Kernel security check failure and Critical process died BSOD Win 10

  • Thread starter Thread starter Arvin Mo
  • Start date Start date
A

Arvin Mo

Guest
hi,

i already tried sfc /scannow

updating drivers and memory test ...

but i steel get this two BSODs Kernel security check failure and Critical process died.

sometimes it happen when i click on shutdown or randomly while im working with pc.

i would be really happy if someones help me <3

Debugs:

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd8f670286e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd8f67028638, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 1

Key : Analysis.Elapsed.Sec
Value: 53

Key : Analysis.Memory.CommitPeak.Mb
Value: 72


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 4406

BIOS_DATE: 02/28/2019

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: PRIME X470-PRO

BASEBOARD_VERSION: Rev X.0x

DUMP_TYPE: 1

BUGCHECK_P1: 3

BUGCHECK_P2: fffffd8f670286e0

BUGCHECK_P3: fffffd8f67028638

BUGCHECK_P4: 0

TRAP_FRAME: fffffd8f670286e0 --
(.trap 0xfffffd8f670286e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffab02dc603348 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80147a824da rsp=fffffd8f67028870 rbp=ffffda817b560180
r8=0000000000000001 r9=0000000000000006 r10=0000000000000000
r11=fffffd8f670289e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiExitDispatcher+0x2da:
fffff801`47a824da cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffffd8f67028638 --
(.exr 0xfffffd8f67028638)
ExceptionAddress: fffff80147a824da (nt!KiExitDispatcher+0x00000000000002da)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXPNP: 1 (
!blackboxpnp)


BUGCHECK_STR: 0x139

PROCESS_NAME: System

CURRENT_IRQL: 2

DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

ANALYSIS_SESSION_HOST: DESKTOP-MN8T37V

ANALYSIS_SESSION_TIME: 05-02-2019 13:26:13.0509

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff80147bd9669 to fffff80147bc7f30

