Windows 10 kernel Security check failure hatası

benarda

Femtopat
Katılım
14 Ekim 2020
Mesajlar
2
Daha fazla  
Cinsiyet
Erkek
Kernel Security check failure mavi ekran hatası alıyorum, laptopum yeni ve markası ASUS. Bazı programlar yüklemek istiyorum, ASUS'un kendi programlarını maalesef ki bu hatayı almaktayım, yardımcı olabilirseniz sevinirim dump dosyası
Linki de paylastım.
 
Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Ağ sürücülerinizi güncelleyin. Aynı işlemi Bluetooth sürücüleriniz için de yapın.

Ayrıca bellek testi yapın.
Kod:
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffffe603afe02100, Address of the heap that reported the corruption
Arg3: ffffe603c1d98000, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7077

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 60218

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  13a

BUGCHECK_P1: 12

BUGCHECK_P2: ffffe603afe02100

BUGCHECK_P3: ffffe603c1d98000

BUGCHECK_P4: 0

CORRUPTING_POOL_ADDRESS: fffff800244fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8002440f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8002440f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffe603c1d98000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffb103`df8cec08 fffff800`23d8d938     : 00000000`0000013a 00000000`00000012 ffffe603`afe02100 ffffe603`c1d98000 : nt!KeBugCheckEx
ffffb103`df8cec10 fffff800`23d8d998     : 00000000`00000012 ffffe603`afe02280 ffffe603`afe02100 ffffe603`c247bcc0 : nt!RtlpHeapHandleError+0x40
ffffb103`df8cec50 fffff800`23d8d5c5     : ffffe603`c1e680e8 ffffb103`df8ced74 ffffb103`df8ced74 ffff9700`000000ff : nt!RtlpHpHeapHandleError+0x58
ffffb103`df8cec80 fffff800`23c66374     : 00000000`00000000 fffff800`23b5cf2d 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffb103`df8cecb0 fffff800`23acf778     : 00000000`00000000 01800150`00000f80 ffffb103`df8cedf1 00000000`00000f80 : nt!RtlpHpVsContextAllocateInternal+0x19a374
ffffb103`df8ced10 fffff800`241b2094     : ffffe603`00000000 00000000`00000000 00000000`4d52564e fffff800`33519daf : nt!ExAllocateHeapPool+0x888
ffffb103`df8cee50 fffff800`33c1cd23     : 00000000`00000f00 00000000`00000000 ffffe603`b561cdd0 ffffe603`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffb103`df8ceea0 00000000`00000f00     : 00000000`00000000 ffffe603`b561cdd0 ffffe603`00000000 fffff800`343b15c0 : nvlddmkm+0x80cd23
ffffb103`df8ceea8 00000000`00000000     : ffffe603`b561cdd0 ffffe603`00000000 fffff800`343b15c0 fffff800`343b1608 : 0xf00


SYMBOL_NAME:  nvlddmkm+80cd23

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  80cd23

FAILURE_BUCKET_ID:  0x13a_12_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a796bf4c-66c5-2334-6cf1-fb1d4a426bad}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffb60fa3c7ca20, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb60fa3c7c978, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10735

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffb60fa3c7ca20

BUGCHECK_P3: ffffb60fa3c7c978

BUGCHECK_P4: 0

TRAP_FRAME:  ffffb60fa3c7ca20 -- (.trap 0xffffb60fa3c7ca20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb805bdd71a08 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffb805bdd71a08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8072f0666ff rsp=ffffb60fa3c7cbb0 rbp=0000000000000001
 r8=ffffb805bf4b00e8  r9=0000000000000000 r10=ffffb805a8402290
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!RtlRbInsertNodeEx+0x197f2f:
fffff807`2f0666ff cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffb60fa3c7c978 -- (.exr 0xffffb60fa3c7c978)
ExceptionAddress: fffff8072f0666ff (nt!RtlRbInsertNodeEx+0x0000000000197f2f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffb60f`a3c7c6f8 fffff807`2f005e69     : 00000000`00000139 00000000`0000001d ffffb60f`a3c7ca20 ffffb60f`a3c7c978 : nt!KeBugCheckEx
ffffb60f`a3c7c700 fffff807`2f006290     : 00000000`00000000 00000000`000000ff 00000000`00000103 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb60f`a3c7c840 fffff807`2f004623     : ffffb805`a8abfd20 00000000`00000001 ffffffff`ffffffff ffffa101`39c89e20 : nt!KiFastFailDispatch+0xd0
ffffb60f`a3c7ca20 fffff807`2f0666ff     : ffffb805`bdd71a00 fffff807`2eecd507 ffffb805`bdd65000 ffffb60f`a3c7cc30 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb60f`a3c7cbb0 fffff807`2eecd507     : ffffb805`bdd65000 ffffb60f`a3c7cc30 ffffb805`a8402280 33333333`33333333 : nt!RtlRbInsertNodeEx+0x197f2f
ffffb60f`a3c7cbc0 fffff807`2eecbc44     : ffffb805`00000000 ffffb805`00000000 00000000`00000000 ffffb805`00000000 : nt!RtlpHpVsContextFree+0x3d7
ffffb60f`a3c7cc60 fffff807`2f5b2019     : 00000000`00000480 00000000`00040082 ffffb60f`a3c7cd68 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffb60f`a3c7cd40 fffff807`2f2711c0     : ffffb805`ba10c300 ffffa101`33d31c30 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
ffffb60f`a3c7cd70 fffff807`2f1f1be4     : 00000000`000022be ffffb60f`a3c7d350 00000000`000022b4 00000000`00000000 : nt!RtlReleasePrivilege+0x84
ffffb60f`a3c7cdb0 fffff807`2f21ca6d     : 00000000`00000000 ffffb60f`a3c7d350 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x13b8
ffffb60f`a3c7d2d0 fffff807`2f0058b8     : 00000000`00000002 00000000`00000001 00000000`00000000 00000146`09e4fd90 : nt!NtCreateUserProcess+0x6ed
ffffb60f`a3c7da90 00007fff`3852d6b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000014`e4d7d038 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`3852d6b4


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.508

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ab43366d-59cb-5971-8e17-b53398bf3f90}

Followup:     Pool_corruption
---------


DRIVER_POWER_STATE_FAILURE (9f)
A driver has failed to complete a power IRP within a specific time.
Arguments:
Arg1: 0000000000000003, A device object has been blocking an Irp for too long a time
Arg2: ffff950473dcc060, Physical Device Object of the stack
Arg3: ffff820963661850, nt!TRIAGE_9F_POWER on Win7 and higher, otherwise the Functional Device Object of the stack
Arg4: ffff950484806a20, The blocked IRP

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4328

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11249

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  9f

BUGCHECK_P1: 3

BUGCHECK_P2: ffff950473dcc060

BUGCHECK_P3: ffff820963661850

BUGCHECK_P4: ffff950484806a20

DRVPOWERSTATE_SUBCODE:  3

IMAGE_NAME:  pci.sys

MODULE_NAME: pci

FAULTING_MODULE: fffff8024aa00000 pci

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff8209`63661818 fffff802`4795f4b7     : 00000000`0000009f 00000000`00000003 ffff9504`73dcc060 ffff8209`63661850 : nt!KeBugCheckEx
ffff8209`63661820 fffff802`4795f3d1     : ffff9504`84703860 00000000`00000000 00000000`00000000 00000000`0000ce40 : nt!PopIrpWatchdogBugcheck+0xdf
ffff8209`63661890 fffff802`476c3ee2     : ffff9504`84703898 ffffa701`3d6a6180 ffff8209`63661b18 00000000`00000000 : nt!PopIrpWatchdog+0x31
ffff8209`636618e0 fffff802`476e910d     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000ce40 : nt!KiProcessExpiredTimerList+0x172
ffff8209`636619d0 fffff802`477f7a0e     : ffffffff`00000000 ffffa701`3d6a6180 ffffa701`3d6b1240 ffff9504`82d43080 : nt!KiRetireDpcList+0x5dd
ffff8209`63661c60 00000000`00000000     : ffff8209`63662000 ffff8209`6365c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x9F_3_rtwlane_IMAGE_pci.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cda4588d-ced9-4f12-c4ab-81b725dcd338}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffb80a55e1b350, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb80a55e1b2a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6171

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7833

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffb80a55e1b350

BUGCHECK_P3: ffffb80a55e1b2a8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffb80a55e1b350 -- (.trap 0xffffb80a55e1b350)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff81080cbf4e48 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802796666c7 rsp=ffffb80a55e1b4e8 rbp=00000000000001c2
 r8=0000000000000000  r9=ffff81080d7110e8 r10=0000000000000000
r11=ffff81080a88bfe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!RtlRbRemoveNode+0x198c17:
fffff802`796666c7 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffb80a55e1b2a8 -- (.exr 0xffffb80a55e1b2a8)
ExceptionAddress: fffff802796666c7 (nt!RtlRbRemoveNode+0x0000000000198c17)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffb80a`55e1b028 fffff802`79605e69     : 00000000`00000139 00000000`0000001d ffffb80a`55e1b350 ffffb80a`55e1b2a8 : nt!KeBugCheckEx
ffffb80a`55e1b030 fffff802`79606290     : 00000000`00000000 00000000`00000180 ffffde0b`7fb20000 fffff802`794cfc99 : nt!KiBugCheckDispatch+0x69
ffffb80a`55e1b170 fffff802`79604623     : fffff802`7943fff0 fffff802`7943b310 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb80a`55e1b350 fffff802`796666c7     : 00000051`001a0000 0001001a`01c20001 fffff802`794cd870 00000000`000001c2 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb80a`55e1b4e8 fffff802`794cd870     : 00000000`000001c2 ffff8108`0cbf4fe0 00000000`00000000 ffff8108`0cbf4e40 : nt!RtlRbRemoveNode+0x198c17
ffffb80a`55e1b500 fffff802`794cd2b8     : ffff8107`fa602280 ffff8108`0cbea000 00000000`00000000 ffffb80a`55e1b608 : nt!RtlpHpVsChunkCoalesce+0xb0
ffffb80a`55e1b560 fffff802`794cbc44     : 00000000`00000000 fffff802`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
ffffb80a`55e1b600 fffff802`79bb2019     : ffff8107`00001c10 ffff8107`fa602100 ffff9101`0d500000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffb80a`55e1b6e0 fffff802`8460e2d6     : 00000000`00000000 fffff802`753b46c0 00000000`00000000 ffff8108`0d69e4f0 : nt!ExFreePool+0x9
ffffb80a`55e1b710 fffff802`8460d2f9     : ffffb80a`55e1b7e0 ffffde0b`7e5165f8 ffff8108`00000000 ffff8108`0d69e400 : Npfs!NpReadDataQueue+0x246
ffffb80a`55e1b780 fffff802`794d1f35     : ffff8107`ffc7dda0 ffff8107`00000bc8 000001e6`750c7498 ffff8108`0d578090 : Npfs!NpFsdRead+0x259
ffffb80a`55e1b830 fffff802`763d4906     : 000001e6`69cfe220 00000000`00000001 ffff8108`0d66d080 fffff802`798d4b41 : nt!IofCallDriver+0x55
ffffb80a`55e1b870 fffff802`794d1f35     : ffff8108`0d578090 000001e6`69cfe220 ffffb80a`55e1bb80 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffffb80a`55e1b8d0 fffff802`798a6fb8     : ffff8108`0d578090 00000000`00000000 ffff8108`0d578090 00000000`00000000 : nt!IofCallDriver+0x55
ffffb80a`55e1b910 fffff802`798aa1f9     : ffff8108`00000000 ffffb80a`55e1bb80 00000000`00000000 ffffb80a`55e1bb80 : nt!IopSynchronousServiceTail+0x1a8
ffffb80a`55e1b9b0 fffff802`796058b8     : ffff8108`0d5fa080 00000000`00000000 00000000`00000000 000001e6`69cfe220 : nt!NtReadFile+0x599
ffffb80a`55e1ba90 00007ffc`1e38be84     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b1`749ff438 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`1e38be84


