*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff80537870da4, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7171
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 21742
Key : Analysis.Init.CPU.mSec
Value: 843
Key : Analysis.Init.Elapsed.mSec
Value: 2292
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000096
BUGCHECK_P2: fffff80537870da4
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: 5b30c48348fffe55 -- (.trap 0x5b30c48348fffe55)
Unable to read trap frame at 5b30c483`48fffe55
STACK_TEXT:
ffff9c01`33cff158 fffff805`37af52ce : 00000000`0000001e ffffffff`c0000096 fffff805`37870da4 00000000`00000000 : nt!KeBugCheckEx
ffff9c01`33cff160 fffff805`379fed02 : fffff805`37af52ac 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffff9c01`33cff1a0 fffff805`3792bff7 : ffff9c01`33cff710 00000000`00000000 ffff9904`3587dc60 fffff805`379f9964 : nt!RtlpExecuteHandlerForException+0x12
ffff9c01`33cff1d0 fffff805`3792abe6 : ffff9904`3587d4b8 ffff9c01`33cffe20 ffff9904`3587d4b8 0000bba1`8458cc5f : nt!RtlDispatchException+0x297
ffff9c01`33cff8f0 fffff805`379f6cd2 : 79c085ff`9770bbe8 5de8cb8b`48c4eb0a 5b30c483`48fffe55 cccccccc`ccccccc3 : nt!KiDispatchException+0x186
ffff9c01`33cfffb0 fffff805`379f6ca0 : fffff805`37a07ea5 ffff9c01`33cad100 ffff9904`3587d400 ffffffff`ffffffff : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff9904`3587d378 fffff805`37a07ea5 : ffff9c01`33cad100 ffff9904`3587d400 ffffffff`ffffffff fffff805`37959b77 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff9904`3587d380 fffff805`37a03be0 : fffff805`379626c0 fffff805`3790520b fffff805`379626a0 fffff805`378fd6b7 : nt!KiExceptionDispatch+0x125
ffff9904`3587d560 fffff805`37870da4 : ffffe002`f24c7010 00000000`00000000 ffffe002`f24c7010 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
ffff9904`3587d6f0 fffff805`37870154 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0xad4
ffff9904`3587daf0 fffff805`379f9964 : ffffffff`00000000 ffff9c01`33cb0240 ffffe002`f4528080 00000000`00000990 : nt!PoIdle+0x374
ffff9904`3587dc60 00000000`00000000 : ffff9904`3587e000 ffff9904`35878000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdleExecuteTransition+ad4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ad4
FAILURE_BUCKET_ID: 0x1E_c0000096_nt!PpmIdleExecuteTransition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fb93349e-0bea-ae2d-3a7a-47e59649fd8e}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb685598ca600, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb685598ca558, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12783
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 3077
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffb685598ca600
BUGCHECK_P3: ffffb685598ca558
BUGCHECK_P4: 0
TRAP_FRAME: ffffb685598ca600 -- (.trap 0xffffb685598ca600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8d06f9b73158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8d06f4b51158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80538c35de3 rsp=ffffb685598ca790 rbp=0000000000000001
r8=0000000000000001 r9=00000000000000ff r10=0000000000000037
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSelectReadyThread+0x1cf863:
fffff805`38c35de3 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb685598ca558 -- (.exr 0xffffb685598ca558)
