f2     : fffff089`10587540 fffff089`105875c0 fffff089`10587500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8a00`4bc3ff30 fffff807`72527ef5     : 00000005`355c4477 ffffd98b`526c9e60 ffffd98b`526c9f10 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
ffff8a00`4bc3ff60 fffff807`725f722a     : fffff089`105875c0 ffffd98b`526c9e60 ffff8a00`4ba80180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8a00`4bc3ffb0 fffff807`725f7797     : ffff8a00`4bbea180 fffff089`10587724 00000000`00000008 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff089`10587540 fffff807`72719a4e     : ffffd98b`53010100 fffff807`00000000 ffffd98b`53010340 00000000`000000ff : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff089`105876d0 fffff807`7262c6fc     : ffff8a00`4bbea180 fffff807`72454200 ffffd98b`00000004 fffff089`105877dc : nt!KiHeteroChooseTargetProcessor+0x52e
fffff089`105877a0 fffff807`7244a891     : ffff0102`5b2d6492 ffffd98b`00000002 00000000`00000000 fffff807`7282af81 : nt!KiDeferredReadySingleThread+0x1e1bac
fffff089`10587990 fffff807`7244a31a     : 00000000`00000000 00000000`00000000 ffffd98b`6251c560 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff089`10587a00 fffff807`727fae1d     : ffffd98b`00000000 fffff089`10587b80 fffff089`10587aa8 ffffd98b`5e5501c0 : nt!KeSetEvent+0xea
fffff089`10587a90 fffff807`726071b8     : ffffd98b`5ca52080 00000000`00000000 00000000`00000000 ffffd98b`00000000 : nt!NtSetEvent+0xbd
fffff089`10587b00 00007ffb`3f40c174     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`cb1fe5e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3f40c174


SYMBOL_NAME:  nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c880c

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff807162fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4781

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25592

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff807162fa320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffbc0a45e29490 -- (.trap 0xffffbc0a45e29490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020
rdx=fffff8071586f3e5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80725be1415 rsp=ffffbc0a45e29620 rbp=ffffbc0a45e296b1
 r8=ffff800e9e3cc600  r9=ffffbc0a45e29668 r10=fffff8071586b690
r11=ffff95fcb1400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
amdppm!ComputeProcessorEnergyUsingMsr+0x75:
fffff807`25be1415 0fb68770010000  movzx   eax,byte ptr [rdi+170h] ds:00000000`00000170=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffa600`ab87ce18 fffff807`15a3a988     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffa600`ab87ce20 fffff807`1586f9a3     : 00000809`4d223fc1 ffffa600`ab880180 00000000`00000000 ffffa600`ab880180 : nt!KeAccumulateTicks+0x1c8788
ffffa600`ab87ce80 fffff807`1586f48a     : ffff800e`97ed8480 ffffbc0a`45e29510 fffff807`1fd13e00 00000000`00008302 : nt!KeClockInterruptNotify+0x453
ffffa600`ab87cf30 fffff807`15927ef5     : ffff800e`97ed8480 00000000`00000000 00000000`00000000 fffff03f`40d02380 : nt!HalpTimerClockIpiRoutine+0x1a
ffffa600`ab87cf60 fffff807`159f722a     : ffffbc0a`45e29510 ffff800e`97ed8480 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffa600`ab87cfb0 fffff807`159f7797     : ffff800e`9954bae0 ffff800e`9cd85710 fffff807`00000000 00001f80`00d80210 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffbc0a`45e29490 fffff807`25be1415     : 00000000`00000000 ffff800e`9eae5408 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffbc0a`45e29620 fffff807`15879142     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`15878b71 : amdppm!ComputeProcessorEnergyUsingMsr+0x75
ffffbc0a`45e29710 fffff807`15878610     : ffffa600`ab883240 ffffbc0a`45e29b30 ffffa600`ab880180 fffff807`16220f00 : nt!PpmCheckComputeEnergy+0x1a2
ffffbc0a`45e297f0 fffff807`1580781e     : ffffa600`ab883240 ffff800e`99179000 00000000`00000004 ffffa600`00000002 : nt!PpmCheckRun+0x40
ffffbc0a`45e29860 fffff807`15806b04     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffbc0a`45e299d0 fffff807`159f92ee     : ffffffff`00000000 ffffa600`ab880180 ffffa600`ab88b1c0 ffff800e`a3c72080 : nt!KiRetireDpcList+0x1f4
ffffbc0a`45e29c60 00000000`00000000     : ffffbc0a`45e2a000 ffffbc0a`45e24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  amdppm!ComputeProcessorEnergyUsingMsr+75

