Yine sorun yaşarsanız minidump paylaşın tekrar bakayım.
Teşekkürler sağ olun.
İyi günler yine mavi ekran aldım. Minidump bırakıyorum şimdiden teşekkürler.
https://drive.google.com/file/d/1uBoQgeaoTROtHBBPdH2LaBGwkLHMmK6m/view?usp=sharing
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ali_h\AppData\Local\Temp\Rar$DIa6228.33429\031421-7187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`6f400000 PsLoadedModuleList = 0xfffff804`7002a490
Debug session time: Sun Mar 14 19:04:09.122 2021 (UTC + 3:00)
System Uptime: 0 days 0:13:11.880
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`6f7f5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa00`18ec56f0=000000000000003b
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8046f64ee6b, Address of the instruction which caused the bugcheck
Arg3: fffffa0018ec5ff0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7968
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11087
Key : Analysis.Init.CPU.mSec
Value: 718
Key : Analysis.Init.Elapsed.mSec
Value: 2696
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8046f64ee6b
BUGCHECK_P3: fffffa0018ec5ff0
BUGCHECK_P4: 0
CONTEXT: fffffa0018ec5ff0 -- (.cxr 0xfffffa0018ec5ff0)
rax=13199c340914604f rbx=ffff8004ffe00290 rcx=ffff80050bd60098
rdx=ffff80050bd37b18 rsi=0000000000000000 rdi=13199c340914604f
rip=fffff8046f64ee6b rsp=fffffa0018ec69f8 rbp=0000000000000022
r8=ffff80050bd55868 r9=ffff80050bd55868 r10=0000000000000000
r11=ffff80050bd6049a r12=0000000000000000 r13=ffff80050bd35000
r14=0000000000000000 r15=ffff80050bd37b10
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x39b:
fffff804`6f64ee6b 488b07 mov rax,qword ptr [rdi] ds:002b:13199c34`0914604f=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Origin.exe
STACK_TEXT:
fffffa00`18ec69f8 fffff804`6f64e890 : 00000000`00000022 ffff8005`0bd37c10 00000000`00000000 ffff8005`0bd37b10 : nt!RtlRbRemoveNode+0x39b
fffffa00`18ec6a10 fffff804`6f64e2d8 : ffff8004`ffe00280 ffff8005`0bd35000 ffff8004`ffe00280 fffffa00`18ec6b18 : nt!RtlpHpVsChunkCoalesce+0xb0
fffffa00`18ec6a70 fffff804`6f64cc64 : ffffcb05`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
fffffa00`18ec6b10 fffff804`6fdb1019 : fffffa00`00000210 00000000`00000004 fffffa00`18ec6d38 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffa00`18ec6bf0 fffff804`896719a7 : fffffa00`18ec6d48 00000000`00000004 ffff2e2a`3533a7e0 ffffcb05`0ff3fc20 : nt!ExFreePool+0x9
fffffa00`18ec6c20 fffff804`896d90bf : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00001c6c : dxgmms2!operator delete+0x17
fffffa00`18ec6c50 fffff804`896d8764 : ffff8005`0ba40620 00000000`00000001 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x94f
fffffa00`18ec6e80 fffff804`896716fa : ffff8005`0ba40620 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::DestroyAllocation+0xc
fffffa00`18ec6eb0 fffff804`87b9fc1c : 00000000`00000000 fffffa00`18ec6fe0 00000000`00000000 00000000`00000000 : dxgmms2!VidMmDestroyAllocation+0x1a
fffffa00`18ec6ee0 fffff804`87b9f3ff : ffff8005`0baea7e0 fffff804`87b8bdf2 ffff8005`0baea7e0 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x768
fffffa00`18ec7080 fffff804`87b8b088 : fffffa00`18ec7020 ffff8005`0baea7e0 00000000`00000000 ffff8005`0baea9c0 : dxgkrnl!DXGDEVICE::DrainAllocations+0x5f
fffffa00`18ec70e0 fffff804`87b8a8bc : ffff8005`0baea7e0 ffff8005`0a5b6e80 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x148
fffffa00`18ec7120 fffff804`87bcab4c : 00000000`00000000 fffffa00`18ec7250 ffff8005`0baea7e0 ffff8005`0baea7e0 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
fffffa00`18ec7150 fffff804`87bc5c15 : ffff8005`0a8d6b30 00000000`00000000 ffff8005`0a8d6b30 ffff8005`0965c390 : dxgkrnl!DXGPROCESS::Destroy+0x494
fffffa00`18ec73c0 fffff804`87ab6c71 : 00000000`00000000 ffffcb05`193f7290 00000000`00000000 fffff804`72c69c58 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffffa00`18ec7510 fffff804`6fa379ff : 00000000`00000000 ffffcb05`09ece100 ffffcb05`15243080 ffffcb05`143fbc80 : dxgkrnl!DxgkProcessNotify+0x1a1
fffffa00`18ec7560 fffff804`6fa62cf4 : ffffcb05`15243000 ffffcb05`15243080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffffa00`18ec7630 fffff804`6fb06af2 : ffffcb05`158504b8 00000000`00000000 fffffa00`18ec7820 00000000`00000000 : nt!PspExitProcess+0x70