ExceptionAddress: fffff80538c35de3 (nt!KiSelectReadyThread+0x00000000001cf863)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb685`598ca2d8 fffff805`38c07d69 : 00000000`00000139 00000000`00000003 ffffb685`598ca600 ffffb685`598ca558 : nt!KeBugCheckEx
ffffb685`598ca2e0 fffff805`38c08190 : 00000000`00000000 00000000`00000000 fffff805`38aed580 fffff805`38ae8fe0 : nt!KiBugCheckDispatch+0x69
ffffb685`598ca420 fffff805`38c06523 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb685`598ca600 fffff805`38c35de3 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb685`598ca790 fffff805`38a65570 : ffffc901`00000008 00000000`ffffffff 00000000`0000000b ffff8d06`f4b51158 : nt!KiSelectReadyThread+0x1cf863
ffffb685`598ca820 fffff805`38a64d7f : ffff8d06`f3bdf080 00000000`00000000 ffffb685`598ca9e0 00000000`00000000 : nt!KiSwapThread+0x220
ffffb685`598ca8d0 fffff805`38a64623 : ffff8d06`000000a8 fffff805`00000000 fffff805`37035101 ffff8d06`f3bdf1c0 : nt!KiCommitThreadWait+0x14f
ffffb685`598ca970 fffff805`38e2cb91 : ffff8d06`f5071260 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffb685`598caa60 fffff805`38e2cc3a : ffff8d06`f3bdf080 000000bd`9b8ffa88 00000000`00000000 fffff805`38c077de : nt!ObWaitForSingleObject+0x91
ffffb685`598caac0 fffff805`38c077b8 : 00000255`1e31dd20 00000000`00000000 ffffb685`598cab18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffb685`598cab00 00007ff8`c1aacda4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`9b8ffa58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c1aacda4
SYMBOL_NAME: nt!KiSwapThread+220
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 220
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {364d2a10-fb5b-e8e9-9b5b-39c85a1b5a41}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8034a4fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7640
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13848
Key : Analysis.Init.CPU.mSec
Value: 1062
Key : Analysis.Init.Elapsed.mSec
Value: 3161
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8034a4fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffff810523984860 -- (.trap 0xffff810523984860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c0000001 rbx=0000000000000000 rcx=00000000c0000001
rdx=ffffc40f97e056ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80349a3c840 rsp=ffff8105239849f0 rbp=7ffffffffffffffc
r8=0000000000000000 r9=0000000000000001 r10=000000000000018c
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExpWaitForSpinLockExclusiveAndAcquire+0x50:
fffff803`49a3c840 4080ffff cmp dil,0FFh
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.925_none_e76d4f6f260a6
STACK_TEXT:
ffff8105`239849f0 fffff803`49aa3849 : fffff803`4a4e2950 7fffffff`fffffffc ffffc40f`97e05690 ffff9980`e89d8180 : nt!ExpWaitForSpinLockExclusiveAndAcquire+0x50
ffff8105`23984a20 fffff803`49b41192 : 00000000`00000001 ffffc40f`00000000 ffff8105`23984ab0 fffff803`46b9b7ce : nt!ExAcquireSpinLockExclusiveAtDpcLevel+0x79
ffff8105`23984a50 fffff803`49a603dd : ffffc40f`97e05040 00000000`00000000 ffffc40f`97455b38 fffff803`46b7d440 : nt!KiAbEntryRemoveFromTree+0xb2
ffff8105`23984ae0 fffff803`49b59df8 : ffffc40f`97455b38 00000000`00000003 00000000`00000002 fffff803`00000000 : nt!KeAbPreAcquire+0x15d
ffff8105`23984b30 fffff803`49a60232 : 00000000`00000000 00000000`00000000 ffffc40f`97455b38 fffff803`49af6391 : nt!ExpAcquireFastMutexContended+0x98
ffff8105`23984b70 fffff803`46b984e6 : 00000000`00000000 ffffc40f`00000000 ffffc40f`00000000 ffffc40f`952d63f8 : nt!ExAcquireFastMutex+0x162
