Yeni Sistemde Mavi Ekran Hatası

MemTest86 ile belleklerinizi test eder misiniz?
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff800192917770, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8001929176c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-AF2QT03

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 65418

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff800192917770

BUGCHECK_P3: ffff8001929176c8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff800192917770 -- (.trap 0xffff800192917770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9580eadbea80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe185f2b99158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80618435ff8 rsp=ffff800192917900 rbp=ffff9580eadb9180
r8=0000000000000002  r9=000000750a625e15 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x528:
fffff806`18435ff8 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8001929176c8 -- (.exr 0xffff8001929176c8)
ExceptionAddress: fffff80618435ff8 (nt!KiCommitThreadWait+0x0000000000000528)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff8001`92917448 fffff806`185d4b29     : 00000000`00000139 00000000`00000003 ffff8001`92917770 ffff8001`929176c8 : nt!KeBugCheckEx
ffff8001`92917450 fffff806`185d4f50     : ffff8001`00000000 fffff806`00000000 ffff8001`92917900 ffffcb0d`399f8910 : nt!KiBugCheckDispatch+0x69
ffff8001`92917590 fffff806`185d32e3     : 00000000`00000000 00000000`00000000 00000000`0000000a 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8001`92917770 fffff806`18435ff8     : 00000001`0000000a 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8001`92917900 fffff806`184353b5     : 00000000`00000000 00000000`00000000 ffff9580`eadb9180 00000000`00000000 : nt!KiCommitThreadWait+0x528
ffff8001`929179a0 fffff806`189dc0cb     : ffffe185`e9571fe0 ffffe185`00000006 00000000`00000001 ffff8001`92917b00 : nt!KeWaitForSingleObject+0x255
ffff8001`92917a80 fffff806`185d4558     : ffffe185`eaa7a080 00000027`967fee28 ffff8001`92917b18 ffffffff`ff776f10 : nt!NtWaitForSingleObject+0x10b
ffff8001`92917b00 00007ff9`3e83c144     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000027`967fedf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3e83c144


SYMBOL_NAME:  nt!KiCommitThreadWait+528

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  528

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {369b7001-cfef-011b-6243-985c04f34d42}

Followup:     MachineOwner
---------




SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80070c5aace, Address of the instruction which caused the bugcheck
Arg3: ffffd2026ad24dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2733

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10436

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80070c5aace

BUGCHECK_P3: ffffd2026ad24dd0

BUGCHECK_P4: 0

CONTEXT:  ffffd2026ad24dd0 -- (.cxr 0xffffd2026ad24dd0)
rax=0000000000000001 rbx=ffffd40dd782c240 rcx=0000000000000034
rdx=000000000000002f rsi=ffffd40dd53d4380 rdi=0000000000000000
rip=fffff80070c5aace rsp=ffffd2026ad257c0 rbp=ffffd2026ad25b80
r8=ffffd40dd3dfa042 r9=0000000000000002 r10=00000000ffffffff
r11=0000000000000009 r12=ffffd40dda908080 r13=ffffd40dd53d4380
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!IopCompleteRequest+0x8e:
fffff800`70c5aace 8327cf and dword ptr [rdi],0FFFFFFCFh ds:002b:00000000`00000000=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

IRP_ADDRESS: ffffd40dd782c1d8

STACK_TEXT:
ffffd202`6ad257c0 fffff800`70c39e3d     : ffffd40d`d782c250 fffff800`70c2c401 ffffd40d`d782c200 0000020d`82133320 : nt!IopCompleteRequest+0x8e
ffffd202`6ad258b0 fffff800`711e1ec0 : ffffd202`6ad25a20 000000a5`325ffa28 00000000`00000401 fffff312`59dd93ff : nt!IoRemoveIoCompletion+0x26d
ffffd202`6ad259d0 fffff800`70dd4558 : ffffd40d`da908080 000000a5`325ffa08 ffffd202`6ad25aa8 0000020d`82133320 : nt!NtRemoveIoCompletion+0x140
ffffd202`6ad25a90 00007ff9`9221c1e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a5`325ff9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`9221c1e4


SYMBOL_NAME: nt!IoRemoveIoCompletion+26d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.1139

STACK_COMMAND: .cxr 0xffffd2026ad24dd0 ; kb

BUCKET_ID_FUNC_OFFSET: 26d

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IoRemoveIoCompletion

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {19a77e32-9f31-c0b5-5bc2-0cf9083a3833}

