MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff828000078fc0
Arg3: 0000000089000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3967
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7032
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff828000078fc0
BUGCHECK_P3: 89000000
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
fffffe8b`ab7bd0d8 fffff800`3354c03a : 00000000`0000001a 00000000`00041792 ffff8280`00078fc0 00000000`89000000 : nt!KeBugCheckEx
fffffe8b`ab7bd0e0 fffff800`3354a86f : ffffe289`f2c99740 00000000`00000000 ffff8280`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
fffffe8b`ab7bd1e0 fffff800`33522ae0 : 00000000`00000001 fffffe8b`00000000 ffffe289`f2c99590 ffffe289`f088c080 : nt!MiDeletePagablePteRange+0x48f
fffffe8b`ab7bd4f0 fffff800`33904aa9 : ffffe289`f4b0ad20 00000000`00000000 ffffe289`00000000 ffffe289`00000000 : nt!MiDeleteVad+0x360
fffffe8b`ab7bd600 fffff800`33903908 : ffffe289`f4b0ad20 ffffe289`f1da5a60 ffffe289`f088c080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffe8b`ab7bd630 fffff800`339027af : ffffe289`f097ee00 ffffe289`f097ee00 ffffe289`f4b0ad20 ffffe289`f2c990c0 : nt!MiCleanVad+0x30
fffffe8b`ab7bd660 fffff800`337f164f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe289`f2c990c0 : nt!MmCleanProcessAddressSpace+0x137
fffffe8b`ab7bd6e0 fffff800`337e6f96 : ffffe289`f2c990c0 ffff8b80`4515c060 fffffe8b`ab7bd920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffffe8b`ab7bd760 fffff800`3387a978 : 00000000`40010004 00000000`00000001 00000000`00000000 00000000`09e4e000 : nt!PspExitThread+0x5f6
fffffe8b`ab7bd860 fffff800`334e2707 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffe8b`ab7bd8a0 fffff800`335f8b40 : 00000000`116cfe8c fffffe8b`ab7bd950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffffe8b`ab7bd950 fffff800`3360605f : ffffe289`f088c080 00000000`115ce288 fffffe8b`ab7bdaa8 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffffe8b`ab7bda90 00007ffd`70e39014 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`115ce278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`70e39014
SYMBOL_NAME: nt!MiDeleteVa+153a
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 153a
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8065f2d8f61, Address of the instruction which caused the bugcheck
Arg3: ffffeb02cf114d70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26336
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8065f2d8f61
BUGCHECK_P3: ffffeb02cf114d70
BUGCHECK_P4: 0
CONTEXT: ffffeb02cf114d70 -- (.cxr 0xffffeb02cf114d70)
rax=ffffeb02cf115830 rbx=0000000000000001 rcx=ffffdb0b448b9fe0
rdx=0000000000000000 rsi=ffffdb0b448b9fe0 rdi=00000000a8ffffe0
rip=fffff8065f2d8f61 rsp=ffffeb02cf115770 rbp=ffffeb02cf115959
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff9f78d3800000 r12=0000000000000000 r13=ffffc487f7c97c40
r14=ffffdb0b448b9fb0 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!SeDefaultObjectMethod+0xb1:
fffff806`5f2d8f61 488b4708 mov rax,qword ptr [rdi+8] ds:002b:00000000`a8ffffe8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVDi
STACK_TEXT:
ffffeb02`cf115770 fffff806`5f2bff56 : ffffdb0b`448b9fb0 ffffeb02`cf115959 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0xb1
ffffeb02`cf1157d0 fffff806`5eedbaa7 : 00000000`00000000 00000000`00000000 ffffeb02`cf115959 ffffdb0b`448b9fe0 : nt!ObpRemoveObjectRoutine+0xd6