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

IMAGE_VERSION:  10.0.19041.545

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  75

FAILURE_BUCKET_ID:  0x133_DPC_amdppm!ComputeProcessorEnergyUsingMsr

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fe619131-957a-1b34-a16a-187e2a8f3290}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb081048457d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb08104845728, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8094

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffb081048457d0

BUGCHECK_P3: ffffb08104845728

BUGCHECK_P4: 0

TRAP_FRAME:  ffffb081048457d0 -- (.trap 0xffffb081048457d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80163d29968 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9a09162821a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80165c5fbbd rsp=ffffb08104845960 rbp=00000000000000e5
 r8=0000000000000000  r9=ffffb08104845a50 r10=fffff80163d27ac0
r11=000000473b951417 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!KiRemoveEntryTimer+0x171f5d:
fffff801`65c5fbbd cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffb08104845728 -- (.exr 0xffffb08104845728)
ExceptionAddress: fffff80165c5fbbd (nt!KiRemoveEntryTimer+0x0000000000171f5d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffb081`048454a8 fffff801`65c07769     : 00000000`00000139 00000000`00000003 ffffb081`048457d0 ffffb081`04845728 : nt!KeBugCheckEx
ffffb081`048454b0 fffff801`65c07b90     : 00000047`3b94ed03 fffff801`65a7268e 00000047`000186a0 ffffb900`534f5248 : nt!KiBugCheckDispatch+0x69
ffffb081`048455f0 fffff801`65c05f23     : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb081`048457d0 fffff801`65c5fbbd     : ffff9a09`1386a010 00000000`00000000 ffffffff`00000000 ffff9a09`1386a1f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb081`04845960 fffff801`65a072ae     : 00000000`00000000 00000000`00000000 00000000`00140001 ffffb081`04845a50 : nt!KiRemoveEntryTimer+0x171f5d
ffffb081`048459d0 fffff801`65bf92ee     : ffffffff`00000000 ffffb900`265ea180 ffffb900`265f51c0 ffff9a09`1a873080 : nt!KiRetireDpcList+0x99e
ffffb081`04845c60 00000000`00000000     : ffffb081`04846000 ffffb081`04840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiRemoveEntryTimer+171f5d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  171f5d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5cf1a79f-75db-1c81-82ec-116a11522249}

Followup:     MachineOwner
---------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8094

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffb081048457d0

BUGCHECK_P3: ffffb08104845728

BUGCHECK_P4: 0

TRAP_FRAME:  ffffb081048457d0 -- (.trap 0xffffb081048457d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80163d29968 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9a09162821a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80165c5fbbd rsp=ffffb08104845960 rbp=00000000000000e5
 r8=0000000000000000  r9=ffffb08104845a50 r10=fffff80163d27ac0
r11=000000473b951417 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!KiRemoveEntryTimer+0x171f5d:
fffff801`65c5fbbd cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffb08104845728 -- (.exr 0xffffb08104845728)
ExceptionAddress: fffff80165c5fbbd (nt!KiRemoveEntryTimer+0x0000000000171f5d)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffb081`048454a8 fffff801`65c07769     : 00000000`00000139 00000000`00000003 ffffb081`048457d0 ffffb081`04845728 : nt!KeBugCheckEx
ffffb081`048454b0 fffff801`65c07b90     : 00000047`3b94ed03 fffff801`65a7268e 00000047`000186a0 ffffb900`534f5248 : nt!KiBugCheckDispatch+0x69
ffffb081`048455f0 fffff801`65c05f23     : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb081`048457d0 fffff801`65c5fbbd     : ffff9a09`1386a010 00000000`00000000 ffffffff`00000000 ffff9a09`1386a1f8 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb081`04845960 fffff801`65a072ae     : 00000000`00000000 00000000`00000000 00000000`00140001 ffffb081`04845a50 : nt!KiRemoveEntryTimer+0x171f5d
ffffb081`048459d0 fffff801`65bf92ee     : ffffffff`00000000 ffffb900`265ea180 ffffb900`265f51c0 ffff9a09`1a873080 : nt!KiRetireDpcList+0x99e
ffffb081`04845c60 00000000`00000000     : ffffb081`04846000 ffffb081`04840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiRemoveEntryTimer+171f5d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  171f5d

