Reshadxan
Hectopat
- Katılım
- 29 Mayıs 2019
- Mesajlar
- 58
Mavi ekran hatası aldım. Sorunun ne olduğunu anlayamadım. Yardım ederseniz sevinirim.
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\010622-12750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`34200000 PsLoadedModuleList = 0xfffff801`34e2a1b0
Debug session time: Thu Jan 6 23:54:25.265 2022 (UTC + 4:00)
System Uptime: 0 days 10:12:58.977
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`345f70d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff848b`ae6aef30=0000000000000139
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, An RTL_BALANCED_NODE RBTree entry has been corrupted.
Arg2: ffff848bae6af250, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff848bae6af1a8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 89599
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 102837
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : FailFast.Name
Value: INVALID_BALANCED_TREE
Key : FailFast.Type
Value: 29
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 010622-12750-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffff848bae6af250
BUGCHECK_P3: ffff848bae6af1a8
BUGCHECK_P4: 0
TRAP_FRAME: ffff848bae6af250 -- (.trap 0xffff848bae6af250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa902faa3d1a0 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffcc84ffe8a038 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013463d7df rsp=ffff848bae6af3e8 rbp=ffffcc84ffe8a038
r8=ffffcc8506091500 r9=ffffcc850c33d038 r10=0000000000000000
r11=ffffcc8506091588 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!RtlRbRemoveNode+0x1b246f:
fffff801`3463d7df cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff848bae6af1a8 -- (.exr 0xffff848bae6af1a8)
ExceptionAddress: fffff8013463d7df (nt!RtlRbRemoveNode+0x00000000001b246f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff848b`ae6aef28 fffff801`34609069 : 00000000`00000139 00000000`0000001d ffff848b`ae6af250 ffff848b`ae6af1a8 : nt!KeBugCheckEx
ffff848b`ae6aef30 fffff801`34609490 : ffffcc84`fd004f00 ffffcc85`00000030 ffffcc85`00000000 00000000`00000100 : nt!KiBugCheckDispatch+0x69
ffff848b`ae6af070 fffff801`34607823 : 00000090`00000090 00000000`00000000 ffffa902`00000042 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff848b`ae6af250 fffff801`3463d7df : ffffcc84`fd000280 ffffcc84`ffe8a038 fffff801`34489cd5 ffff848b`ae6af478 : nt!KiRaiseSecurityCheckFailure+0x323
ffff848b`ae6af3e8 fffff801`34489cd5 : ffff848b`ae6af478 00000000`00000071 ffffcc84`ffe8a030 00000000`00000081 : nt!RtlRbRemoveNode+0x1b246f
ffff848b`ae6af400 fffff801`34489aba : ffffa902`f4d02000 fffff801`3448d559 ffffffff`ffffffff ffff848b`0000000e : nt!RtlpHpVsChunkSplit+0x45
ffff848b`ae6af4c0 fffff801`3448d038 : 00000000`00000000 00000000`00000700 ffff848b`ae6af601 00000000`00000700 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffff848b`ae6af520 fffff801`34bb11c4 : ffffa902`00000000 00000000`00000050 00000000`656b6f54 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffff848b`ae6af660 fffff801`348738e9 : ffffa902`e46c5220 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffff848b`ae6af6b0 fffff801`3487a0ec : ffffa902`00000008 ffffa902`e46bf200 00000000`00000000 ffff848b`ae6af770 : nt!ObpAllocateObject+0x199
ffff848b`ae6af730 fffff801`34879766 : ffffcc85`060d55f0 ffffa902`f4d18510 00000000`00000000 00000000`00000000 : nt!ObCreateObjectEx+0xfc
ffff848b`ae6af7b0 fffff801`34866cd4 : ffff848b`ae6afa80 ffff848b`ae6af930 ffff848b`ae6afa00 00000021`00000670 : nt!SepDuplicateToken+0x1a6
ffff848b`ae6af8a0 fffff801`34866891 : ffffa902`f0097440 00000021`00000008 00000000`00000001 00000021`c40fef58 : nt!NtOpenThreadTokenEx+0x434
ffff848b`ae6af9c0 fffff801`34608ab5 : ffffa902`f0097440 ffffa902`f007f9d0 000001c5`e26f0b40 00000000`00000c50 : nt!NtOpenThreadToken+0x11
ffff848b`ae6afa00 00007ffc`55b8d1f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000021`c40fe778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`55b8d1f4
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}
Followup: MachineOwner
---------
MSI Z490-A Pro, i5 10400, MSI GTX 1060, 16GB 3000MHz RAM
Yardım edecek kimse yok mu?
