Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ali_h\AppData\Local\Temp\Rar$DIa6228.39679\031421-7234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`5cc00000 PsLoadedModuleList = 0xfffff802`5d82a490
Debug session time: Sun Mar 14 18:50:35.533 2021 (UTC + 3:00)
System Uptime: 3 days 3:31:07.748
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`5cff5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff802`63275740=0000000000000139
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffff80263275a60, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff802632759b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9748
Key : Analysis.Init.CPU.mSec
Value: 717
Key : Analysis.Init.Elapsed.mSec
Value: 3242
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : FailFast.Name
Value: INVALID_BALANCED_TREE
Key : FailFast.Type
Value: 29
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: fffff80263275a60
BUGCHECK_P3: fffff802632759b8
BUGCHECK_P4: 0
TRAP_FRAME: fffff80263275a60 -- (.trap 0xfffff80263275a60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff87829c84eee0 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff87829c847ee0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025d02d6e7 rsp=fffff80263275bf8 rbp=ffff8782a6bb91c0
r8=ffff87829c84eee0 r9=0000000000000000 r10=0000000000000001
r11=ffff8782a6bb91c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x1dec17:
fffff802`5d02d6e7 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff802632759b8 -- (.exr 0xfffff802632759b8)
ExceptionAddress: fffff8025d02d6e7 (nt!RtlRbRemoveNode+0x00000000001dec17)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: proven_ground_client.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
DPC_STACK_BASE: FFFFF80263275FB0
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff802`63275738 fffff802`5d007b69 : 00000000`00000139 00000000`0000001d fffff802`63275a60 fffff802`632759b8 : nt!KeBugCheckEx
fffff802`63275740 fffff802`5d007f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff802`63275880 fffff802`5d006323 : 00000000`00000000 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff802`63275a60 fffff802`5d02d6e7 : 00000000`00000048 ffff8782`9d191cf8 fffff802`5ce43215 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff802`63275bf8 fffff802`5ce43215 : 00000000`00000000 ffff8782`9d191d7a 00000000`00000000 fffff802`5d831dc0 : nt!RtlRbRemoveNode+0x1dec17
fffff802`63275c10 fffff802`5ce43060 : ffff8782`9d191d10 00000000`00000000 00000000`00000005 ffff8782`9d191d10 : nt!KiRemoveTimer2+0x95
fffff802`63275c60 fffff802`5ce07184 : fffff802`5a6b3180 00000000`00000000 00000000`00000008 00000000`009e3f8b : nt!KiTimer2Expiration+0x200
fffff802`63275d20 fffff802`5cffcc95 : 00000000`00000000 fffff802`5a6b3180 fffff802`5d8f3ba0 0ea0ea0e`a0ea0ea1 : nt!KiRetireDpcList+0x874
fffff802`63275fb0 fffff802`5cffca80 : 00000000`00000140 fffff802`5ceec5ca 00000000`00000000 00000000`00000001 : nt!KxRetireDpcList+0x5
ffffa905`d0f979c0 fffff802`5cffc335 : 0ea0ea0e`a0ea0ea1 fffff802`5cff7ce1 00000188`81394700 ffffa905`d0f97a80 : nt!KiDispatchInterruptContinue
ffffa905`d0f979f0 fffff802`5cff7ce1 : 00000188`81394700 ffffa905`d0f97a80 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffa905`d0f97a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}
Followup: MachineOwner
---------