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5cf1a79f-75db-1c81-82ec-116a11522249}

Followup:     MachineOwner
---------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4396

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80772efa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff08910587540 -- (.trap 0xfffff08910587540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff089105877dc rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80772719a4e rsp=fffff089105876d0 rbp=fffff08910587739
 r8=0000000000000000  r9=fffff08910587730 r10=000000000000003f
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiHeteroChooseTargetProcessor+0x52e:
fffff807`72719a4e 7339            jae     nt!KiHeteroChooseTargetProcessor+0x569 (fffff807`72719a89) [br=1]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffff8a00`4bc3fc88 fffff807`7263aa0c     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`72efa320 : nt!KeBugCheckEx
ffff8a00`4bc3fc90 fffff807`7247541d     : 00000759`1bd62999 ffff8a00`4bbea180 00000000`00000246 00000000`00022f32 : nt!KeAccumulateTicks+0x1c880c
ffff8a00`4bc3fcf0 fffff807`724759c1     : 00000000`00021100 00000000`00014d4e ffff8a00`4bbea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8a00`4bc3fd40 fffff807`7246f833     : ffff8a00`4bbea180 00000000`00000000 fffff807`72e31550 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8a00`4bc3fe80 fffff807`724781f2     : fffff089`10587540 fffff089`105875c0 fffff089`10587500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8a00`4bc3ff30 fffff807`72527ef5     : 00000005`355c4477 ffffd98b`526c9e60 ffffd98b`526c9f10 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
ffff8a00`4bc3ff60 fffff807`725f722a     : fffff089`105875c0 ffffd98b`526c9e60 ffff8a00`4ba80180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8a00`4bc3ffb0 fffff807`725f7797     : ffff8a00`4bbea180 fffff089`10587724 00000000`00000008 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff089`10587540 fffff807`72719a4e     : ffffd98b`53010100 fffff807`00000000 ffffd98b`53010340 00000000`000000ff : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff089`105876d0 fffff807`7262c6fc     : ffff8a00`4bbea180 fffff807`72454200 ffffd98b`00000004 fffff089`105877dc : nt!KiHeteroChooseTargetProcessor+0x52e
fffff089`105877a0 fffff807`7244a891     : ffff0102`5b2d6492 ffffd98b`00000002 00000000`00000000 fffff807`7282af81 : nt!KiDeferredReadySingleThread+0x1e1bac
fffff089`10587990 fffff807`7244a31a     : 00000000`00000000 00000000`00000000 ffffd98b`6251c560 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff089`10587a00 fffff807`727fae1d     : ffffd98b`00000000 fffff089`10587b80 fffff089`10587aa8 ffffd98b`5e5501c0 : nt!KeSetEvent+0xea
fffff089`10587a90 fffff807`726071b8     : ffffd98b`5ca52080 00000000`00000000 00000000`00000000 ffffd98b`00000000 : nt!NtSetEvent+0xbd
fffff089`10587b00 00007ffb`3f40c174     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`cb1fe5e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3f40c174


SYMBOL_NAME:  nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c880c

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------

3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2137]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5601
BiosReleaseDate = 07/10/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-C R2.0
BaseBoardVersion = Rev X.0x
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80772efa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
SYMSRV:  BYINDEX: 0x13
         https://msdl.microsoft.com/download/symbols
         win32kbase.sys
         5EBD4C642de000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK
SYMSRV:  BYINDEX: 0x14
         https://msdl.microsoft.com/download/symbols
         Wdf01000.sys
         A9A9D36Ed1000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK
SYMSRV:  BYINDEX: 0x15
         https://msdl.microsoft.com/download/symbols
         storport.sys
         8566CB6Ab0000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV:  BYINDEX: 0x16
         https://msdl.microsoft.com/download/symbols
         storport.sys
         8566CB6Ab0000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched
SYMSRV:  BYINDEX: 0x17
         https://msdl.microsoft.com/download/symbols
         Npfs.SYS
         9E3E4C731c000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS - mismatched

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on RTX

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4001

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80772efa320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff08910587540 -- (.trap 0xfffff08910587540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff089105877dc rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80772719a4e rsp=fffff089105876d0 rbp=fffff08910587739
 r8=0000000000000000  r9=fffff08910587730 r10=000000000000003f
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiHeteroChooseTargetProcessor+0x52e:
fffff807`72719a4e 7339            jae     nt!KiHeteroChooseTargetProcessor+0x569 (fffff807`72719a89) [br=1]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffff8a00`4bc3fc88 fffff807`7263aa0c     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`72efa320 : nt!KeBugCheckEx
ffff8a00`4bc3fc90 fffff807`7247541d     : 00000759`1bd62999 ffff8a00`4bbea180 00000000`00000246 00000000`00022f32 : nt!KeAccumulateTicks+0x1c880c
ffff8a00`4bc3fcf0 fffff807`724759c1     : 00000000`00021100 00000000`00014d4e ffff8a00`4bbea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
ffff8a00`4bc3fd40 fffff807`7246f833     : ffff8a00`4bbea180 00000000`00000000 fffff807`72e31550 00000000`00000000 : nt!KiUpdateTime+0x4a1
ffff8a00`4bc3fe80 fffff807`724781f2     : fffff089`10587540 fffff089`105875c0 fffff089`10587500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
ffff8a00`4bc3ff30 fffff807`72527ef5     : 00000005`355c4477 ffffd98b`526c9e60 ffffd98b`526c9f10 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2
ffff8a00`4bc3ff60 fffff807`725f722a     : fffff089`105875c0 ffffd98b`526c9e60 ffff8a00`4ba80180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8a00`4bc3ffb0 fffff807`725f7797     : ffff8a00`4bbea180 fffff089`10587724 00000000`00000008 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff089`10587540 fffff807`72719a4e     : ffffd98b`53010100 fffff807`00000000 ffffd98b`53010340 00000000`000000ff : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff089`105876d0 fffff807`7262c6fc     : ffff8a00`4bbea180 fffff807`72454200 ffffd98b`00000004 fffff089`105877dc : nt!KiHeteroChooseTargetProcessor+0x52e
fffff089`105877a0 fffff807`7244a891     : ffff0102`5b2d6492 ffffd98b`00000002 00000000`00000000 fffff807`7282af81 : nt!KiDeferredReadySingleThread+0x1e1bac
fffff089`10587990 fffff807`7244a31a     : 00000000`00000000 00000000`00000000 ffffd98b`6251c560 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff089`10587a00 fffff807`727fae1d     : ffffd98b`00000000 fffff089`10587b80 fffff089`10587aa8 ffffd98b`5e5501c0 : nt!KeSetEvent+0xea
fffff089`10587a90 fffff807`726071b8     : ffffd98b`5ca52080 00000000`00000000 00000000`00000000 ffffd98b`00000000 : nt!NtSetEvent+0xbd
fffff089`10587b00 00007ffb`3f40c174     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`cb1fe5e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3f40c174


SYMBOL_NAME:  nt!KeAccumulateTicks+1c880c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c880c

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------
 
Çözüm
DDU ile ekran kartı sürücüsünü kaldırın.
En son WHQL sertifikalı sürücüyü kurun.
\SystemRoot\System32\drivers\amdppm.sys.
Panda Security kaldırın.
 
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending.
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff807162fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding this single DPC timeout.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4781.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 25592.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 133.

BUGCHECK_P1: 0.

BUGCHECK_P2: 501.

BUGCHECK_P3: 500.

BUGCHECK_P4: fffff807162fa320.

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED.