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.508

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ab43366d-59cb-5971-8e17-b53398bf3f90}

Followup:     Pool_corruption
---------


KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff9c83a5602100, Address of the heap that reported the corruption
Arg3: ffff9c83b88d3000, Address at which the corruption was detected
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6983

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9894

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  13a

BUGCHECK_P1: 12

BUGCHECK_P2: ffff9c83a5602100

BUGCHECK_P3: ffff9c83b88d3000

BUGCHECK_P4: 0

CORRUPTING_POOL_ADDRESS: fffff8033befa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033be0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8033be0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff9c83b88d3000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MicrosoftEdgeCP.exe

STACK_TEXT: 
ffff8589`cc3c2508 fffff803`3b78d938     : 00000000`0000013a 00000000`00000012 ffff9c83`a5602100 ffff9c83`b88d3000 : nt!KeBugCheckEx
ffff8589`cc3c2510 fffff803`3b78d998     : 00000000`00000012 ffff9c83`a5602280 ffff9c83`a5602100 fffffa00`ded04020 : nt!RtlpHeapHandleError+0x40
ffff8589`cc3c2550 fffff803`3b78d5c5     : ffff9c83`b88d50e8 ffff8589`cc3c2674 ffff8589`cc3c2674 fffff803`3b4fb792 : nt!RtlpHpHeapHandleError+0x58
ffff8589`cc3c2580 fffff803`3b666374     : 00000000`00000000 ffff9c83`b7ba7080 00000000`00000000 ffff8589`cc3c2790 : nt!RtlpLogHeapFailure+0x45
ffff8589`cc3c25b0 fffff803`3b4cf778     : 00000000`00000000 00000000`00000c00 ffff8589`cc3c26f1 00000000`00000c00 : nt!RtlpHpVsContextAllocateInternal+0x19a374
ffff8589`cc3c2610 fffff803`3bbb2094     : 000001bd`00000000 00000000`00000000 000001bd`4b677844 fffff803`452eda6d : nt!ExAllocateHeapPool+0x888
ffff8589`cc3c2750 fffff803`45202e61     : 00000000`00000bc0 ffff8589`cc3c2b80 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffff8589`cc3c27a0 fffff803`4531b1ba     : ffff9c83`b563c080 00000000`00000000 00000000`00000001 fffffa00`ded04020 : dxgkrnl!operator new+0x31
ffff8589`cc3c27d0 fffff803`4531b05e     : 00000032`4d6f8060 ffff9c83`b563c080 00000032`4d6f8060 000001bd`a0802040 : dxgkrnl!DxgkQueryAdapterInfoInternal+0x14a
ffff8589`cc3c2ad0 fffff803`3b6058b8     : ffff9c83`b563c080 00000000`00000010 00000000`00000001 ffff9c83`00000000 : dxgkrnl!DxgkQueryAdapterInfo+0xe
ffff8589`cc3c2b00 00007ff9`a6d754c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000032`4d6f7fd8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a6d754c4


SYMBOL_NAME:  dxgkrnl!operator new+31

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  31

FAILURE_BUCKET_ID:  0x13a_12_dxgkrnl!operator_new

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b349f4a5-651b-df82-c082-6e3e19db583f}

Followup:     MachineOwner
---------
 
Son düzenleme:
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…