ffff8105`23984bc0 fffff803`46b9bfa0 : ffffc40f`976b6010 ffffc40f`976ecbf0 ffffc40f`952d6010 ffffc40f`a7f6ec50 : FLTMGR!TargetedIOCtrlAttachAsFoCtx+0xe6
ffff8105`23984c00 fffff803`46b66d57 : 00000000`00000060 ffffc40f`a7ebb5e8 ffff8609`059e0c40 fffff803`46b65b37 : FLTMGR!FltpSetIoTargetInFileObject+0xc0
ffff8105`23984c50 fffff803`46b9bbd4 : ffff8105`23984d00 ffffc40f`a7f6eca8 ffffc40f`976ecbf0 ffffc40f`976ecbf0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x317
ffff8105`23984cc0 fffff803`49a52f55 : 00000000`00000001 ffffc40f`975948f0 00000000`00000060 ffffc40f`a7ebb5e8 : FLTMGR!FltpCreate+0x324
ffff8105`23984d70 fffff803`49a54544 : 00000000`00000003 ffffc40f`952d6010 ffffc40f`6d4e6f49 fffff803`49b0ade2 : nt!IofCallDriver+0x55
ffff8105`23984db0 fffff803`49dff03d : ffff8105`23985000 ffffc40f`975948f0 ffffc40f`a7f6ece8 ffff8105`00000000 : nt!IoCallDriverWithTracing+0x34
ffff8105`23984e00 fffff803`49ec5dc7 : ffffc40f`976ecbf0 00000000`00000000 ffffc40f`a5ecfae0 00000000`00120000 : nt!IopParseDevice+0x117d
ffff8105`23984f70 fffff803`49e27a0e : fffff803`49ec5d00 ffff8105`239850e0 ffffc40f`a5ecfae0 ffffc40f`a7f694a0 : nt!IopParseFile+0xc7
ffff8105`23984fe0 fffff803`49deb30a : ffffc40f`a5ecfa00 ffff8105`23985248 ffffc40f`00000240 ffffc40f`952f5220 : nt!ObpLookupObjectName+0x3fe
ffff8105`239851b0 fffff803`49e6d63f : 00000000`00000000 ffff8105`23985830 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
ffff8105`239852e0 fffff803`49e6d0fd : ffff8105`239856f8 ffff8105`23985458 ffff8105`23985830 ffff8105`23985750 : nt!IopCreateFile+0x40f
ffff8105`23985380 fffff803`46b9d453 : 00000000`00000000 ffff8105`239854d9 ffffc40f`a7ebb5e8 00000000`00000000 : nt!IoCreateFileEx+0x11d
ffff8105`23985420 fffff803`46b9d6b7 : 00000000`00000000 ffff8105`23985760 ffff8105`23985830 fffff803`49b59e5f : FLTMGR!FltpCreateFile+0x16f
ffff8105`23985510 fffff803`4c9becc3 : ffffc40f`97455980 00000000`00000000 ffff8105`239856f8 ffff8105`239856d8 : FLTMGR!FltCreateFileEx2+0xe7
ffff8105`23985640 fffff803`49e3a998 : ffffc40f`a48f8030 ffffc40f`a6e37a00 ffff8608`efed9b30 ffff8105`23985930 : fileinfo!FIPfInterfaceOpen+0x3e3
ffff8105`23985800 fffff803`49e3a074 : ffff8609`062d5818 ffffffff`fffdb610 ffff8105`23985ac0 ffffffff`80004638 : nt!PfpOpenHandleCreate+0xdc
ffff8105`239858d0 fffff803`49e39cd5 : 00000000`0000006c ffff8105`23985b00 ffff8609`0630d8e2 ffff8609`00000000 : nt!PfSnGetSectionObject+0x11c
ffff8105`23985a00 fffff803`49a25975 : ffffc40f`97e05040 ffffc40f`97e05040 ffffc40f`9527ece0 00000000`00000000 : nt!PfSnPopulateReadList+0x2b5
ffff8105`23985b70 fffff803`49b17e85 : ffffc40f`97e05040 00000000`00000080 ffffc40f`95287040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffff8105`23985c10 fffff803`49bfd498 : ffff9980`e89d8180 ffffc40f`97e05040 fffff803`49b17e30 0d1e0d8d`4c302444 : nt!PspSystemThreadStartup+0x55
ffff8105`23985c60 00000000`00000000 : ffff8105`23986000 ffff8105`23980000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
STACK_COMMAND: .trap 0xffff810523984860 ; kb
SYMBOL_NAME: fileinfo!FIPfInterfaceOpen+3e3
MODULE_NAME: fileinfo
IMAGE_NAME: fileinfo.sys
IMAGE_VERSION: 10.0.19041.1030
BUCKET_ID_FUNC_OFFSET: 3e3
FAILURE_BUCKET_ID: 0x133_ISR_fileinfo!FIPfInterfaceOpen