TRAP_FRAME: ffffbc0a45e29490 -- (.trap 0xffffbc0a45e29490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020.
rdx=fffff8071586f3e5 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80725be1415 rsp=ffffbc0a45e29620 rbp=ffffbc0a45e296b1.
r8=ffff800e9e3cc600 r9=ffffbc0a45e29668 r10=fffff8071586b690.
r11=ffff95fcb1400000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
amdppm!ComputeProcessorEnergyUsingMsr+0x75:
fffff807`25be1415 0fb68770010000 movzx eax,byte ptr [rdi+170h] ds:00000000`00000170=??
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
ffffa600`ab87ce18 fffff807`15a3a988 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx.
ffffa600`ab87ce20 fffff807`1586f9a3 : 00000809`4d223fc1 ffffa600`ab880180 00000000`00000000 ffffa600`ab880180 : nt!KeAccumulateTicks+0x1c8788.
ffffa600`ab87ce80 fffff807`1586f48a : ffff800e`97ed8480 ffffbc0a`45e29510 fffff807`1fd13e00 00000000`00008302 : nt!KeClockInterruptNotify+0x453.
ffffa600`ab87cf30 fffff807`15927ef5 : ffff800e`97ed8480 00000000`00000000 00000000`00000000 fffff03f`40d02380 : nt!HalpTimerClockIpiRoutine+0x1a.
ffffa600`ab87cf60 fffff807`159f722a : ffffbc0a`45e29510 ffff800e`97ed8480 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5.
ffffa600`ab87cfb0 fffff807`159f7797 : ffff800e`9954bae0 ffff800e`9cd85710 fffff807`00000000 00001f80`00d80210 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa.
ffffbc0a`45e29490 fffff807`25be1415 : 00000000`00000000 ffff800e`9eae5408 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37.
ffffbc0a`45e29620 fffff807`15879142 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`15878b71 : amdppm!ComputeProcessorEnergyUsingMsr+0x75.
ffffbc0a`45e29710 fffff807`15878610 : ffffa600`ab883240 ffffbc0a`45e29b30 ffffa600`ab880180 fffff807`16220f00 : nt!PpmCheckComputeEnergy+0x1a2.
ffffbc0a`45e297f0 fffff807`1580781e : ffffa600`ab883240 ffff800e`99179000 00000000`00000004 ffffa600`00000002 : nt!PpmCheckRun+0x40.
ffffbc0a`45e29860 fffff807`15806b04 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e.
ffffbc0a`45e299d0 fffff807`159f92ee : ffffffff`00000000 ffffa600`ab880180 ffffa600`ab88b1c0 ffff800e`a3c72080 : nt!KiRetireDpcList+0x1f4.
ffffbc0a`45e29c60 00000000`00000000 : ffffbc0a`45e2a000 ffffbc0a`45e24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: amdppm!ComputeProcessorEnergyUsingMsr+75.

MODULE_NAME: amdppm.

IMAGE_NAME: amdppm.sys.

IMAGE_VERSION: 10.0.19041.545.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 75.

FAILURE_BUCKET_ID: 0x133_DPC_amdppm!ComputeProcessorEnergyUsingMsr.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {fe619131-957a-1b34-a16a-187e2a8f3290}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb081048457d0, Address of the trap frame for the exception that caused the bugcheck.
Arg3: ffffb08104845728, Address of the exception record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 2734.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 8094.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 78.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3.

BUGCHECK_P2: ffffb081048457d0.

BUGCHECK_P3: ffffb08104845728.

BUGCHECK_P4: 0.

TRAP_FRAME: ffffb081048457d0 -- (.trap 0xffffb081048457d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80163d29968 rbx=0000000000000000 rcx=0000000000000003.
rdx=ffff9a09162821a0 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80165c5fbbd rsp=ffffb08104845960 rbp=00000000000000e5.
r8=0000000000000000 r9=ffffb08104845a50 r10=fffff80163d27ac0.
r11=000000473b951417 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po cy.
nt!KiRemoveEntryTimer+0x171f5d:
fffff801`65c5fbbd cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffb08104845728 -- (.exr 0xffffb08104845728)
ExceptionAddress: fffff80165c5fbbd (nt!KiRemoveEntryTimer+0x0000000000171f5d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffb081`048454a8 fffff801`65c07769 : 00000000`00000139 00000000`00000003 ffffb081`048457d0 ffffb081`04845728 : nt!KeBugCheckEx.
ffffb081`048454b0 fffff801`65c07b90 : 00000047`3b94ed03 fffff801`65a7268e 00000047`000186a0 ffffb900`534f5248 : nt!KiBugCheckDispatch+0x69.
ffffb081`048455f0 fffff801`65c05f23 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0.
ffffb081`048457d0 fffff801`65c5fbbd : ffff9a09`1386a010 00000000`00000000 ffffffff`00000000 ffff9a09`1386a1f8 : nt!KiRaiseSecurityCheckFailure+0x323.
ffffb081`04845960 fffff801`65a072ae : 00000000`00000000 00000000`00000000 00000000`00140001 ffffb081`04845a50 : nt!KiRemoveEntryTimer+0x171f5d.
ffffb081`048459d0 fffff801`65bf92ee : ffffffff`00000000 ffffb900`265ea180 ffffb900`265f51c0 ffff9a09`1a873080 : nt!KiRetireDpcList+0x99e.
ffffb081`04845c60 00000000`00000000 : ffffb081`04846000 ffffb081`04840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiRemoveEntryTimer+171f5d.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 171f5d.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {5cf1a79f-75db-1c81-82ec-116a11522249}