Followup: MachineOwner
---------




FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6)
The current thread is performing an invalid call to a fast resource routine.
Arguments:
Arg1: 0000000000000014, A thread exited with outstanding lock acquisitions.
Arg2: ffff9e09282f0080, The thread.
Arg3: fffff80507a368bc, Pointer to one of the outstanding owner entries.
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2358

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 21296

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1c6

BUGCHECK_P1: 14

BUGCHECK_P2: ffff9e09282f0080

BUGCHECK_P3: fffff80507a368bc

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Share.exe

STACK_TEXT:
ffffb788`1e3d9388 fffff805`081d4c57 : 00000000`000001c6 00000000`00000014 ffff9e09`282f0080 fffff805`07a368bc : nt!KeBugCheckEx
ffffb788`1e3d9390 fffff805`07fe63b0 : 00000000`00000000 ffff9e09`282f0050 ffffb788`1e3d9589 00000000`00000000 : nt!PspThreadDelete+0x14e7c7
ffffb788`1e3d9400 fffff805`07a34f79 : 00000000`00000000 00000000`00000000 ffffb788`1e3d9589 ffff9e09`282f0080 : nt!ObpRemoveObjectRoutine+0x80
ffffb788`1e3d9460 fffff805`07fd48c7 : 00000000`00000000 ffff9e09`282f0050 ffff9e09`00000000 ffff9e09`273165e0 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb788`1e3d94a0 fffff805`080ae725 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffffb788`1e3d95e0 fffff805`0809496d : 00000000`00000000 ffff9e09`2744f080 ffffffff`ffffff01 ffff9e09`280e6380 : nt!ExSweepHandleTable+0xd5
ffffb788`1e3d9690 fffff805`07fb9d2d : ffffffff`ffffffff ffff9e09`280e6080 ffffb788`1e3d96e0 ffff9e09`00000000 : nt!ObKillProcess+0x35
ffffb788`1e3d96c0 fffff805`08084753 : ffff9e09`280e6080 ffffbe08`d270a060 ffffb788`1e3d98e9 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffffb788`1e3d9740 fffff805`080c7ee3 : 00000000`40010004 00000000`00000001 000000c7`e6506000 00000000`00000000 : nt!PspExitThread+0x60b
ffffb788`1e3d9850 fffff805`07a38b21 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffb788`1e3d9890 fffff805`07bc7240 : 00000000`00000001 ffffb788`1e3d9950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffb788`1e3d9950 fffff805`07bd45ff : ffff9e09`2744f080 000000c7`e845f6f8 ffff9e09`ffffffff fffff805`00001cff : nt!KiInitiateUserApc+0x70
ffffb788`1e3d9a90 00007ffa`50609a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c7`e845f6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`50609a84


SYMBOL_NAME: nt!PspThreadDelete+14e7c7

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.1139

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 14e7c7

FAILURE_BUCKET_ID: 0x1C6_nt!PspThreadDelete

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {15db6b61-555f-1f75-80be-2c230fa0518a}

Followup: MachineOwner
---------




APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ff87245c144, Address of system call function or worker routine
Arg2: 0000000000000001, Thread->ApcStateIndex
Arg3: 0000000000000000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffd70494b39b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1609

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6263

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1

BUGCHECK_P1: 7ff87245c144

BUGCHECK_P2: 1

BUGCHECK_P3: 0

BUGCHECK_P4: ffffd70494b39b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

BAD_STACK_POINTER: ffffd70494b399b8

STACK_TEXT:
ffffd704`94b399b8 fffff801`637d4b29 : 00000000`00000001 00007ff8`7245c144 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
ffffd704`94b399c0 fffff801`637d49d3 : ffff870d`b1ddf080 0000004a`a42cfd18 ffffd704`94b39b18 ffffffff`fffe7960 : nt!KiBugCheckDispatch+0x69
ffffd704`94b39b00 00007ff8`7245c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
0000004a`a42cfce8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7245c144


SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.1139

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_0_STACKPTR_ERROR_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {29841e22-ca67-b63d-5b1c-3557be9f186c}

Followup: MachineOwner
---------






KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc09ecfa1770, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc09ecfa16c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 46

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 51

Key : Analysis.Memory.CommitPeak.Mb
Value: 44

Key : Analysis.System
Value: CreateObject

Key : WER.CorruptModuleList
Value: 1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffc09ecfa1770