ffffeb02`cf115830 fffff806`5f2ed70e : ffffdb0b`31cadf00 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffffeb02`cf115870 fffff806`5f2a4dc5 : 00000000`00000103 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffeb02`cf1159b0 fffff806`5f2a70ad : 00000000`00000000 ffffdb0b`3d86e580 ffffffff`ffffff01 ffffdb0b`3ecc5518 : nt!ExSweepHandleTable+0xd5
ffffeb02`cf115a60 fffff806`5f1f1647 : ffffffff`ffffffff ffffdb0b`3ecc50c0 ffffeb02`cf115ab0 ffffdb0b`00000000 : nt!ObKillProcess+0x35
ffffeb02`cf115a90 fffff806`5f1e6f96 : ffffdb0b`3ecc50c0 ffffc487`f571f060 ffffeb02`cf115cd0 00000000`00000000 : nt!PspRundownSingleProcess+0x133
ffffeb02`cf115b10 fffff806`5f27a978 : 00000000`40010004 00000000`00000001 00000000`00000000 00000034`915c9000 : nt!PspExitThread+0x5f6
ffffeb02`cf115c10 fffff806`5eee2707 : 00000000`00000000 00000000`09d8fe1c ffffffff`ffffffb3 00000000`76fa1cfc : nt!KiSchedulerApcTerminate+0x38
ffffeb02`cf115c50 fffff806`5eff8b40 : 00000000`00000000 ffffeb02`cf115d00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffeb02`cf115d00 fffff806`5f00605f : ffffdb0b`3d86e500 00000165`812e0000 ffffeb02`d1579b80 ffffdb0b`3ecc50c0 : nt!KiInitiateUserApc+0x70
ffffeb02`cf115e40 00007ff8`e828fba0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000034`913ae690 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e828fba0
SYMBOL_NAME: nt!SeDefaultObjectMethod+b1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffeb02cf114d70 ; kb
BUCKET_ID_FUNC_OFFSET: b1
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!SeDefaultObjectMethod
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0efa101b-e9d0-1362-a826-cbc49be172a8}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80031ed8f61, Address of the instruction which caused the bugcheck
Arg3: ffffaa0da41da9c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7155
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 34188
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80031ed8f61
BUGCHECK_P3: ffffaa0da41da9c0
BUGCHECK_P4: 0
CONTEXT: ffffaa0da41da9c0 -- (.cxr 0xffffaa0da41da9c0)
rax=ffffaa0da41db480 rbx=0000000000000001 rcx=ffff9888fd9d8fe0
rdx=0000000000000000 rsi=ffff9888fd9d8fe0 rdi=0000000080ffffe0
rip=fffff80031ed8f61 rsp=ffffaa0da41db3c0 rbp=ffffaa0da41db5a9
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffffd4fce5400000 r12=0000000000000000 r13=ffffb00ea186bbc0
r14=ffff9888fd9d8fb0 r15=00000000ffff8006
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!SeDefaultObjectMethod+0xb1:
fffff800`31ed8f61 488b4708 mov rax,qword ptr [rdi+8] ds:002b:00000000`80ffffe8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
ffffaa0d`a41db3c0 fffff800`31ebff56 : ffff9888`fd9d8fb0 ffffaa0d`a41db5a9 00000000`00000000 00000000`00000000 : nt!SeDefaultObjectMethod+0xb1
ffffaa0d`a41db420 fffff800`31adbaa7 : 00000000`00000000 00000000`00000000 ffffaa0d`a41db5a9 ffff9888`fd9d8fe0 : nt!ObpRemoveObjectRoutine+0xd6
ffffaa0d`a41db480 fffff800`31eed70e : ffff9888`e46ab640 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffffaa0d`a41db4c0 fffff800`31ea4dc5 : 00000000`00000103 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffaa0d`a41db600 fffff800`31ea70ad : 00000000`00000000 ffff9888`efcb9080 ffffffff`ffffff01 ffff9888`ef2b64d8 : nt!ExSweepHandleTable+0xd5
ffffaa0d`a41db6b0 fffff800`31df1647 : ffffffff`ffffffff ffff9888`ef2b6080 ffffaa0d`a41db700 ffff9888`00000000 : nt!ObKillProcess+0x35
ffffaa0d`a41db6e0 fffff800`31de6f96 : ffff9888`ef2b6080 ffffb00e`a177d970 ffffaa0d`a41db920 00000000`00000000 : nt!PspRundownSingleProcess+0x133
