KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 000000000000000a, Indirect call guard check detected invalid control transfer. Arg2: 0000000000000000, Address of the trap frame for the exception that caused the BugCheck Arg3: 0000000000000000, Address of the exception record for the exception that caused the BugCheck Arg4: 0000000000000028, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2968 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 20256 Key : Analysis.IO.Other.Mb Value: 12 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 27 Key : Analysis.Init.CPU.mSec Value: 1139 Key : Analysis.Init.Elapsed.mSec Value: 43450 Key : Analysis.Memory.CommitPeak.Mb Value: 90 Key : Bugcheck.Code.DumpHeader Value: 0x139 Key : Bugcheck.Code.Register Value: 0x139 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: 111422-24312-01 - ¸±±¾.dmp BUGCHECK_CODE: 139 BUGCHECK_P1: a BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 28 TRAP_FRAME: 0000000000000000 -- (.trap 0x0) EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0) Cannot read Exception record @ 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffffca02`b9a84668 fffff803`5aa25cbe : 00000000`00000139 00000000`0000000a 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx ffffca02`b9a84670 fffff803`5aca3ac3 : ffffca02`b9a84878 ffffaa03`5a6f7610 00000000`00000000 ffffc8a1`03e495b6 : nt!guard_icall_bugcheck 0x1e ffffca02`b9a846a0 fffff803`5ac866b7 : 00000000`0000000e ffffca02`b9a84878 00000000`00000000 ffffaa03`4a6cd101 : nt!CmpCallCallBacksEx 0x1b3 ffffca02`b9a847b0 fffff803`5ac98220 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000000d0 : nt!CmpDeleteKeyObject 0xb7 ffffca02`b9a848f0 fffff803`5a842ca7 : 00000000`00000000 00000000`00000000 ffffca02`b9a84a49 ffffaa03`4a6cd1e0 : nt!ObpRemoveObjectRoutine 0x80 ffffca02`b9a84950 fffff803`5ac95d6d : 00000000`00000001 ffffaa03`4a6cd1b0 ffffaa03`4a6cd1b0 ffffca02`b9a849a0 : nt!ObfDereferenceObjectWithTag 0xc7 ffffca02`b9a84990 fffff803`5ac94539 : 00000000`00000000 00000000`00000000 00000000`000006f4 00000000`00000000 : nt!ObpCloseHandle 0x2dd ffffca02`b9a84ab0 fffff803`5aa2f988 : ffff8483`3db8f080 00000000`00080031 ffffaa03`5a322120 00000000`00003792 : nt!NtClose 0x39 ffffca02`b9a84ae0 00007ffd`7fe63d64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x28 000000bc`ee4ff1c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`7fe63d64 SYMBOL_NAME: nt!guard_icall_bugcheck 1e MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22000.1219 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 1e FAILURE_BUCKET_ID: 0x139_a_GUARD_ICALL_CHECK_FAILURE_nt!guard_icall_bugcheck OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {391a5384-38fb-03d6-baa8-4a74bc53c199} Followup: MachineOwner ---------
Hiandthanksforreachingout.MynameisBernardaWindowsfanlikeyou.I'llbehappytohelpyououttoday.Iunderstandtheissueyouhave,nothingtoworryIamheretohelp,andjusttoconfirmcanyoustillusetheaffecteddevice?ifso,weneedtoanalyzetheerror,canyoupleasecheckifyouhaveminidumpfilesonthePCsothatwecanfurtherexaminewhatistherootcauseoftheissue?PressWindowskey E(Toopenfileexplorer)Click"ThisPC">thenfollowthefilepath:C:\Windows\MinidumpCopytheMinidumpfilesandsavethemtoanotherlocationlikeDesktoporDocuments.ThenpleaseuploadittoCloudstorageandpleasesharetheshareablelinkhere.LetmeknowhowitgoesandIhopethathelps.BernardIndependentAdvisor此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。