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fba07f51-4d5a-1de2-5d4a-3f60ef2056ae}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff898142f08a70, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff898142f089c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8749
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 39010
Key : Analysis.Init.CPU.mSec
Value: 1015
Key : Analysis.Init.Elapsed.mSec
Value: 3346
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff898142f08a70
BUGCHECK_P3: ffff898142f089c8
BUGCHECK_P4: 0
TRAP_FRAME: ffff898142f08a70 -- (.trap 0xffff898142f08a70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbf8b30713d48 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbf8b370cdbb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80170bb1296 rsp=ffff898142f08c00 rbp=ffffbf8b30713d40
r8=ffff898142f08c78 r9=ffffbf8b370cda20 r10=0000000000000000
r11=ffffbf8b33e9d080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
FLTMGR!FltpLinkCompletionNodeToInstance+0xa9d6:
fffff801`70bb1296 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff898142f089c8 -- (.exr 0xffff898142f089c8)
ExceptionAddress: fffff80170bb1296 (FLTMGR!FltpLinkCompletionNodeToInstance+0x000000000000a9d6)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff8981`42f08748 fffff801`71a07d69 : 00000000`00000139 00000000`00000003 ffff8981`42f08a70 ffff8981`42f089c8 : nt!KeBugCheckEx
ffff8981`42f08750 fffff801`71a08190 : 00000000`00000012 00000000`00000000 00000000`00000000 ffffbf8b`21ef6400 : nt!KiBugCheckDispatch+0x69
ffff8981`42f08890 fffff801`71a06523 : 00000000`00000000 ffffbf8b`21ef6400 ffffbf8b`22010100 fffff801`7184caf2 : nt!KiFastFailDispatch+0xd0
ffff8981`42f08a70 fffff801`70bb1296 : ffffbf8b`370cdba8 00000000`00000000 00000000`00000000 fffff801`71860725 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8981`42f08c00 fffff801`70ba638f : ffff8981`42f08d29 ffffbf8b`27fb9ba0 ffffbf8b`370cda20 00000000`00000000 : FLTMGR!FltpLinkCompletionNodeToInstance+0xa9d6
ffff8981`42f08c70 fffff801`70ba5b37 : ffff8981`42f08e00 00320065`006d0005 00000000`00000000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x66f
ffff8981`42f08d90 fffff801`70ba4b46 : ffff8981`42f0a000 ffff8981`42f04000 00000000`00000000 ffff8981`42f08eb0 : FLTMGR!FltpPassThroughInternal+0xc7
ffff8981`42f08de0 fffff801`70ba48bb : ffffa809`e2200100 00000000`00000000 ffffa809`e2200340 ffffa809`e22003ff : FLTMGR!FltpPassThrough+0x1d6
ffff8981`42f08e80 fffff801`71852f55 : ffffbf8b`34e063b0 fffff801`71852f97 00000000`0000000d ffff8981`00000004 : FLTMGR!FltpDispatch+0x8b
ffff8981`42f08ee0 fffff801`71bdb1d6 : ffffa80a`17edf4b0 ffffbf8b`34e063b0 ffffbf8b`272eace0 00000000`000000d0 : nt!IofCallDriver+0x55
ffff8981`42f08f20 fffff801`71bdae00 : 00000000`00000000 ffffbf8b`32a800c0 ffffa80a`17edf4b0 ffffa80a`17edf4a0 : nt!IopGetFileInformation+0xe2
ffff8981`42f08fa0 fffff801`71bdab9e : ffffbf8b`32a800c0 ffffbf8b`00000000 ffff8981`42f09101 ffffa80a`17edf4a0 : nt!IopQueryNameInternal+0x21c
ffff8981`42f09050 fffff801`71bdbfb1 : ffffbf8b`32a800c0 ffff8981`42f09b80 ffffbf8b`000000d0 00000000`119dec90 : nt!IoQueryFileDosDeviceName+0x5e
ffff8981`42f090a0 fffff801`71a077b8 : 00000000`119dfda0 00000000`0a3e9000 00000000`00000000 00000000`11adf0cc : nt!NtQueryInformationProcess+0x491
ffff8981`42f09a90 00007ffa`319ed044 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`119de378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`319ed044
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------