[CODE title="Dosya 1"]
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb48d1e042068, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80764fb1068, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6220
Key : Analysis.Init.CPU.mSec
Value: 311
Key : Analysis.Init.Elapsed.mSec
Value: 2550
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffb48d1e042068
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80764fb1068
READ_ADDRESS: fffff807652fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb48d1e042068
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffffc981027b6560 -- (.trap 0xffffc981027b6560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb48d1e041be8 rbx=0000000000000000 rcx=ffffb48d1e041be8
rdx=ffffb48d1e041bb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80764fb1068 rsp=ffffc981027b66f0 rbp=0000000000000000
r8=fffff807652168f0 r9=ffff970000000028 r10=ffff970000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`64fb1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffb48d`1e042068=????????????????
Resetting default scope
STACK_TEXT:
ffffc981`027b6418 fffff807`64a08c69 : 00000000`0000000a ffffb48d`1e042068 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc981`027b6420 fffff807`64a04f69 : 00000000`00000000 fffff807`6492a576 ffff1819`00000000 00001f80`0002020b : nt!KiBugCheckDispatch+0x69
ffffc981`027b6560 fffff807`64fb1068 : ffff8180`512df048 00000000`00000008 ffffc981`027b6b80 ffffc981`027b6798 : nt!KiPageFault+0x469
ffffc981`027b66f0 fffff807`64f47811 : ffffc981`027b67b0 ffffc981`027b6b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffc981`027b6740 fffff807`64cfcf75 : 0000025d`fa3d5040 00000000`00020000 ffff8180`512df040 ffffb48d`1a5423e0 : nt!ExpGetLockInformation+0x5d
ffffc981`027b6780 fffff807`64cfbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000025d`fa3d5040 : nt!ExpQuerySystemInformation+0x10b5
ffffc981`027b6ac0 fffff807`64a08bf1 : ffffb48d`178f0000 00000000`00000001 0000025f`7c472cce ffffc981`027b6b80 : nt!NtQuerySystemInformation+0x37
ffffc981`027b6b00 00007ffe`7626d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000dc`ea4ff508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7626d4e4
SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a4
FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}
Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 2"]IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd1000a9d1078, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807621b1068, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2765
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5777
Key : Analysis.Init.CPU.mSec
Value: 390
Key : Analysis.Init.Elapsed.mSec
Value: 9618
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffd1000a9d1078
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807621b1068
READ_ADDRESS: fffff807624fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd1000a9d1078
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffffcb816668b560 -- (.trap 0xffffcb816668b560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd1000a9d0bf8 rbx=0000000000000000 rcx=ffffd1000a9d0bf8
rdx=ffffd1000a9d0bc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807621b1068 rsp=ffffcb816668b6f0 rbp=0000000000000000
r8=fffff807624168f0 r9=fffffb0000000028 r10=fffffb0000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`621b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffd100`0a9d1078=????????????????
Resetting default scope
STACK_TEXT:
ffffcb81`6668b418 fffff807`61c08c69 : 00000000`0000000a ffffd100`0a9d1078 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcb81`6668b420 fffff807`61c04f69 : 00000000`00000000 00000000`00000000 ffffea36`00000000 00001f80`00170280 : nt!KiBugCheckDispatch+0x69
ffffcb81`6668b560 fffff807`621b1068 : ffffb980`dd600048 00000000`00000008 ffffcb81`6668bb80 ffffcb81`6668b798 : nt!KiPageFault+0x469
ffffcb81`6668b6f0 fffff807`62147811 : ffffcb81`6668b7b0 ffffcb81`6668bb80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffcb81`6668b740 fffff807`61efcf75 : 000001be`b28f1040 00000000`00020000 ffffb980`dd600040 ffffd100`1330c010 : nt!ExpGetLockInformation+0x5d
ffffcb81`6668b780 fffff807`61efbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 000001be`b28f1040 : nt!ExpQuerySystemInformation+0x10b5
ffffcb81`6668bac0 fffff807`61c08bf1 : ffffd100`09170000 00000000`00000001 000000b4`42eff210 ffffcb81`6668bb80 : nt!NtQuerySystemInformation+0x37
ffffcb81`6668bb00 00007fff`a7fed4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000b4`42eff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a7fed4e4
SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a4
FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}
Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 3"]IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd9093d463258, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8076e1b1068, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17902
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 2142
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffd9093d463258
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8076e1b1068
READ_ADDRESS: fffff8076e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd9093d463258
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffffe90ba7510560 -- (.trap 0xffffe90ba7510560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd9093d462dd8 rbx=0000000000000000 rcx=ffffd9093d462dd8
rdx=ffffd9093d462da8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076e1b1068 rsp=ffffe90ba75106f0 rbp=0000000000000000
r8=fffff8076e4168f0 r9=ffffec0000000028 r10=ffffec0000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`6e1b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffd909`3d463258=????????????????