STACK_TEXT:
fffffd8f`670283b8 fffff801`47bd9669 : 00000000`00000139 00000000`00000003 fffffd8f`670286e0 fffffd8f`67028638 : nt!KeBugCheckEx
fffffd8f`670283c0 fffff801`47bd9a10 : fffffd8f`670286f0 fffff801`4840aae6 fffffd8f`00000000 00001f80`00000204 : nt!KiBugCheckDispatch+0x69
fffffd8f`67028500 fffff801`47bd7e08 : 00000000`00000000 ffffab02`dc606080 ffffab02`daeb8b90 fffff800`dfc38e56 : nt!KiFastFailDispatch+0xd0
fffffd8f`670286e0 fffff801`47a824da : ffffab02`daed7760 fffff800`dfc3a13b ffffab02`daeb8b90 ffffab02`daed7760 : nt!KiRaiseSecurityCheckFailure+0x308
fffffd8f`67028870 fffff801`47a81c34 : ffffab02`00000000 00000000`000b0000 ffffab02`dc606001 fffff800`e6904bc0 : nt!KiExitDispatcher+0x2da
fffffd8f`670288e0 fffff801`47a80367 : 00000000`00000000 fffffd8f`67028a06 00000000`00000004 00000000`00000002 : nt!IopfCompleteRequest+0x18b4
fffffd8f`670289f0 fffff800`e6943e8c : 00000000`00000018 fffffd8f`67028a90 ffffab02`daf0bec0 ffffab02`daf0c010 : nt!IofCompleteRequest+0x17
fffffd8f`67028a20 fffff800`e6933964 : ffffab02`e6190680 00000000`00000002 ffffab02`daf3b5f0 ffffab02`daf0bd60 : mouclass!MouseClassServiceCallback+0x3ec
fffffd8f`67028ac0 fffff801`47a8054d : 00000000`00000000 fffffd8f`67028e00 00000000`00000001 ffffab02`00000000 : mouhid!MouHid_ReadComplete+0x744
fffffd8f`67028b60 fffff801`47a80367 : ffffab02`daf0c010 00000000`00000006 ffffab02`daec5210 ffffab02`daf06b60 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67028c70 fffff800`e68a35cc : ffffab02`daf06b60 ffffab02`daf06b02 00000000`00000008 ffffab02`daf06b70 : nt!IofCompleteRequest+0x17
fffffd8f`67028ca0 fffff800`e68a332f : ffffab02`dad5dde0 ffffab02`dad5dd02 ffffab02`dae73710 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x21c
fffffd8f`67028d60 fffff801`47a8054d : ffffab02`daf02993 00000000`00000000 ffffab02`d4602301 00500030`73556f49 : HIDCLASS!HidpInterruptReadComplete+0x2df
fffffd8f`67028e10 fffff801`47a80367 : ffffab02`daf02440 fffffd8f`67028f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67028f20 fffff800`dfc388c8 : 00000000`00000000 ffffab02`da930760 00000000`00000002 fffff800`dfc3b1d0 : nt!IofCompleteRequest+0x17
fffffd8f`67028f50 fffff800`dfc3645c : ffffab02`daee6702 00000000`00000000 ffffab02`daf02440 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x228 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffd8f`67028fe0 fffff800`e6904d5d : fffffd8f`670290b0 ffffab02`da930760 fffffd8f`670290f9 ffffab02`daee1600 : Wdf01000!imp_WdfRequestCompleteWithInformation+0x9c [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 571]
fffffd8f`67029040 fffff800`e6904ec1 : ffffab02`daea5ba0 00000000`00000000 fffffd8f`670290f9 000054fd`256cf898 : sshid+0x4d5d
fffffd8f`67029080 fffff800`e6902412 : 00000000`01000000 fffffd8f`670290f9 ffffab02`daee1601 ffffab02`00500030 : sshid+0x4ec1
fffffd8f`670290b0 fffff800`dfca04b8 : ffffab02`daeee510 00000000`00000009 ffffab02`daef4228 00000000`00000000 : sshid+0x2412
fffffd8f`67029160 fffff800`dfc331a9 : ffffab02`daed7ae0 00000000`00000001 ffffab02`00000000 fffff800`00000000 : Wdf01000!FxUsbPipeContinuousReader::_FxUsbPipeRequestComplete+0x68 [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 302]
fffffd8f`670291e0 fffff800`dfc3ad68 : 000054fd`25128518 ffffab02`daed7ae0 ffffab02`daed7ae0 ffffab02`dadc2da0 : Wdf01000!FxRequestBase::CompleteSubmitted+0xe9 [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 530]
fffffd8f`67029270 fffff801`47b391c6 : ffffab02`daeb8980 ffffab02`da3a4f02 ffffab02`00000000 ffffab02`daee6750 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xe8 [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
fffffd8f`670292e0 fffff801`47a8054d : ffffab02`daee6c13 fffffd8f`670293b9 00000000`00000000 00000000`00000000 : nt!IopUnloadSafeCompletion+0x56
fffffd8f`67029310 fffff801`47a80367 : ffffab02`daee6750 fffff800`e1f43f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67029420 fffff800`dfc388c8 : 00000000`00000000 ffffab02`daeea0d0 00000000`00000002 fffff800`e1f34fab : nt!IofCompleteRequest+0x17
fffffd8f`67029450 fffff800`dfc3839b : fffffd8f`67029802 fffffd8f`67029571 ffffab02`daee6750 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x228 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffd8f`670294e0 fffff800`e1f42ee8 : 00000000`ffffff02 ffffab02`daeea0d0 ffffab02`daeaa9f0 ffffab02`daeaa9f0 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffffd8f`67029540 fffff800`e1f40ed7 : ffffab02`daeea270 00000000`00000001 ffffab02`daeea300 fffffd8f`67029818 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x18c
fffffd8f`670295a0 fffff800`e1f3f770 : ffffab02`00000001 fffffd8f`67029719 fffffd8f`00000000 fffff800`dfd32053 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x41f
fffffd8f`67029660 fffff800`e1f35183 : 00000000`00000088 00000000`00000000 00000000`02000240 fffffd8f`67029790 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffffd8f`67029690 fffff800`e1f288d7 : 00000000`0000002b fffffd8f`67029781 ffffab02`da5a0010 fffff800`e1f12ff4 : USBXHCI!TR_TransferEventHandler+0x17
fffffd8f`670296c0 fffff800`e1f47042 : fffffd8f`67029818 fffffd8f`670297e8 00000000`00000000 fffffd8f`670297f0 : USBXHCI!Endpoint_TransferEventHandler+0x13f
fffffd8f`67029740 fffff800`e1f2b5b0 : ffffab02`dabf6f10 fffffd8f`67029839 ffffab02`dabf6fe0 00000003`5da3597e : USBXHCI!UsbDevice_TransferEventHandler+0x92
fffffd8f`670297a0 fffff800`e1f2bffc : 00000000`00000001 fffffd8f`670298b0 00000000`00010001 ffffab02`dabf6d10 : USBXHCI!Interrupter_DeferredWorkProcessor+0x500
fffffd8f`670298a0 fffff800`dfc3381d : ffffda81`7b560180 fffff800`e1044446 00000000`00000000 ffffab02`da6c7050 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffffd8f`670298d0 fffff801`47a79da7 : ffffffff`ffffffff fffffd8f`67029a10 00000000`0004c4b4 00000000`00000000 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9d [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffffd8f`67029910 fffff801`47a793ee : ffffda81`7b570400 00000000`00016800 00000000`00000001 ffffda81`7b570400 : nt!KiExecuteAllDpcs+0x2e7
fffffd8f`67029a50 fffff801`47bcb94a : ffffffff`00000000 ffffda81`7b560180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ae
fffffd8f`67029c60 00000000`00000000 : fffffd8f`6702a000 fffffd8f`67024000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC: 65c263cb5b2c7f728a5c2938b903f8dd80d380f8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 47e692461449237103a01ff560d4c3078e5ba421

THREAD_SHA1_HASH_MOD: 0023a171524cf13f97873d89d4b92cac8a6757e1

FOLLOWUP_IP:
mouclass!MouseClassServiceCallback+3ec
fffff800`e6943e8c 0f1f440000 nop dword ptr [rax+rax]