ffffaa0d`a41db760 fffff800`31e7a978 : 00000000`c0000005 ffff9888`00000001 00000086`44cff410 00000086`4380a000 : nt!PspExitThread+0x5f6
ffffaa0d`a41db860 fffff800`31ae2707 : ffffaa0d`a41dba68 fffff800`31ae2950 ffff9888`eeaecb80 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38
ffffaa0d`a41db8a0 fffff800`31bf8b40 : 00000202`e5b14a80 ffffaa0d`a41db950 00000000`80070057 00000086`00000000 : nt!KiDeliverApc+0x487
ffffaa0d`a41db950 fffff800`31c0605f : ffff9888`efcb9080 00000086`44cff3e8 ffffaa0d`a41dbaa8 ffff9888`ee62a090 : nt!KiInitiateUserApc+0x70
ffffaa0d`a41dba90 00007ffd`b288beb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000086`44cff3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b288beb4
SYMBOL_NAME: nt!SeDefaultObjectMethod+b1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffaa0da41da9c0 ; kb
BUCKET_ID_FUNC_OFFSET: b1
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!SeDefaultObjectMethod
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0efa101b-e9d0-1362-a826-cbc49be172a8}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffff882df298f50, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff882df298ea8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5483
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10272
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: fffff882df298f50
BUGCHECK_P3: fffff882df298ea8
BUGCHECK_P4: 0
TRAP_FRAME: fffff882df298f50 -- (.trap 0xfffff882df298f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70f530b1fb8 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffa70f4a66afb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060ae67319 rsp=fffff882df2990e8 rbp=000000000000005a
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffffa70f54eeafb8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x19df99:
fffff806`0ae67319 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff882df298ea8 -- (.exr 0xfffff882df298ea8)
ExceptionAddress: fffff8060ae67319 (nt!RtlRbRemoveNode+0x000000000019df99)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff882`df298c28 fffff806`0ae06569 : 00000000`00000139 00000000`0000001d fffff882`df298f50 fffff882`df298ea8 : nt!KeBugCheckEx
fffff882`df298c30 fffff806`0ae06990 : fffff806`0b64f1c0 fffff806`0acec946 ffff8000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff882`df298d70 fffff806`0ae04d23 : 00000000`00000000 fffffa7d`29c3d1c8 fffff882`df2992b0 ffffa180`001e6600 : nt!KiFastFailDispatch+0xd0
fffff882`df298f50 fffff806`0ae67319 : 00000023`00030000 00010003`005a0003 fffff806`0acc9140 00000000`0000005a : nt!KiRaiseSecurityCheckFailure+0x323
fffff882`df2990e8 fffff806`0acc9140 : 00000000`0000005a ffffa70f`4a66afe0 00000000`00000000 ffffa70f`4a66afb0 : nt!RtlRbRemoveNode+0x19df99
fffff882`df299100 fffff806`0acc8b88 : ffffa70f`3e000280 ffffa70f`4a668000 00000000`00000023 fffff882`df299208 : nt!RtlpHpVsChunkCoalesce+0xb0
fffff882`df299160 fffff806`0acc7514 : 00000000`00000000 ffffa70f`00000000 00000000`00000000 ffff8b88`00000000 : nt!RtlpHpVsContextFree+0x188
fffff882`df299200 fffff806`0b3b1019 : fffff882`00000220 00000000`00000000 ffffa70f`4ac315b8 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff882`df2992e0 fffff806`08d4cca7 : ffff8b88`f13cc500 ffff8b88`f29dda58 00000000`ffff7fff ffffa70f`4ac315b8 : nt!ExFreePool+0x9