Resetting default scope
STACK_TEXT:
ffffe90b`a7510418 fffff807`6dc08c69 : 00000000`0000000a ffffd909`3d463258 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe90b`a7510420 fffff807`6dc04f69 : 00000000`00000000 00000000`00000000 ffff97b7`00000000 00001f80`00280280 : nt!KiBugCheckDispatch+0x69
ffffe90b`a7510560 fffff807`6e1b1068 : ffffb180`87800048 00000000`00000008 ffffe90b`a7510b80 ffffe90b`a7510798 : nt!KiPageFault+0x469
ffffe90b`a75106f0 fffff807`6e147811 : ffffe90b`a75107b0 ffffe90b`a7510b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffe90b`a7510740 fffff807`6defcf75 : 0000029e`5ec87040 00000000`00020000 ffffb180`87800040 ffffd909`40547630 : nt!ExpGetLockInformation+0x5d
ffffe90b`a7510780 fffff807`6defbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000029e`5ec87040 : nt!ExpQuerySystemInformation+0x10b5
ffffe90b`a7510ac0 fffff807`6dc08bf1 : ffffd909`3c280000 00000000`00000001 00000000`35039f5b ffffe90b`a7510b80 : nt!NtQuerySystemInformation+0x37
ffffe90b`a7510b00 00007ffc`42b2d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000ec`a0eff588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`42b2d4e4
SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a4
FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}
Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 4"]
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffac08a8dc53c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021e9b1068, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2437
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15696
Key : Analysis.Init.CPU.mSec
Value: 437
Key : Analysis.Init.Elapsed.mSec
Value: 29814
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffffac08a8dc53c8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8021e9b1068
READ_ADDRESS: fffff8021ecfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffac08a8dc53c8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffffef8bed741560 -- (.trap 0xffffef8bed741560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac08a8dc4f48 rbx=0000000000000000 rcx=ffffac08a8dc4f48
rdx=ffffac08a8dc4f18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021e9b1068 rsp=ffffef8bed7416f0 rbp=0000000000000000
r8=fffff8021ec168f0 r9=ffffe58000000028 r10=ffffe58000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff802`1e9b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffac08`a8dc53c8=????????????????
Resetting default scope
STACK_TEXT:
ffffef8b`ed741418 fffff802`1e408c69 : 00000000`0000000a ffffac08`a8dc53c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffef8b`ed741420 fffff802`1e404f69 : 00000000`00000000 fffff802`1e32a576 ffffa45a`00000000 00001f80`00020234 : nt!KiBugCheckDispatch+0x69
ffffef8b`ed741560 fffff802`1e9b1068 : ffffc201`781df048 00000000`00000008 ffffef8b`ed741b80 ffffef8b`ed741798 : nt!KiPageFault+0x469
ffffef8b`ed7416f0 fffff802`1e947811 : ffffef8b`ed7417b0 ffffef8b`ed741b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffef8b`ed741740 fffff802`1e6fcf75 : 0000022b`047f1040 00000000`00020000 ffffc201`781df040 ffffac08`a98f5010 : nt!ExpGetLockInformation+0x5d
ffffef8b`ed741780 fffff802`1e6fbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000022b`047f1040 : nt!ExpQuerySystemInformation+0x10b5
ffffef8b`ed741ac0 fffff802`1e408bf1 : ffffac08`acc40000 00000000`00000001 00000047`3d6ff210 ffffef8b`ed741b80 : nt!NtQuerySystemInformation+0x37
ffffef8b`ed741b00 00007ff8`3eb6d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000047`3d6ff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`3eb6d4e4
SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a4
FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}
Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 5"]
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffdf8f6f139f63, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80707711f34, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13499
Key : Analysis.Init.CPU.mSec
Value: 484
Key : Analysis.Init.Elapsed.mSec
Value: 14639
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffffdf8f6f139f63
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80707711f34
READ_ADDRESS: fffff807080fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffdf8f6f139f63
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64
TRAP_FRAME: ffff88878b01d500 -- (.trap 0xffff88878b01d500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80707400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80707711f34 rsp=ffff88878b01d690 rbp=ffff88878b01d7c0
r8=0000000000000001 r9=0000000000000001 r10=ffff9103640a88a8
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreeHeapPool+0x124:
fffff807`07711f34 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope
STACK_TEXT:
ffff8887`8b01d3b8 fffff807`07808c69 : 00000000`0000000a ffffdf8f`6f139f63 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8887`8b01d3c0 fffff807`07804f69 : fffffffe`bfd95bb9 00000000`00000001 00000001`401e2353 fffff807`07713c0c : nt!KiBugCheckDispatch+0x69
ffff8887`8b01d500 fffff807`07711f34 : 00000000`00000001 00000000`00000286 00000000`00000006 00000000`00000424 : nt!KiPageFault+0x469
ffff8887`8b01d690 fffff807`07db3149 : fffff807`1c040000 ffff9103`52720cd0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffff8887`8b01d770 fffff807`1c7cae9e : 00000000`00000424 ffff9103`640a8300 fffff807`1c040000 00000000`00000008 : nt!ExFreePool+0x9
ffff8887`8b01d7a0 00000000`00000424 : ffff9103`640a8300 fffff807`1c040000 00000000`00000008 fffff807`1c040000 : vgk+0x78ae9e
ffff8887`8b01d7a8 ffff9103`640a8300 : fffff807`1c040000 00000000`00000008 fffff807`1c040000 00000000`00000001 : 0x424
ffff8887`8b01d7b0 fffff807`1c040000 : 00000000`00000008 fffff807`1c040000 00000000`00000001 00000000`00000000 : 0xffff9103`640a8300
ffff8887`8b01d7b8 00000000`00000008 : fffff807`1c040000 00000000`00000001 00000000`00000000 00000000`00000424 : vgk
ffff8887`8b01d7c0 fffff807`1c040000 : 00000000`00000001 00000000`00000000 00000000`00000424 ffff8887`8b01d840 : 0x8
ffff8887`8b01d7c8 00000000`00000001 : 00000000`00000000 00000000`00000424 ffff8887`8b01d840 fffff807`1c784e1f : vgk
ffff8887`8b01d7d0 00000000`00000000 : 00000000`00000424 ffff8887`8b01d840 fffff807`1c784e1f fffff807`07760440 : 0x1
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.985
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------[/CODE]