fffffa00`18ec7660 fffff804`6fad2888 : 00000000`ffffffff 00000000`00000001 00000000`00000000 00000000`009a8000 : nt!PspExitThread+0x5b2
fffffa00`18ec7760 fffff804`6f667fb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffa00`18ec77a0 fffff804`6f7fa1f0 : 00000000`08e6f7b8 fffffa00`18ec7850 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffffa00`18ec7850 fffff804`6f80765f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`009a8000 : nt!KiInitiateUserApc+0x70
fffffa00`18ec7990 00007ff9`be3b9014 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`08d6e2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`be3b9014
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.867
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffffa0018ec5ff0 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ali_h\AppData\Local\Temp\Rar$DIa6228.39679\031421-7234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`5cc00000 PsLoadedModuleList = 0xfffff802`5d82a490
Debug session time: Sun Mar 14 18:50:35.533 2021 (UTC + 3:00)
System Uptime: 3 days 3:31:07.748
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`5cff5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff802`63275740=0000000000000139
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffff80263275a60, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff802632759b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9748
Key : Analysis.Init.CPU.mSec
Value: 717
Key : Analysis.Init.Elapsed.mSec
Value: 3242
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : FailFast.Name
Value: INVALID_BALANCED_TREE
Key : FailFast.Type
Value: 29
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: fffff80263275a60
BUGCHECK_P3: fffff802632759b8
BUGCHECK_P4: 0
TRAP_FRAME: fffff80263275a60 -- (.trap 0xfffff80263275a60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff87829c84eee0 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff87829c847ee0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025d02d6e7 rsp=fffff80263275bf8 rbp=ffff8782a6bb91c0
r8=ffff87829c84eee0 r9=0000000000000000 r10=0000000000000001
r11=ffff8782a6bb91c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x1dec17:
fffff802`5d02d6e7 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff802632759b8 -- (.exr 0xfffff802632759b8)
ExceptionAddress: fffff8025d02d6e7 (nt!RtlRbRemoveNode+0x00000000001dec17)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: proven_ground_client.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
DPC_STACK_BASE: FFFFF80263275FB0
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff802`63275738 fffff802`5d007b69 : 00000000`00000139 00000000`0000001d fffff802`63275a60 fffff802`632759b8 : nt!KeBugCheckEx
fffff802`63275740 fffff802`5d007f90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff802`63275880 fffff802`5d006323 : 00000000`00000000 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff802`63275a60 fffff802`5d02d6e7 : 00000000`00000048 ffff8782`9d191cf8 fffff802`5ce43215 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff802`63275bf8 fffff802`5ce43215 : 00000000`00000000 ffff8782`9d191d7a 00000000`00000000 fffff802`5d831dc0 : nt!RtlRbRemoveNode+0x1dec17
fffff802`63275c10 fffff802`5ce43060 : ffff8782`9d191d10 00000000`00000000 00000000`00000005 ffff8782`9d191d10 : nt!KiRemoveTimer2+0x95
fffff802`63275c60 fffff802`5ce07184 : fffff802`5a6b3180 00000000`00000000 00000000`00000008 00000000`009e3f8b : nt!KiTimer2Expiration+0x200
fffff802`63275d20 fffff802`5cffcc95 : 00000000`00000000 fffff802`5a6b3180 fffff802`5d8f3ba0 0ea0ea0e`a0ea0ea1 : nt!KiRetireDpcList+0x874
fffff802`63275fb0 fffff802`5cffca80 : 00000000`00000140 fffff802`5ceec5ca 00000000`00000000 00000000`00000001 : nt!KxRetireDpcList+0x5
ffffa905`d0f979c0 fffff802`5cffc335 : 0ea0ea0e`a0ea0ea1 fffff802`5cff7ce1 00000188`81394700 ffffa905`d0f97a80 : nt!KiDispatchInterruptContinue
ffffa905`d0f979f0 fffff802`5cff7ce1 : 00000188`81394700 ffffa905`d0f97a80 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffa905`d0f97a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}
Followup: MachineOwner
---------
Yine sorun yaşarsanız minidump paylaşın tekrar bakayım.
Teşekkürler sağ olun.
İyi günler yine mavi ekran aldım. Minidump bırakıyorum şimdiden teşekkürler.
https://drive.google.com/file/d/1uBoQgeaoTROtHBBPdH2LaBGwkLHMmK6m/view?usp=sharing
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.