Followup: MachineOwner.
---------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 2734.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 8094.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 78.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3.

BUGCHECK_P2: ffffb081048457d0.

BUGCHECK_P3: ffffb08104845728.

BUGCHECK_P4: 0.

TRAP_FRAME: ffffb081048457d0 -- (.trap 0xffffb081048457d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80163d29968 rbx=0000000000000000 rcx=0000000000000003.
rdx=ffff9a09162821a0 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80165c5fbbd rsp=ffffb08104845960 rbp=00000000000000e5.
r8=0000000000000000 r9=ffffb08104845a50 r10=fffff80163d27ac0.
r11=000000473b951417 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po cy.
nt!KiRemoveEntryTimer+0x171f5d:
fffff801`65c5fbbd cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffb08104845728 -- (.exr 0xffffb08104845728)
ExceptionAddress: fffff80165c5fbbd (nt!KiRemoveEntryTimer+0x0000000000171f5d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1.
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffb081`048454a8 fffff801`65c07769 : 00000000`00000139 00000000`00000003 ffffb081`048457d0 ffffb081`04845728 : nt!KeBugCheckEx.
ffffb081`048454b0 fffff801`65c07b90 : 00000047`3b94ed03 fffff801`65a7268e 00000047`000186a0 ffffb900`534f5248 : nt!KiBugCheckDispatch+0x69.
ffffb081`048455f0 fffff801`65c05f23 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0.
ffffb081`048457d0 fffff801`65c5fbbd : ffff9a09`1386a010 00000000`00000000 ffffffff`00000000 ffff9a09`1386a1f8 : nt!KiRaiseSecurityCheckFailure+0x323.
ffffb081`04845960 fffff801`65a072ae : 00000000`00000000 00000000`00000000 00000000`00140001 ffffb081`04845a50 : nt!KiRemoveEntryTimer+0x171f5d.
ffffb081`048459d0 fffff801`65bf92ee : ffffffff`00000000 ffffb900`265ea180 ffffb900`265f51c0 ffff9a09`1a873080 : nt!KiRetireDpcList+0x99e.
ffffb081`04845c60 00000000`00000000 : ffffb081`04846000 ffffb081`04840000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiRemoveEntryTimer+171f5d.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 171f5d.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {5cf1a79f-75db-1c81-82ec-116a11522249}

Followup: MachineOwner.
---------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4374.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 4396.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 133.

BUGCHECK_P1: 1.

BUGCHECK_P2: 1e00.

BUGCHECK_P3: fffff80772efa320.

BUGCHECK_P4: 0.

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED.

TRAP_FRAME: fffff08910587540 -- (.trap 0xfffff08910587540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff089105877dc rbx=0000000000000000 rcx=0000000000000000.
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80772719a4e rsp=fffff089105876d0 rbp=fffff08910587739.
r8=0000000000000000 r9=fffff08910587730 r10=000000000000003f.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!KiHeteroChooseTargetProcessor+0x52e:
fffff807`72719a4e 7339 jae nt!KiHeteroChooseTargetProcessor+0x569 (fffff807`72719a89) [br=1]
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
ffff8a00`4bc3fc88 fffff807`7263aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`72efa320 : nt!KeBugCheckEx.
ffff8a00`4bc3fc90 fffff807`7247541d : 00000759`1bd62999 ffff8a00`4bbea180 00000000`00000246 00000000`00022f32 : nt!KeAccumulateTicks+0x1c880c.
ffff8a00`4bc3fcf0 fffff807`724759c1 : 00000000`00021100 00000000`00014d4e ffff8a00`4bbea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d.
ffff8a00`4bc3fd40 fffff807`7246f833 : ffff8a00`4bbea180 00000000`00000000 fffff807`72e31550 00000000`00000000 : nt!KiUpdateTime+0x4a1.
ffff8a00`4bc3fe80 fffff807`724781f2 : fffff089`10587540 fffff089`105875c0 fffff089`10587500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3.
ffff8a00`4bc3ff30 fffff807`72527ef5 : 00000005`355c4477 ffffd98b`526c9e60 ffffd98b`526c9f10 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2.
ffff8a00`4bc3ff60 fffff807`725f722a : fffff089`105875c0 ffffd98b`526c9e60 ffff8a00`4ba80180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5.
ffff8a00`4bc3ffb0 fffff807`725f7797 : ffff8a00`4bbea180 fffff089`10587724 00000000`00000008 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa.
fffff089`10587540 fffff807`72719a4e : ffffd98b`53010100 fffff807`00000000 ffffd98b`53010340 00000000`000000ff : nt!KiInterruptDispatchNoLockNoEtw+0x37.
fffff089`105876d0 fffff807`7262c6fc : ffff8a00`4bbea180 fffff807`72454200 ffffd98b`00000004 fffff089`105877dc : nt!KiHeteroChooseTargetProcessor+0x52e.
fffff089`105877a0 fffff807`7244a891 : ffff0102`5b2d6492 ffffd98b`00000002 00000000`00000000 fffff807`7282af81 : nt!KiDeferredReadySingleThread+0x1e1bac.
fffff089`10587990 fffff807`7244a31a : 00000000`00000000 00000000`00000000 ffffd98b`6251c560 00000000`00000000 : nt!KiExitDispatcher+0x141.
fffff089`10587a00 fffff807`727fae1d : ffffd98b`00000000 fffff089`10587b80 fffff089`10587aa8 ffffd98b`5e5501c0 : nt!KeSetEvent+0xea.
fffff089`10587a90 fffff807`726071b8 : ffffd98b`5ca52080 00000000`00000000 00000000`00000000 ffffd98b`00000000 : nt!NtSetEvent+0xbd.
fffff089`10587b00 00007ffb`3f40c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000d8`cb1fe5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3f40c174.

SYMBOL_NAME: nt!KeAccumulateTicks+1c880c.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1c880c.

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner.
---------

3: kd> !sysinfo machineid.
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2137]
BiosMajorRelease = 5.
BiosMinorRelease = 13.
BiosVendor = American Megatrends Inc.
BiosVersion = 5601.
BiosReleaseDate = 07/10/2020.
SystemManufacturer = System manufacturer.
SystemProductName = System Product Name.
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version.
SystemSKU = SKU.
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-C R2.0.
BaseBoardVersion = Rev X.0x.
3: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at.
DISPATCH_LEVEL or above. The offending component can usually be.
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80772efa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding the cumulative timeout.
Arg4: 0000000000000000.

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
SYMSRV: BYINDEX: 0x13.
https://msdl.microsoft.com/download/symbols
win32kbase.sys.
5EBD4C642de000.
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys.
SYMSRV: RESULT: 0x00000000.
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK.
SYMSRV: BYINDEX: 0x14.
https://msdl.microsoft.com/download/symbols
Wdf01000.sys.
A9A9D36Ed1000.
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys.
SYMSRV: RESULT: 0x00000000.
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK.
SYMSRV: BYINDEX: 0x15.
https://msdl.microsoft.com/download/symbols
storport.sys.
8566CB6Ab0000.
SYMSRV: PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys.
SYMSRV: RESULT: 0x00000000.
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched.
SYMSRV: BYINDEX: 0x16.
https://msdl.microsoft.com/download/symbols
storport.sys.
8566CB6Ab0000.
SYMSRV: PATH: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys.
SYMSRV: RESULT: 0x00000000.
DBGHELP: C:\ProgramData\Dbg\sym\storport.sys\8566CB6Ab0000\storport.sys - mismatched.
SYMSRV: BYINDEX: 0x17.
https://msdl.microsoft.com/download/symbols
Npfs.SYS.
9E3E4C731c000.
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS.
SYMSRV: RESULT: 0x00000000.
DBGHELP: C:\ProgramData\Dbg\sym\Npfs.SYS\9E3E4C731c000\Npfs.SYS - mismatched.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3999.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on RTX.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 4001.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 133.

BUGCHECK_P1: 1.

BUGCHECK_P2: 1e00.

BUGCHECK_P3: fffff80772efa320.

BUGCHECK_P4: 0.

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED.

TRAP_FRAME: fffff08910587540 -- (.trap 0xfffff08910587540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff089105877dc rbx=0000000000000000 rcx=0000000000000000.
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80772719a4e rsp=fffff089105876d0 rbp=fffff08910587739.
r8=0000000000000000 r9=fffff08910587730 r10=000000000000003f.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!KiHeteroChooseTargetProcessor+0x52e:
fffff807`72719a4e 7339 jae nt!KiHeteroChooseTargetProcessor+0x569 (fffff807`72719a89) [br=1]
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
ffff8a00`4bc3fc88 fffff807`7263aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`72efa320 : nt!KeBugCheckEx.
ffff8a00`4bc3fc90 fffff807`7247541d : 00000759`1bd62999 ffff8a00`4bbea180 00000000`00000246 00000000`00022f32 : nt!KeAccumulateTicks+0x1c880c.
ffff8a00`4bc3fcf0 fffff807`724759c1 : 00000000`00021100 00000000`00014d4e ffff8a00`4bbea180 00000000`00000001 : nt!KiUpdateRunTime+0x5d.
ffff8a00`4bc3fd40 fffff807`7246f833 : ffff8a00`4bbea180 00000000`00000000 fffff807`72e31550 00000000`00000000 : nt!KiUpdateTime+0x4a1.
ffff8a00`4bc3fe80 fffff807`724781f2 : fffff089`10587540 fffff089`105875c0 fffff089`10587500 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3.
ffff8a00`4bc3ff30 fffff807`72527ef5 : 00000005`355c4477 ffffd98b`526c9e60 ffffd98b`526c9f10 00000000`00000000 : nt!HalpTimerClockInterrupt+0xe2.
ffff8a00`4bc3ff60 fffff807`725f722a : fffff089`105875c0 ffffd98b`526c9e60 ffff8a00`4ba80180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5.
ffff8a00`4bc3ffb0 fffff807`725f7797 : ffff8a00`4bbea180 fffff089`10587724 00000000`00000008 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa.
fffff089`10587540 fffff807`72719a4e : ffffd98b`53010100 fffff807`00000000 ffffd98b`53010340 00000000`000000ff : nt!KiInterruptDispatchNoLockNoEtw+0x37.
fffff089`105876d0 fffff807`7262c6fc : ffff8a00`4bbea180 fffff807`72454200 ffffd98b`00000004 fffff089`105877dc : nt!KiHeteroChooseTargetProcessor+0x52e.
fffff089`105877a0 fffff807`7244a891 : ffff0102`5b2d6492 ffffd98b`00000002 00000000`00000000 fffff807`7282af81 : nt!KiDeferredReadySingleThread+0x1e1bac.
fffff089`10587990 fffff807`7244a31a : 00000000`00000000 00000000`00000000 ffffd98b`6251c560 00000000`00000000 : nt!KiExitDispatcher+0x141.
fffff089`10587a00 fffff807`727fae1d : ffffd98b`00000000 fffff089`10587b80 fffff089`10587aa8 ffffd98b`5e5501c0 : nt!KeSetEvent+0xea.
fffff089`10587a90 fffff807`726071b8 : ffffd98b`5ca52080 00000000`00000000 00000000`00000000 ffffd98b`00000000 : nt!NtSetEvent+0xbd.
fffff089`10587b00 00007ffb`3f40c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000d8`cb1fe5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`3f40c174.

SYMBOL_NAME: nt!KeAccumulateTicks+1c880c.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1c880c.

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner.
---------

[Çözüldü] yazdığınız maddelerin hepsini sırasıyla yaptım, sonrasında Codwarzone'a girip 15 dk. Sonra çıkınca ekran hafif bir mor tonuna döndü ve yeniden başlatınca düzelmiyor. Radeon Software kaynaklı olabilir diye düşünüyorum,(Radeon Software ayarları> ekran>özel renk seçeneğini devre dışı bırakınca düzelttim) yukarıdakileri yaptıktan hemen sonra böyle bir olay yaşadığım için yeni konu açmama gereği duydum yanlış yapmışsam düzeltin.
 
Son düzenleme:

Yeni konular

Geri
Yukarı