SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8066f154b78, Address of the instruction which caused the BugCheck
Arg3: fffffc8d37cb6110, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13953
Key : Analysis.IO.Other.Mb
Value: 14
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 28
Key : Analysis.Init.CPU.mSec
Value: 155
Key : Analysis.Init.Elapsed.mSec
Value: 30915
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 808
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 030623-11265-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8066f154b78
BUGCHECK_P3: fffffc8d37cb6110
BUGCHECK_P4: 0
CONTEXT: fffffc8d37cb6110 -- (.cxr 0xfffffc8d37cb6110)
rax=0000000000000001 rbx=0000000000000024 rcx=0000000000000024
rdx=000100000000001d rsi=0000000000000000 rdi=fffffc8d37cb6c50
rip=fffff8066f154b78 rsp=fffffc8d37cb6b30 rbp=ffffc801a835ed20
r8=fffffc8d37cb6c50 r9=ffff800f26f79600 r10=0000000000000039
r11=fffffffff70aa4a0 r12=fffffc8d37cb6c50 r13=000100000000001d
r14=ffffc801a8454420 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!FsRtlCompareNodeAndKey+0x18:
fffff806`6f154b78 48395130 cmp qword ptr [rcx+30h],rdx ds:002b:00000000`00000054=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffffc8d`37cb6b30 fffff806`6f5c22ea : 00000000`00000000 00000000`00000024 ffffc801`a835ed20 00000000`00000000 : nt!FsRtlCompareNodeAndKey+0x18
fffffc8d`37cb6b60 fffff806`720395aa : ffffc801`a8454420 00000000`00000000 00000000`00000000 fffffc8d`37cb6dc0 : nt!FsRtlFindInTunnelCacheEx+0x8a
fffffc8d`37cb6bc0 fffff806`7207b2aa : 00000000`00000000 00000000`00000000 ffff800f`2a8b9a01 ffffc801`a835ed20 : Ntfs!NtfsRenameToPrivateDir+0x86a
fffffc8d`37cb6ed0 fffff806`72024c0c : 00000000`00000000 fffffc8d`37cb73a8 00000000`00000000 ffffc801`b21d9010 : Ntfs!NtfsCommonCleanup+0x103a
fffffc8d`37cb7340 fffff806`6f0cf765 : ffffc801`afb49620 fffff806`6bab7da9 ffffc801`a835ed20 ffffc801`b21d9440 : Ntfs!NtfsFsdCleanup+0x1ec
fffffc8d`37cb76b0 fffff806`6bab9f5b : ffffc801`b21d9001 ffffc801`afb49620 ffffc801`b3016eb0 ffffc801`b21d9020 : nt!IofCallDriver+0x55
fffffc8d`37cb76f0 fffff806`6bab7ba3 : fffffc8d`37cb7780 00000000`00000000 00000000`00000000 ffffc801`a835ed20 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
fffffc8d`37cb7760 fffff806`6f0cf765 : ffffc801`b3016eb0 fffff806`6f0d8368 ffffc801`b21d9020 ffffc801`b21d9040 : FLTMGR!FltpDispatch+0xa3
fffffc8d`37cb77c0 fffff806`6f4e5cbf : ffffc801`b3016eb0 ffffc801`a835ed20 ffffc801`b01b8080 ffffc801`b21d9010 : nt!IofCallDriver+0x55
fffffc8d`37cb7800 fffff806`6f4dd188 : fffffc8d`37cb7949 fffffc8d`00000000 00000000`000028e0 00000000`00000001 : nt!IopCloseFile+0x18f
fffffc8d`37cb7890 fffff806`6f4da8b9 : ffffc891`a2aeeb91 00000000`00000000 00000000`000028e0 00000000`00000000 : nt!ObpCloseHandle+0x298
fffffc8d`37cb79b0 fffff806`6f23d9e5 : ffffc801`ad0b0080 ffffc801`afd654e0 ffffc801`ad0b0080 ffffc801`00000000 : nt!NtClose+0x39
fffffc8d`37cb79e0 00007ff9`8b1cefe4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000002e`027fe958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8b1cefe4
SYMBOL_NAME: nt!FsRtlCompareNodeAndKey+18
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1265
STACK_COMMAND: .cxr 0xfffffc8d37cb6110 ; kb
BUCKET_ID_FUNC_OFFSET: 18
FAILURE_BUCKET_ID: AV_nt!FsRtlCompareNodeAndKey
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {430cf121-0791-6c40-72be-1b7c0ebfdc85}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff801270d1570, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff801270d14c8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1077
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9096
Key : Analysis.IO.Other.Mb
Value: 12
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 23
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 20162
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Bugcheck.Code.DumpHeader
Value: 0x139
Key : Bugcheck.Code.Register
Value: 0x139
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
FILE_IN_CAB: 030623-9984-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff801270d1570
BUGCHECK_P3: fffff801270d14c8
BUGCHECK_P4: 0
TRAP_FRAME: fffff801270d1570 -- (.trap 0xfffff801270d1570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe386a7cd64e8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012b8ba6c1 rsp=fffff801270d1700 rbp=ffffe386a60a4730
r8=fffff801258ab360 r9=0000000000000001 r10=0000000000000000
r11=ffffe386a119d5c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiProcessThreadWaitList+0xa1:
fffff801`2b8ba6c1 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff801270d14c8 -- (.exr 0xfffff801270d14c8)
ExceptionAddress: fffff8012b8ba6c1 (nt!KiProcessThreadWaitList+0x00000000000000a1)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff801`270d1248 fffff801`2ba3e2a9 : 00000000`00000139 00000000`00000003 fffff801`270d1570 fffff801`270d14c8 : nt!KeBugCheckEx
fffff801`270d1250 fffff801`2ba3e832 : fffff801`258a8180 00000005`00000000 fffff801`00000005 fffff801`270d1720 : nt!KiBugCheckDispatch+0x69
fffff801`270d1390 fffff801`2ba3c606 : ffffab81`7b896180 ffffe386`996b6780 ffffe386`a119d5c0 ffffe386`a119d5c0 : nt!KiFastFailDispatch+0xb2
fffff801`270d1570 fffff801`2b8ba6c1 : ffffe386`9e039010 ffffe386`9cbe0158 00000000`00000000 ffffe386`a119d730 : nt!KiRaiseSecurityCheckFailure+0x346
fffff801`270d1700 fffff801`2b8bb883 : ffffe386`00000002 ffffe386`00000001 fffff801`00000000 ffffe386`00000002 : nt!KiProcessThreadWaitList+0xa1
fffff801`270d1780 fffff801`2b8bcea6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00cb508b : nt!KiProcessExpiredTimerList+0x343
fffff801`270d18b0 fffff801`2ba2da4e : fffff801`258a8180 fffff801`258a8180 fffff801`2c34c6c0 ffffe386`a7e3c5c0 : nt!KiRetireDpcList+0xed6
fffff801`270d1b40 00000000`00000000 : fffff801`270d2000 fffff801`270cb000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiProcessExpiredTimerList+343
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1265
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 343
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffade003000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80443a4d1ee, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 812
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1696
Key : Analysis.IO.Other.Mb
Value: 11
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 23
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 22696
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 808
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 030623-10000-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffffade003000028
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80443a4d1ee
READ_ADDRESS: fffff8044451c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffade003000028
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RelicCardinal_
TRAP_FRAME: ffffba04db6cf2c0 -- (.trap 0xffffba04db6cf2c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000200100000 rbx=0000000000000000 rcx=000000ffffffffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80443a4d1ee rsp=ffffba04db6cf450 rbp=ffff8006402bba60
r8=ffffba04db6cf528 r9=0000000000000000 r10=fffff77bbddee000
r11=fffff77bbddee7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiGetPageProtection+0xbe:
fffff804`43a4d1ee 4b8b4cf528 mov rcx,qword ptr [r13+r14*8+28h] ds:00000000`00000028=????????????????
Resetting default scope
STACK_TEXT:
ffffba04`db6cf178 fffff804`43c3e2a9 : 00000000`0000000a ffffade0`03000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffba04`db6cf180 fffff804`43c39934 : fffff701`1dcb3af8 00000000`00000000 00000000`00000000 ffffba04`db6cf5b4 : nt!KiBugCheckDispatch+0x69
ffffba04`db6cf2c0 fffff804`43a4d1ee : ffffffff`ffffffff fffff77b`bdc04770 fffff77b`808ee5a0 ffff8006`2ea5c140 : nt!KiPageFault+0x474
ffffba04`db6cf450 fffff804`43a4c0e9 : 00000000`00000000 00000000`00001000 00000000`00000000 ffffba04`db6cf5b0 : nt!MiGetPageProtection+0xbe
ffffba04`db6cf4b0 fffff804`43a494e9 : 00000000`00000000 ffffba04`00000000 00000000`00040282 fffff804`43b09404 : nt!MiQueryAddressState+0x4c9
ffffba04`db6cf6c0 fffff804`43eb2517 : ffffba04`db6cf810 0000023b`96810000 ffff8006`402b0000 ffff8006`402bba60 : nt!MiQueryAddressSpan+0x219
ffffba04`db6cf780 fffff804`43eb1dc5 : 00000000`00000000 00000000`00000000 00000000`10000000 000000d7`c84ff090 : nt!MmQueryVirtualMemory+0x737
ffffba04`db6cf920 fffff804`43c3d9e5 : ffff8006`2eaa6380 00000000`00000000 00000000`77566d4d ffffba04`db6cf900 : nt!NtQueryVirtualMemory+0x25
ffffba04`db6cf970 00007ffb`750ef264 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000d7`c84fede8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`750ef264
SYMBOL_NAME: nt!MiGetPageProtection+be
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.1265
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: be
FAILURE_BUCKET_ID: AV_nt!MiGetPageProtection
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {41372a35-237d-1281-82f6-8f5f9bf6044a}
Followup: MachineOwner
---------