BUGCHECK_P3: fffffc09ecfa16c8

BUGCHECK_P4: 0

TRAP_FRAME:  fffffc09ecfa1770 -- (.trap 0xfffffc09ecfa1770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc81713c5a80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdf8b4228f158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80536435ff8 rsp=fffffc09ecfa1900 rbp=ffffcc81713c0180
r8=0000000000000002 r9=000000020ee74fa6 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fffff805`36435ff8 ?? ???
Resetting default scope

EXCEPTION_RECORD:  fffffc09ecfa16c8 -- (.exr 0xfffffc09ecfa16c8)
ExceptionAddress: fffff80536435ff8
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CUSTOMER_CRASH_COUNT: 1

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffffc09`ecfa1900 ffffdf8b`42290080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff805`36435ff8
fffffc09`ecfa1908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcc81`71080180 : 0xffffdf8b`42290080


STACK_COMMAND: .trap 0xfffffc09ecfa1770 ; kb

SYMBOL_NAME: ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x139

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {bec1bc00-1c8a-a417-55b2-9f8b67cbb1c5}

Followup: MachineOwner
---------
 
Son düzenleme:
MemTest86 ile belleklerinizi test eder misiniz?
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff800192917770, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8001929176c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-AF2QT03

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 65418

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff800192917770

BUGCHECK_P3: ffff8001929176c8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff800192917770 -- (.trap 0xffff800192917770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9580eadbea80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe185f2b99158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80618435ff8 rsp=ffff800192917900 rbp=ffff9580eadb9180
r8=0000000000000002  r9=000000750a625e15 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x528:
fffff806`18435ff8 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff8001929176c8 -- (.exr 0xffff8001929176c8)
ExceptionAddress: fffff80618435ff8 (nt!KiCommitThreadWait+0x0000000000000528)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff8001`92917448 fffff806`185d4b29     : 00000000`00000139 00000000`00000003 ffff8001`92917770 ffff8001`929176c8 : nt!KeBugCheckEx
ffff8001`92917450 fffff806`185d4f50     : ffff8001`00000000 fffff806`00000000 ffff8001`92917900 ffffcb0d`399f8910 : nt!KiBugCheckDispatch+0x69
ffff8001`92917590 fffff806`185d32e3     : 00000000`00000000 00000000`00000000 00000000`0000000a 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8001`92917770 fffff806`18435ff8     : 00000001`0000000a 00000000`00000000 00000000`00000fff 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8001`92917900 fffff806`184353b5     : 00000000`00000000 00000000`00000000 ffff9580`eadb9180 00000000`00000000 : nt!KiCommitThreadWait+0x528
ffff8001`929179a0 fffff806`189dc0cb     : ffffe185`e9571fe0 ffffe185`00000006 00000000`00000001 ffff8001`92917b00 : nt!KeWaitForSingleObject+0x255
ffff8001`92917a80 fffff806`185d4558     : ffffe185`eaa7a080 00000027`967fee28 ffff8001`92917b18 ffffffff`ff776f10 : nt!NtWaitForSingleObject+0x10b
ffff8001`92917b00 00007ff9`3e83c144     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000027`967fedf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3e83c144


SYMBOL_NAME:  nt!KiCommitThreadWait+528

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  528

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {369b7001-cfef-011b-6243-985c04f34d42}

Followup:     MachineOwner
---------




SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80070c5aace, Address of the instruction which caused the bugcheck
Arg3: ffffd2026ad24dd0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2733

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10436

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80070c5aace

BUGCHECK_P3: ffffd2026ad24dd0

BUGCHECK_P4: 0

CONTEXT:  ffffd2026ad24dd0 -- (.cxr 0xffffd2026ad24dd0)
rax=0000000000000001 rbx=ffffd40dd782c240 rcx=0000000000000034
rdx=000000000000002f rsi=ffffd40dd53d4380 rdi=0000000000000000
rip=fffff80070c5aace rsp=ffffd2026ad257c0 rbp=ffffd2026ad25b80
r8=ffffd40dd3dfa042 r9=0000000000000002 r10=00000000ffffffff
r11=0000000000000009 r12=ffffd40dda908080 r13=ffffd40dd53d4380
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!IopCompleteRequest+0x8e:
fffff800`70c5aace 8327cf and dword ptr [rdi],0FFFFFFCFh ds:002b:00000000`00000000=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