FAULT_INSTR_CODE: 441f0f

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: mouclass!MouseClassServiceCallback+3ec

FOLLOWUP_NAME: MachineOwner

MODULE_NAME:
mouclass

IMAGE_NAME: mouclass.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 3ec

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback

BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback

PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback

TARGET_TIME: 2019-05-02T08:54:18.000Z

OSBUILD: 17763

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 1986-10-28 09:10:20

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: cfb5

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_mouclass!mouseclassservicecallback

FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}

Followup: MachineOwner
---------------------------------------------------------------------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0f2d4f47b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc0f2d4f4708, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 58


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER: System manufacturer

SYSTEM_PRODUCT_NAME: System Product Name

SYSTEM_SKU: SKU

SYSTEM_VERSION: System Version

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 4406

BIOS_DATE: 02/28/2019

BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT: PRIME X470-PRO

BASEBOARD_VERSION: Rev X.0x

DUMP_TYPE: 1

BUGCHECK_P1: 3

BUGCHECK_P2: fffffc0f2d4f47b0

BUGCHECK_P3: fffffc0f2d4f4708

BUGCHECK_P4: 0

TRAP_FRAME: fffffc0f2d4f47b0 --
(.trap 0xfffffc0f2d4f47b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffce0af6e021c0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffce0af822e180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805460ab537 rsp=fffffc0f2d4f4940 rbp=ffffe1011e5b9180
r8=0000000000000020 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ExpQueueWorkItem+0x19a857:
fffff805`460ab537 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffffc0f2d4f4708 --
(.exr 0xfffffc0f2d4f4708)
ExceptionAddress: fffff805460ab537 (nt!ExpQueueWorkItem+0x000000000019a857)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXPNP: 1 (
!blackboxpnp)


BUGCHECK_STR: 0x139

PROCESS_NAME: GTA5.exe

CURRENT_IRQL: 2

DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

ANALYSIS_SESSION_HOST: DESKTOP-MN8T37V

ANALYSIS_SESSION_TIME: 05-02-2019 13:35:24.0139

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff80546076669 to fffff80546064f30

STACK_TEXT:
fffffc0f`2d4f4488 fffff805`46076669 : 00000000`00000139 00000000`00000003 fffffc0f`2d4f47b0 fffffc0f`2d4f4708 : nt!KeBugCheckEx
fffffc0f`2d4f4490 fffff805`46076a10 : ffffce0a`ef20f000 00000000`00000000 fffffc0f`2d4f4a30 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffc0f`2d4f45d0 fffff805`46074e08 : 00000000`00000000 fffff805`45f207d2 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc0f`2d4f47b0 fffff805`460ab537 : 00000000`00000000 00000000`00000000 ffffcaf8`6fd41615 ffffce0a`f7d33080 : nt!KiRaiseSecurityCheckFailure+0x308
fffffc0f`2d4f4940 fffff805`45f0f3fd : ffffce0a`ef063a20 00007ff7`f61083ac fffff805`462d1020 fffff805`00000000 : nt!ExpQueueWorkItem+0x19a857
fffffc0f`2d4f49d0 fffff805`45fda925 : 00000000`00000003 fffff805`462d1080 00000000`00000000 000000db`b0bff9f8 : nt!ExQueueWorkItem+0x3d
fffffc0f`2d4f4a10 fffff805`45fda814 : ffffce0a`f9844e90 fffffc0f`2d4f4b80 00007ff7`f61083ac 00000000`00000094 : nt!PopQueueWorkItem+0x1d
fffffc0f`2d4f4a40 fffff805`46026f7a : fffffc0f`2d4f4b80 00007ff7`f61083ac 00000000`00000003 ffffce0a`f9844e90 : nt!PopResetIdleTime+0x34
fffffc0f`2d4f4a70 fffff805`4647c253 : ffffce0a`f9844e90 00000000`00000003 00007ff7`f61083ac 00000000`00000003 : nt!PopSystemRequiredSet+0xe
fffffc0f`2d4f4aa0 fffff805`46076085 : ffffce0a`f7d33080 00000000`00000000 fffffc0f`80000002 00000000`00000000 : nt!NtSetThreadExecutionState+0x143
fffffc0f`2d4f4b00 00007ffd`7d851a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000db`b0bff9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`7d851a44


THREAD_SHA1_HASH_MOD_FUNC: e22993508a04ff7abdc17ea52f004451584a9955

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7c126352f0be490f7466f63d1c19a5ba11577c26

THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`46076a10 c644242000 mov byte ptr [rsp+20h],0

FAULT_INSTR_CODE: 202444c6

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!KiFastFailDispatch+d0

FOLLOWUP_NAME: MachineOwner

MODULE_NAME:
nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 1fa44fc4

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME: 2019-05-02T08:29:44.000Z

OSBUILD: 17763

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 1986-10-28 09:10:20

BUILDDATESTAMP_STR: 180914-1434

BUILDLAB_STR: rs5_release

BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME: d19

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup: MachineOwner
---------


More...
 
Back
Top