fffff882`df299310 fffff806`08d4c7c6 : ffffa70f`4ac315b8 fffff806`08d3a060 ffffa70f`00000000 ffffffff`ffffffff : FLTMGR!FltReleaseFileNameInformation+0x127
fffff882`df299350 fffff806`08d4c858 : ffff8b88`f29dd9f0 ffff8b88`ed0cd0a0 00000000`00000705 ffffffff`ffffffff : FLTMGR!DeleteNameCacheNodes+0x196
fffff882`df2993b0 fffff806`08d4cd8a : ffff8b88`f29dd9f0 ffff8b88`f29dd9f8 ffff8b88`f29dd9f0 ffff8b88`f29dd9f0 : FLTMGR!CleanupStreamListCtrl+0x80
fffff882`df2993f0 fffff806`0afcfb09 : ffffa70f`496f3738 ffff8b88`f29dd9f8 00000000`00000000 fffff882`df2998f0 : FLTMGR!DeleteStreamListCtrlCallback+0xba
fffff882`df299430 fffff806`0f10c17b : ffffa70f`496f3700 fffff882`df299578 fffff882`df2998f0 00000000`00000705 : nt!FsRtlTeardownPerStreamContexts+0xc9
fffff882`df299470 fffff806`0f10bf06 : ffffa70f`496f3700 ffffa70f`4ac26800 ffffa70f`000001b8 fffff806`0f01db42 : Ntfs!NtfsDeleteScb+0x17b
fffff882`df299510 fffff806`0f017b95 : 00000000`00000000 ffffa70f`496f3700 ffffa70f`4ac2d468 00000000`00000000 : Ntfs!NtfsRemoveScb+0x66
fffff882`df299570 fffff806`0f10bc9c : fffff882`df2998f0 fffff806`0f1579a0 ffffa70f`496f35a0 ffffa70f`496f3900 : Ntfs!NtfsPrepareFcbForRemoval+0x75
fffff882`df2995b0 fffff806`0f01bd40 : fffff882`df2998f0 fffff882`df2996b2 ffffa70f`496f39f8 ffffa70f`496f35a0 : Ntfs!NtfsTeardownStructures+0x9c
fffff882`df299630 fffff806`0f13b547 : fffff882`df299700 ffffa70f`00000000 00000000`00000000 ffffa70f`496f3500 : Ntfs!NtfsDecrementCloseCounts+0xb0
fffff882`df299670 fffff806`0f138061 : fffff882`df2998f0 ffffa70f`496f3700 ffffa70f`496f35a0 ffff8b88`ed0d8180 : Ntfs!NtfsCommonClose+0x467
fffff882`df299750 fffff806`0f157a28 : 00000000`0000001c fffff806`0b725440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
fffff882`df2998b0 fffff806`0ad035f5 : ffff8b88`f13cc500 fffff806`0ac51340 ffff8b88`e6f13a60 ffff8b88`00000000 : Ntfs!NtfsFspClose+0x88
fffff882`df299b70 fffff806`0aca2ae5 : ffff8b88`f13cc500 00000000`00000080 ffff8b88`e6e79040 00000000`00000007 : nt!ExpWorkerThread+0x105
fffff882`df299c10 fffff806`0adfbbf8 : fffff806`078bc180 ffff8b88`f13cc500 fffff806`0aca2a90 00000000`00000007 : nt!PspSystemThreadStartup+0x55
fffff882`df299c60 00000000`00000000 : fffff882`df29a000 fffff882`df294000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.572
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}
Followup: Pool_corruption
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff5914c6ad758, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff5d3822be105, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4733
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7403
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff5914c6ad758
BUGCHECK_P2: 0
BUGCHECK_P3: fffff5d3822be105
BUGCHECK_P4: 2
READ_ADDRESS: fffff80664efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80664e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80664e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff5914c6ad758
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: StartMenuExperienceHost.exe
TRAP_FRAME: fffffe82f4d64990 -- (.trap 0xfffffe82f4d64990)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff591c4749a10
rdx=fffffe82f4d64b80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff5d3822be105 rsp=fffffe82f4d64b28 rbp=fffff591c465cc80
r8=fffff5914c6ad758 r9=fffff591c4735008 r10=0000fffff5d3822b
r11=ffffaffedd600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+0x5:
fffff5d3`822be105 498b10 mov rdx,qword ptr [r8] ds:fffff591`4c6ad758=????????????????
Resetting default scope
STACK_TEXT:
fffffe82`f4d646e8 fffff806`64679b57 : 00000000`00000050 fffff591`4c6ad758 00000000`00000000 fffffe82`f4d64990 : nt!KeBugCheckEx
fffffe82`f4d646f0 fffff806`644ea5e0 : 00000000`00000000 00000000`00000000 fffffe82`f4d64a10 00000000`00000000 : nt!MiSystemFault+0x1716c7
fffffe82`f4d647f0 fffff806`6460275e : 00000000`00000000 00000000`00000020 fffffe82`f4d64c10 00000000`74774344 : nt!MmAccessFault+0x400
fffffe82`f4d64990 fffff5d3`822be105 : fffff806`64476ee0 fffff806`64bb1010 fffff5d3`814e40b2 00000000`00000000 : nt!KiPageFault+0x35e
fffffe82`f4d64b28 fffff806`64476ee0 : fffff806`64bb1010 fffff5d3`814e40b2 00000000`00000000 fffffe82`f4d64b98 : win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+0x5
fffffe82`f4d64b30 fffff5d3`822bd1e7 : 00000000`00000000 fffff591`c465cc80 00000000`00000000 fffff591`c4735b40 : nt!RtlLookupElementGenericTable+0x30
fffffe82`f4d64b60 fffff5d3`822bd1af : fffff591`c4749a10 fffffe82`f4d64c10 00000000`00000010 fffffe82`f4d64c80 : win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::RemoveObject+0x2b
fffffe82`f4d64ba0 fffff5d3`822bd146 : fffff591`c4736050 00000000`00000100 00000000`00000000 fffff5d3`823fcf1d : win32kbase!DirectComposition::CApplicationChannel::ReleaseWeakReference+0x3f
fffffe82`f4d64bd0 fffff5d3`822bcf2f : fffff591`c4736050 00000000`00000000 00000000`00000000 ffffaffe`dd600000 : win32kbase!DirectComposition::CBaseExpressionMarshaler::ReleaseAllReferences+0x26
fffffe82`f4d64c00 fffff5d3`822589ff : fffff591`c4736050 fffff591`c465cc80 00000000`00000000 00000000`00989680 : win32kbase!DirectComposition::CKeyframeAnimationMarshaler::ReleaseAllReferences+0x1f
fffffe82`f4d64c30 fffff5d3`8225889a : 00000000`00000000 fffff591`c48a0268 fffff591`c48a02ac 00000000`00000d78 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x11b
fffffe82`f4d64c60 fffff5d3`82257245 : fffff591`c465cc80 fffffe82`f4d64ec0 fffff591`c48a02ac fffff591`c48a0280 : win32kbase!DirectComposition::CApplicationChannel::ReleaseResource+0x82
fffffe82`f4d64ca0 fffff5d3`82256be1 : fffff591`c465cc80 00000000`00000000 00000000`00000000 ffff840c`323d0801 : win32kbase!DirectComposition::CApplicationChannel::ProcessCommandBufferIterator+0x5a5
fffffe82`f4d64d60 fffff5d3`812bedfd : fffff806`645f0690 fffff806`00000ff8 00000057`a07fdde0 00000057`a07fdde8 : win32kbase!NtDCompositionProcessChannelBatchBuffer+0x1a1
fffffe82`f4d64e00 fffff806`64605fb8 : 00000237`058a0310 ffff840c`2de08540 00000237`799c4440 ffff840c`00000000 : win32k!NtDCompositionProcessChannelBatchBuffer+0x15
fffffe82`f4d64e40 00007ffe`67123724 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000057`a07fdd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`67123724
SYMBOL_NAME: win32kbase!DirectComposition::CGenericTable<DirectComposition::CResourceMarshaler * __ptr64,DirectComposition::CWeakReferenceBase,1953973060,1>::CompareTableEntries+5
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: AV_R_INVALID_win32kbase!DirectComposition::CGenericTable_DirectComposition::CResourceMarshaler_*___ptr64,DirectComposition::CWeakReferenceBase,1953973060,1_::CompareTableEntries
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0aa74454-1f18-e53c-a0a5-219090e65132}
Followup: MachineOwner
---------