IRP_ADDRESS: ffffd40dd782c1d8

STACK_TEXT:
ffffd202`6ad257c0 fffff800`70c39e3d     : ffffd40d`d782c250 fffff800`70c2c401 ffffd40d`d782c200 0000020d`82133320 : nt!IopCompleteRequest+0x8e
ffffd202`6ad258b0 fffff800`711e1ec0 : ffffd202`6ad25a20 000000a5`325ffa28 00000000`00000401 fffff312`59dd93ff : nt!IoRemoveIoCompletion+0x26d
ffffd202`6ad259d0 fffff800`70dd4558 : ffffd40d`da908080 000000a5`325ffa08 ffffd202`6ad25aa8 0000020d`82133320 : nt!NtRemoveIoCompletion+0x140
ffffd202`6ad25a90 00007ff9`9221c1e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a5`325ff9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`9221c1e4


SYMBOL_NAME: nt!IoRemoveIoCompletion+26d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.1139

STACK_COMMAND: .cxr 0xffffd2026ad24dd0 ; kb

BUCKET_ID_FUNC_OFFSET: 26d

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IoRemoveIoCompletion

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {19a77e32-9f31-c0b5-5bc2-0cf9083a3833}

Followup: MachineOwner
---------




FAST_ERESOURCE_PRECONDITION_VIOLATION (1c6)
The current thread is performing an invalid call to a fast resource routine.
Arguments:
Arg1: 0000000000000014, A thread exited with outstanding lock acquisitions.
Arg2: ffff9e09282f0080, The thread.
Arg3: fffff80507a368bc, Pointer to one of the outstanding owner entries.
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2358

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-AF2QT03

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 21296

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1c6

BUGCHECK_P1: 14

BUGCHECK_P2: ffff9e09282f0080

BUGCHECK_P3: fffff80507a368bc

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Share.exe

STACK_TEXT:
ffffb788`1e3d9388 fffff805`081d4c57 : 00000000`000001c6 00000000`00000014 ffff9e09`282f0080 fffff805`07a368bc : nt!KeBugCheckEx
ffffb788`1e3d9390 fffff805`07fe63b0 : 00000000`00000000 ffff9e09`282f0050 ffffb788`1e3d9589 00000000`00000000 : nt!PspThreadDelete+0x14e7c7
ffffb788`1e3d9400 fffff805`07a34f79 : 00000000`00000000 00000000`00000000 ffffb788`1e3d9589 ffff9e09`282f0080 : nt!ObpRemoveObjectRoutine+0x80
ffffb788`1e3d9460 fffff805`07fd48c7 : 00000000`00000000 ffff9e09`282f0050 ffff9e09`00000000 ffff9e09`273165e0 : nt!ObfDereferenceObjectWithTag+0xc9
ffffb788`1e3d94a0 fffff805`080ae725 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffffb788`1e3d95e0 fffff805`0809496d : 00000000`00000000 ffff9e09`2744f080 ffffffff`ffffff01 ffff9e09`280e6380 : nt!ExSweepHandleTable+0xd5
ffffb788`1e3d9690 fffff805`07fb9d2d : ffffffff`ffffffff ffff9e09`280e6080 ffffb788`1e3d96e0 ffff9e09`00000000 : nt!ObKillProcess+0x35
ffffb788`1e3d96c0 fffff805`08084753 : ffff9e09`280e6080 ffffbe08`d270a060 ffffb788`1e3d98e9 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffffb788`1e3d9740 fffff805`080c7ee3 : 00000000`40010004 00000000`00000001 000000c7`e6506000 00000000`00000000 : nt!PspExitThread+0x60b
ffffb788`1e3d9850 fffff805`07a38b21 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffb788`1e3d9890 fffff805`07bc7240 : 00000000`00000001 ffffb788`1e3d9950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffb788`1e3d9950 fffff805`07bd45ff : ffff9e09`2744f080 000000c7`e845f6f8 ffff9e09`ffffffff fffff805`00001cff : nt!KiInitiateUserApc+0x70
ffffb788`1e3d9a90 00007ffa`50609a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c7`e845f6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`50609a84


SYMBOL_NAME: nt!PspThreadDelete+14e7c7

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.1139

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 14e7c7

FAILURE_BUCKET_ID: 0x1C6_nt!PspThreadDelete

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {15db6b61-555f-1f75-80be-2c230fa0518a}

Followup: MachineOwner
---------
Cevabınız için teşekkürler tamamdır.
 

Geri
Yukarı