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\010622-12750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`34200000 PsLoadedModuleList = 0xfffff801`34e2a1b0
Debug session time: Thu Jan 6 23:54:25.265 2022 (UTC + 4:00)
System Uptime: 0 days 10:12:58.977
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`345f70d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff848b`ae6aef30=0000000000000139
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, An RTL_BALANCED_NODE RBTree entry has been corrupted.
Arg2: ffff848bae6af250, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff848bae6af1a8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 89599
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 102837
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : FailFast.Name
Value: INVALID_BALANCED_TREE
Key : FailFast.Type
Value: 29
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 010622-12750-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffff848bae6af250
BUGCHECK_P3: ffff848bae6af1a8
BUGCHECK_P4: 0
TRAP_FRAME: ffff848bae6af250 -- (.trap 0xffff848bae6af250)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa902faa3d1a0 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffcc84ffe8a038 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013463d7df rsp=ffff848bae6af3e8 rbp=ffffcc84ffe8a038
r8=ffffcc8506091500 r9=ffffcc850c33d038 r10=0000000000000000
r11=ffffcc8506091588 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!RtlRbRemoveNode+0x1b246f:
fffff801`3463d7df cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff848bae6af1a8 -- (.exr 0xffff848bae6af1a8)
ExceptionAddress: fffff8013463d7df (nt!RtlRbRemoveNode+0x00000000001b246f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff848b`ae6aef28 fffff801`34609069 : 00000000`00000139 00000000`0000001d ffff848b`ae6af250 ffff848b`ae6af1a8 : nt!KeBugCheckEx
ffff848b`ae6aef30 fffff801`34609490 : ffffcc84`fd004f00 ffffcc85`00000030 ffffcc85`00000000 00000000`00000100 : nt!KiBugCheckDispatch+0x69
ffff848b`ae6af070 fffff801`34607823 : 00000090`00000090 00000000`00000000 ffffa902`00000042 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff848b`ae6af250 fffff801`3463d7df : ffffcc84`fd000280 ffffcc84`ffe8a038 fffff801`34489cd5 ffff848b`ae6af478 : nt!KiRaiseSecurityCheckFailure+0x323
ffff848b`ae6af3e8 fffff801`34489cd5 : ffff848b`ae6af478 00000000`00000071 ffffcc84`ffe8a030 00000000`00000081 : nt!RtlRbRemoveNode+0x1b246f
ffff848b`ae6af400 fffff801`34489aba : ffffa902`f4d02000 fffff801`3448d559 ffffffff`ffffffff ffff848b`0000000e : nt!RtlpHpVsChunkSplit+0x45
ffff848b`ae6af4c0 fffff801`3448d038 : 00000000`00000000 00000000`00000700 ffff848b`ae6af601 00000000`00000700 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffff848b`ae6af520 fffff801`34bb11c4 : ffffa902`00000000 00000000`00000050 00000000`656b6f54 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffff848b`ae6af660 fffff801`348738e9 : ffffa902`e46c5220 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffff848b`ae6af6b0 fffff801`3487a0ec : ffffa902`00000008 ffffa902`e46bf200 00000000`00000000 ffff848b`ae6af770 : nt!ObpAllocateObject+0x199
ffff848b`ae6af730 fffff801`34879766 : ffffcc85`060d55f0 ffffa902`f4d18510 00000000`00000000 00000000`00000000 : nt!ObCreateObjectEx+0xfc
ffff848b`ae6af7b0 fffff801`34866cd4 : ffff848b`ae6afa80 ffff848b`ae6af930 ffff848b`ae6afa00 00000021`00000670 : nt!SepDuplicateToken+0x1a6
ffff848b`ae6af8a0 fffff801`34866891 : ffffa902`f0097440 00000021`00000008 00000000`00000001 00000021`c40fef58 : nt!NtOpenThreadTokenEx+0x434
ffff848b`ae6af9c0 fffff801`34608ab5 : ffffa902`f0097440 ffffa902`f007f9d0 000001c5`e26f0b40 00000000`00000c50 : nt!NtOpenThreadToken+0x11
ffff848b`ae6afa00 00007ffc`55b8d1f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000021`c40fe778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`55b8d1f4
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}
Followup: MachineOwner
---------
MSI Z490-A Pro, i5 10400, MSI GTX 1060, 16GB 3000MHz RAM
Yardım edecek kimse yok mu?
Son düzenleme: