KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffffe603afe02100, Address of the heap that reported the corruption
Arg3: ffffe603c1d98000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7077
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 60218
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffffe603afe02100
BUGCHECK_P3: ffffe603c1d98000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff800244fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8002440f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8002440f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe603c1d98000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffb103`df8cec08 fffff800`23d8d938 : 00000000`0000013a 00000000`00000012 ffffe603`afe02100 ffffe603`c1d98000 : nt!KeBugCheckEx
ffffb103`df8cec10 fffff800`23d8d998 : 00000000`00000012 ffffe603`afe02280 ffffe603`afe02100 ffffe603`c247bcc0 : nt!RtlpHeapHandleError+0x40
ffffb103`df8cec50 fffff800`23d8d5c5 : ffffe603`c1e680e8 ffffb103`df8ced74 ffffb103`df8ced74 ffff9700`000000ff : nt!RtlpHpHeapHandleError+0x58
ffffb103`df8cec80 fffff800`23c66374 : 00000000`00000000 fffff800`23b5cf2d 00000000`00000000 00000000`00000000 : nt!RtlpLogHeapFailure+0x45
ffffb103`df8cecb0 fffff800`23acf778 : 00000000`00000000 01800150`00000f80 ffffb103`df8cedf1 00000000`00000f80 : nt!RtlpHpVsContextAllocateInternal+0x19a374
ffffb103`df8ced10 fffff800`241b2094 : ffffe603`00000000 00000000`00000000 00000000`4d52564e fffff800`33519daf : nt!ExAllocateHeapPool+0x888
ffffb103`df8cee50 fffff800`33c1cd23 : 00000000`00000f00 00000000`00000000 ffffe603`b561cdd0 ffffe603`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffb103`df8ceea0 00000000`00000f00 : 00000000`00000000 ffffe603`b561cdd0 ffffe603`00000000 fffff800`343b15c0 : nvlddmkm+0x80cd23
ffffb103`df8ceea8 00000000`00000000 : ffffe603`b561cdd0 ffffe603`00000000 fffff800`343b15c0 fffff800`343b1608 : 0xf00
SYMBOL_NAME: nvlddmkm+80cd23
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 80cd23
FAILURE_BUCKET_ID: 0x13a_12_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a796bf4c-66c5-2334-6cf1-fb1d4a426bad}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffb60fa3c7ca20, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb60fa3c7c978, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10735
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffb60fa3c7ca20
BUGCHECK_P3: ffffb60fa3c7c978
BUGCHECK_P4: 0
TRAP_FRAME: ffffb60fa3c7ca20 -- (.trap 0xffffb60fa3c7ca20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb805bdd71a08 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffb805bdd71a08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8072f0666ff rsp=ffffb60fa3c7cbb0 rbp=0000000000000001
r8=ffffb805bf4b00e8 r9=0000000000000000 r10=ffffb805a8402290
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!RtlRbInsertNodeEx+0x197f2f:
fffff807`2f0666ff cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb60fa3c7c978 -- (.exr 0xffffb60fa3c7c978)
ExceptionAddress: fffff8072f0666ff (nt!RtlRbInsertNodeEx+0x0000000000197f2f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb60f`a3c7c6f8 fffff807`2f005e69 : 00000000`00000139 00000000`0000001d ffffb60f`a3c7ca20 ffffb60f`a3c7c978 : nt!KeBugCheckEx
ffffb60f`a3c7c700 fffff807`2f006290 : 00000000`00000000 00000000`000000ff 00000000`00000103 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb60f`a3c7c840 fffff807`2f004623 : ffffb805`a8abfd20 00000000`00000001 ffffffff`ffffffff ffffa101`39c89e20 : nt!KiFastFailDispatch+0xd0
ffffb60f`a3c7ca20 fffff807`2f0666ff : ffffb805`bdd71a00 fffff807`2eecd507 ffffb805`bdd65000 ffffb60f`a3c7cc30 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb60f`a3c7cbb0 fffff807`2eecd507 : ffffb805`bdd65000 ffffb60f`a3c7cc30 ffffb805`a8402280 33333333`33333333 : nt!RtlRbInsertNodeEx+0x197f2f
ffffb60f`a3c7cbc0 fffff807`2eecbc44 : ffffb805`00000000 ffffb805`00000000 00000000`00000000 ffffb805`00000000 : nt!RtlpHpVsContextFree+0x3d7
ffffb60f`a3c7cc60 fffff807`2f5b2019 : 00000000`00000480 00000000`00040082 ffffb60f`a3c7cd68 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffb60f`a3c7cd40 fffff807`2f2711c0 : ffffb805`ba10c300 ffffa101`33d31c30 00000000`00000000 00000000`00000000 : nt!ExFreePool+0x9
ffffb60f`a3c7cd70 fffff807`2f1f1be4 : 00000000`000022be ffffb60f`a3c7d350 00000000`000022b4 00000000`00000000 : nt!RtlReleasePrivilege+0x84
ffffb60f`a3c7cdb0 fffff807`2f21ca6d : 00000000`00000000 ffffb60f`a3c7d350 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x13b8
ffffb60f`a3c7d2d0 fffff807`2f0058b8 : 00000000`00000002 00000000`00000001 00000000`00000000 00000146`09e4fd90 : nt!NtCreateUserProcess+0x6ed
ffffb60f`a3c7da90 00007fff`3852d6b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000014`e4d7d038 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`3852d6b4
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.508
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}
Followup: Pool_corruption
---------
DRIVER_POWER_STATE_FAILURE (9f)
A driver has failed to complete a power IRP within a specific time.
Arguments:
Arg1: 0000000000000003, A device object has been blocking an Irp for too long a time
Arg2: ffff950473dcc060, Physical Device Object of the stack
Arg3: ffff820963661850, nt!TRIAGE_9F_POWER on Win7 and higher, otherwise the Functional Device Object of the stack
Arg4: ffff950484806a20, The blocked IRP
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4328
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11249
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 9f
BUGCHECK_P1: 3
BUGCHECK_P2: ffff950473dcc060
BUGCHECK_P3: ffff820963661850
BUGCHECK_P4: ffff950484806a20
DRVPOWERSTATE_SUBCODE: 3
IMAGE_NAME: pci.sys
MODULE_NAME: pci
FAULTING_MODULE: fffff8024aa00000 pci
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8209`63661818 fffff802`4795f4b7 : 00000000`0000009f 00000000`00000003 ffff9504`73dcc060 ffff8209`63661850 : nt!KeBugCheckEx
ffff8209`63661820 fffff802`4795f3d1 : ffff9504`84703860 00000000`00000000 00000000`00000000 00000000`0000ce40 : nt!PopIrpWatchdogBugcheck+0xdf
ffff8209`63661890 fffff802`476c3ee2 : ffff9504`84703898 ffffa701`3d6a6180 ffff8209`63661b18 00000000`00000000 : nt!PopIrpWatchdog+0x31
ffff8209`636618e0 fffff802`476e910d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0000ce40 : nt!KiProcessExpiredTimerList+0x172
ffff8209`636619d0 fffff802`477f7a0e : ffffffff`00000000 ffffa701`3d6a6180 ffffa701`3d6b1240 ffff9504`82d43080 : nt!KiRetireDpcList+0x5dd
ffff8209`63661c60 00000000`00000000 : ffff8209`63662000 ffff8209`6365c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x9F_3_rtwlane_IMAGE_pci.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {cda4588d-ced9-4f12-c4ab-81b725dcd338}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffb80a55e1b350, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffb80a55e1b2a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6171
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7833
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 1d
BUGCHECK_P2: ffffb80a55e1b350
BUGCHECK_P3: ffffb80a55e1b2a8
BUGCHECK_P4: 0
TRAP_FRAME: ffffb80a55e1b350 -- (.trap 0xffffb80a55e1b350)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff81080cbf4e48 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802796666c7 rsp=ffffb80a55e1b4e8 rbp=00000000000001c2
r8=0000000000000000 r9=ffff81080d7110e8 r10=0000000000000000
r11=ffff81080a88bfe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!RtlRbRemoveNode+0x198c17:
fffff802`796666c7 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb80a55e1b2a8 -- (.exr 0xffffb80a55e1b2a8)
ExceptionAddress: fffff802796666c7 (nt!RtlRbRemoveNode+0x0000000000198c17)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 000000000000001d
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb80a`55e1b028 fffff802`79605e69 : 00000000`00000139 00000000`0000001d ffffb80a`55e1b350 ffffb80a`55e1b2a8 : nt!KeBugCheckEx
ffffb80a`55e1b030 fffff802`79606290 : 00000000`00000000 00000000`00000180 ffffde0b`7fb20000 fffff802`794cfc99 : nt!KiBugCheckDispatch+0x69
ffffb80a`55e1b170 fffff802`79604623 : fffff802`7943fff0 fffff802`7943b310 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffb80a`55e1b350 fffff802`796666c7 : 00000051`001a0000 0001001a`01c20001 fffff802`794cd870 00000000`000001c2 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb80a`55e1b4e8 fffff802`794cd870 : 00000000`000001c2 ffff8108`0cbf4fe0 00000000`00000000 ffff8108`0cbf4e40 : nt!RtlRbRemoveNode+0x198c17
ffffb80a`55e1b500 fffff802`794cd2b8 : ffff8107`fa602280 ffff8108`0cbea000 00000000`00000000 ffffb80a`55e1b608 : nt!RtlpHpVsChunkCoalesce+0xb0
ffffb80a`55e1b560 fffff802`794cbc44 : 00000000`00000000 fffff802`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
ffffb80a`55e1b600 fffff802`79bb2019 : ffff8107`00001c10 ffff8107`fa602100 ffff9101`0d500000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffb80a`55e1b6e0 fffff802`8460e2d6 : 00000000`00000000 fffff802`753b46c0 00000000`00000000 ffff8108`0d69e4f0 : nt!ExFreePool+0x9
