*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INVALID_KERNEL_HANDLE (93)
This message occurs if kernel code attempts to close or reference a handle
that is not a valid handle. Only invalid or protected handles passed to NtClose
will cause this bugcheck, unless bad handle detection is enabled.
Arguments:
Arg1: 0000000000000103, The handle that NtClose was called with
Arg2: 0000000000000000, A protected handle was closed.
Arg3: 0000000000000000
Arg4: 0000000000000000, The error occurred closing an invalid kernel handle.
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x93
PROCESS_NAME: Zoom.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff80559db68a2 to fffff805597c2990
STACK_TEXT:
fffff406`240f6578 fffff805`59db68a2 : 00000000`00000093 00000000`00000103 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff406`240f6580 fffff805`59c0e32e : 00000000`00000103 00000000`00000001 00000000`00000000 ffff978a`1d4708c0 : nt!ObCloseHandleTableEntry+0x1adb32
fffff406`240f66c0 fffff805`597d4255 : ffffdb00`300d9000 ffff978a`1ecda642 fffff406`240f67b0 00000000`00000000 : nt!NtClose+0xde
fffff406`240f6730 fffff805`597c67b0 : fffff805`6a00452c ffffb204`59027670 fffff805`6a0252b4 fffff406`240f695c : nt!KiSystemServiceCopyEnd+0x25
fffff406`240f68c8 fffff805`6a00452c : ffffb204`59027670 fffff805`6a0252b4 fffff406`240f695c 00000000`00000000 : nt!KiServiceLinkage
fffff406`240f68d0 ffffb204`59027670 : fffff805`6a0252b4 fffff406`240f695c 00000000`00000000 fffff406`00000000 : usbVM303+0x452c
fffff406`240f68d8 fffff805`6a0252b4 : fffff406`240f695c 00000000`00000000 fffff406`00000000 00000000`00820001 : 0xffffb204`59027670
fffff406`240f68e0 fffff406`240f695c : 00000000`00000000 fffff406`00000000 00000000`00820001 ffffb204`55303e90 : usbVM303+0x252b4
fffff406`240f68e8 00000000`00000000 : fffff406`00000000 00000000`00820001 ffffb204`55303e90 fffff805`6a004811 : 0xfffff406`240f695c
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff805596ece74-fffff805596ece75 2 bytes - nt!MmBuildMdlForNonPagedPool+344
[ 80 fa:00 ac ]
2 errors : !nt (fffff805596ece74-fffff805596ece75)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffd101fccfeff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd101fccfef48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
TRAP_FRAME: fb3941b17bf7bfc8 -- (.trap 0xfb3941b17bf7bfc8)
Unable to read trap frame at fb3941b1`7bf7bfc8
EXCEPTION_RECORD: 000000000d93e07d -- (.exr 0xd93e07d)
Cannot read Exception record @ 000000000d93e07d
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLaunc
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y
EXCEPTION_PARAMETER1: 0000000000000004
BUGCHECK_STR: 0x139
DEFAULT_BUCKET_ID: CODE_CORRUPTION
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_STR: 0x0
LAST_CONTROL_TRANSFER: from fffff805733d4829 to fffff805733c2990
FAULTING_THREAD: 0000000000000000
STACK_TEXT:
ffffd101`fccfecc8 fffff805`733d4829 : 00000000`00000139 00000000`00000004 ffffd101`fccfeff0 ffffd101`fccfef48 : nt!KeBugCheckEx
ffffd101`fccfecd0 fffff805`733d4c50 : 00000000`00000000 00000000`00000000 ffff8400`d9efeef0 ffff8400`d9efef20 : nt!KiBugCheckDispatch+0x69
ffffd101`fccfee10 fffff805`733d2fe3 : fffff805`7331b508 fffff805`7360d50c ffffd101`fccff7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd101`fccfeff0 fffff805`734496f9 : 00000000`00000000 00000000`0000035e 0005e20c`00ab5000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x323
ffffd101`fccff180 fffff805`73418bb2 : 00000000`00000000 00000000`00000000 ffffd101`fccff6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x13551d
ffffd101`fccff1b0 fffff805`7328d66e : ffffcf8d`9631f088 ffffd101`fccffe30 ffffcf8d`9631f088 00000000`00000000 : nt!RtlDispatchException+0x18fb02
ffffd101`fccff900 fffff805`733c3802 : 00000000`0d93e07d 00000000`0d93f07d fb3941b1`7bf7bfc8 00000000`00000000 : nt!KiDispatchException+0x16e
ffffd101`fccfffb0 fffff805`733c37d0 : fffff805`733d4956 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffcf8d`9631ef48 fffff805`733d4956 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffcf8d`9631ef50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80573257864-fffff80573257865 2 bytes - nt!MiZeroFault+e4
[ 80 f6:00 fb ]
fffff80573257874-fffff80573257875 2 bytes - nt!MiZeroFault+f4 (+0x10)
[ ff f6:7f fb ]
fffff80573258711-fffff80573258716 6 bytes - nt!MmAccessFault+1c1 (+0xe9d)
[ 68 df be 7d fb f6:b0 6f df be 7d fb ]
fffff80573259875-fffff80573259876 2 bytes - nt!MiFastLockLeafPageTable+365 (+0x1164)
[ 80 f6:00 fb ]
fffff8057325993e-fffff80573259943 6 bytes - nt!MiLockPageTableInternal+1e (+0xc9)
[ 68 df be 7d fb f6:b0 6f df be 7d fb ]
fffff80573259952-fffff80573259956 5 bytes - nt!MiLockPageTableInternal+32 (+0x14)
[ d0 be 7d fb f6:60 df be 7d fb ]
fffff8057325995c-fffff8057325995e 3 bytes - nt!MiLockPageTableInternal+3c (+0x0a)
[ df be 7d:6f df be ]
fffff8057331b575 - nt!MiDeleteNonPagedPoolTail+45 (+0xc1c19)
[ fa:e5 ]
fffff80573449767-fffff80573449769 3 bytes - nt!MiZeroLargePage+135563 (+0x12e1f2)
[ 40 fb f6:80 7d fb ]
fffff80573449780-fffff80573449781 2 bytes - nt!MiZeroLargePage+13557c (+0x19)
[ 80 f6:00 fb ]
32 errors : !nt (fffff80573257864-fffff80573449781)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: ~0s ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------