ffffb80a`55e1b710 fffff802`8460d2f9 : ffffb80a`55e1b7e0 ffffde0b`7e5165f8 ffff8108`00000000 ffff8108`0d69e400 : Npfs!NpReadDataQueue+0x246
ffffb80a`55e1b780 fffff802`794d1f35 : ffff8107`ffc7dda0 ffff8107`00000bc8 000001e6`750c7498 ffff8108`0d578090 : Npfs!NpFsdRead+0x259
ffffb80a`55e1b830 fffff802`763d4906 : 000001e6`69cfe220 00000000`00000001 ffff8108`0d66d080 fffff802`798d4b41 : nt!IofCallDriver+0x55
ffffb80a`55e1b870 fffff802`794d1f35 : ffff8108`0d578090 000001e6`69cfe220 ffffb80a`55e1bb80 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
ffffb80a`55e1b8d0 fffff802`798a6fb8 : ffff8108`0d578090 00000000`00000000 ffff8108`0d578090 00000000`00000000 : nt!IofCallDriver+0x55
ffffb80a`55e1b910 fffff802`798aa1f9 : ffff8108`00000000 ffffb80a`55e1bb80 00000000`00000000 ffffb80a`55e1bb80 : nt!IopSynchronousServiceTail+0x1a8
ffffb80a`55e1b9b0 fffff802`796058b8 : ffff8108`0d5fa080 00000000`00000000 00000000`00000000 000001e6`69cfe220 : nt!NtReadFile+0x599
ffffb80a`55e1ba90 00007ffc`1e38be84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b1`749ff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`1e38be84
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.508
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}
Followup: Pool_corruption
---------
KERNEL_MODE_HEAP_CORRUPTION (13a)
The kernel mode heap manager has detected corruption in a heap.
Arguments:
Arg1: 0000000000000012, Type of corruption detected
Arg2: ffff9c83a5602100, Address of the heap that reported the corruption
Arg3: ffff9c83b88d3000, Address at which the corruption was detected
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6983
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9894
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 13a
BUGCHECK_P1: 12
BUGCHECK_P2: ffff9c83a5602100
BUGCHECK_P3: ffff9c83b88d3000
BUGCHECK_P4: 0
CORRUPTING_POOL_ADDRESS: fffff8033befa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033be0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8033be0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9c83b88d3000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MicrosoftEdgeCP.exe
STACK_TEXT:
ffff8589`cc3c2508 fffff803`3b78d938 : 00000000`0000013a 00000000`00000012 ffff9c83`a5602100 ffff9c83`b88d3000 : nt!KeBugCheckEx
ffff8589`cc3c2510 fffff803`3b78d998 : 00000000`00000012 ffff9c83`a5602280 ffff9c83`a5602100 fffffa00`ded04020 : nt!RtlpHeapHandleError+0x40
ffff8589`cc3c2550 fffff803`3b78d5c5 : ffff9c83`b88d50e8 ffff8589`cc3c2674 ffff8589`cc3c2674 fffff803`3b4fb792 : nt!RtlpHpHeapHandleError+0x58
ffff8589`cc3c2580 fffff803`3b666374 : 00000000`00000000 ffff9c83`b7ba7080 00000000`00000000 ffff8589`cc3c2790 : nt!RtlpLogHeapFailure+0x45
ffff8589`cc3c25b0 fffff803`3b4cf778 : 00000000`00000000 00000000`00000c00 ffff8589`cc3c26f1 00000000`00000c00 : nt!RtlpHpVsContextAllocateInternal+0x19a374
ffff8589`cc3c2610 fffff803`3bbb2094 : 000001bd`00000000 00000000`00000000 000001bd`4b677844 fffff803`452eda6d : nt!ExAllocateHeapPool+0x888
ffff8589`cc3c2750 fffff803`45202e61 : 00000000`00000bc0 ffff8589`cc3c2b80 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffff8589`cc3c27a0 fffff803`4531b1ba : ffff9c83`b563c080 00000000`00000000 00000000`00000001 fffffa00`ded04020 : dxgkrnl!operator new+0x31
ffff8589`cc3c27d0 fffff803`4531b05e : 00000032`4d6f8060 ffff9c83`b563c080 00000032`4d6f8060 000001bd`a0802040 : dxgkrnl!DxgkQueryAdapterInfoInternal+0x14a
ffff8589`cc3c2ad0 fffff803`3b6058b8 : ffff9c83`b563c080 00000000`00000010 00000000`00000001 ffff9c83`00000000 : dxgkrnl!DxgkQueryAdapterInfo+0xe
ffff8589`cc3c2b00 00007ff9`a6d754c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000032`4d6f7fd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a6d754c4
SYMBOL_NAME: dxgkrnl!operator new+31
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 31
FAILURE_BUCKET_ID: 0x13a_12_dxgkrnl!operator_new
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b349f4a5-651b-df82-c082-6e3e19db583f}
Followup: MachineOwner
---------