A
Arvin Mo
Guest
hi,
i already tried sfc /scannow
updating drivers and memory test ...
but i steel get this two BSODs Kernel security check failure and Critical process died.
sometimes it happen when i click on shutdown or randomly while im working with pc.
i would be really happy if someones help me <3
Debugs:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd8f670286e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd8f67028638, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 53
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4406
BIOS_DATE: 02/28/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X470-PRO
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: 3
BUGCHECK_P2: fffffd8f670286e0
BUGCHECK_P3: fffffd8f67028638
BUGCHECK_P4: 0
TRAP_FRAME: fffffd8f670286e0 -- (.trap 0xfffffd8f670286e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffab02dc603348 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80147a824da rsp=fffffd8f67028870 rbp=ffffda817b560180
r8=0000000000000001 r9=0000000000000006 r10=0000000000000000
r11=fffffd8f670289e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiExitDispatcher+0x2da:
fffff801`47a824da cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffd8f67028638 -- (.exr 0xfffffd8f67028638)
ExceptionAddress: fffff80147a824da (nt!KiExitDispatcher+0x00000000000002da)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-MN8T37V
ANALYSIS_SESSION_TIME: 05-02-2019 13:26:13.0509
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff80147bd9669 to fffff80147bc7f30
STACK_TEXT:
fffffd8f`670283b8 fffff801`47bd9669 : 00000000`00000139 00000000`00000003 fffffd8f`670286e0 fffffd8f`67028638 : nt!KeBugCheckEx
fffffd8f`670283c0 fffff801`47bd9a10 : fffffd8f`670286f0 fffff801`4840aae6 fffffd8f`00000000 00001f80`00000204 : nt!KiBugCheckDispatch+0x69
fffffd8f`67028500 fffff801`47bd7e08 : 00000000`00000000 ffffab02`dc606080 ffffab02`daeb8b90 fffff800`dfc38e56 : nt!KiFastFailDispatch+0xd0
fffffd8f`670286e0 fffff801`47a824da : ffffab02`daed7760 fffff800`dfc3a13b ffffab02`daeb8b90 ffffab02`daed7760 : nt!KiRaiseSecurityCheckFailure+0x308
fffffd8f`67028870 fffff801`47a81c34 : ffffab02`00000000 00000000`000b0000 ffffab02`dc606001 fffff800`e6904bc0 : nt!KiExitDispatcher+0x2da
fffffd8f`670288e0 fffff801`47a80367 : 00000000`00000000 fffffd8f`67028a06 00000000`00000004 00000000`00000002 : nt!IopfCompleteRequest+0x18b4
fffffd8f`670289f0 fffff800`e6943e8c : 00000000`00000018 fffffd8f`67028a90 ffffab02`daf0bec0 ffffab02`daf0c010 : nt!IofCompleteRequest+0x17
fffffd8f`67028a20 fffff800`e6933964 : ffffab02`e6190680 00000000`00000002 ffffab02`daf3b5f0 ffffab02`daf0bd60 : mouclass!MouseClassServiceCallback+0x3ec
fffffd8f`67028ac0 fffff801`47a8054d : 00000000`00000000 fffffd8f`67028e00 00000000`00000001 ffffab02`00000000 : mouhid!MouHid_ReadComplete+0x744
fffffd8f`67028b60 fffff801`47a80367 : ffffab02`daf0c010 00000000`00000006 ffffab02`daec5210 ffffab02`daf06b60 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67028c70 fffff800`e68a35cc : ffffab02`daf06b60 ffffab02`daf06b02 00000000`00000008 ffffab02`daf06b70 : nt!IofCompleteRequest+0x17
fffffd8f`67028ca0 fffff800`e68a332f : ffffab02`dad5dde0 ffffab02`dad5dd02 ffffab02`dae73710 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x21c
fffffd8f`67028d60 fffff801`47a8054d : ffffab02`daf02993 00000000`00000000 ffffab02`d4602301 00500030`73556f49 : HIDCLASS!HidpInterruptReadComplete+0x2df
fffffd8f`67028e10 fffff801`47a80367 : ffffab02`daf02440 fffffd8f`67028f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67028f20 fffff800`dfc388c8 : 00000000`00000000 ffffab02`da930760 00000000`00000002 fffff800`dfc3b1d0 : nt!IofCompleteRequest+0x17
fffffd8f`67028f50 fffff800`dfc3645c : ffffab02`daee6702 00000000`00000000 ffffab02`daf02440 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x228 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffd8f`67028fe0 fffff800`e6904d5d : fffffd8f`670290b0 ffffab02`da930760 fffffd8f`670290f9 ffffab02`daee1600 : Wdf01000!imp_WdfRequestCompleteWithInformation+0x9c [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 571]
fffffd8f`67029040 fffff800`e6904ec1 : ffffab02`daea5ba0 00000000`00000000 fffffd8f`670290f9 000054fd`256cf898 : sshid+0x4d5d
fffffd8f`67029080 fffff800`e6902412 : 00000000`01000000 fffffd8f`670290f9 ffffab02`daee1601 ffffab02`00500030 : sshid+0x4ec1
fffffd8f`670290b0 fffff800`dfca04b8 : ffffab02`daeee510 00000000`00000009 ffffab02`daef4228 00000000`00000000 : sshid+0x2412
fffffd8f`67029160 fffff800`dfc331a9 : ffffab02`daed7ae0 00000000`00000001 ffffab02`00000000 fffff800`00000000 : Wdf01000!FxUsbPipeContinuousReader::_FxUsbPipeRequestComplete+0x68 [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 302]
fffffd8f`670291e0 fffff800`dfc3ad68 : 000054fd`25128518 ffffab02`daed7ae0 ffffab02`daed7ae0 ffffab02`dadc2da0 : Wdf01000!FxRequestBase::CompleteSubmitted+0xe9 [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 530]
fffffd8f`67029270 fffff801`47b391c6 : ffffab02`daeb8980 ffffab02`da3a4f02 ffffab02`00000000 ffffab02`daee6750 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xe8 [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
fffffd8f`670292e0 fffff801`47a8054d : ffffab02`daee6c13 fffffd8f`670293b9 00000000`00000000 00000000`00000000 : nt!IopUnloadSafeCompletion+0x56
fffffd8f`67029310 fffff801`47a80367 : ffffab02`daee6750 fffff800`e1f43f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67029420 fffff800`dfc388c8 : 00000000`00000000 ffffab02`daeea0d0 00000000`00000002 fffff800`e1f34fab : nt!IofCompleteRequest+0x17
fffffd8f`67029450 fffff800`dfc3839b : fffffd8f`67029802 fffffd8f`67029571 ffffab02`daee6750 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x228 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffd8f`670294e0 fffff800`e1f42ee8 : 00000000`ffffff02 ffffab02`daeea0d0 ffffab02`daeaa9f0 ffffab02`daeaa9f0 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffffd8f`67029540 fffff800`e1f40ed7 : ffffab02`daeea270 00000000`00000001 ffffab02`daeea300 fffffd8f`67029818 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x18c
fffffd8f`670295a0 fffff800`e1f3f770 : ffffab02`00000001 fffffd8f`67029719 fffffd8f`00000000 fffff800`dfd32053 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x41f
fffffd8f`67029660 fffff800`e1f35183 : 00000000`00000088 00000000`00000000 00000000`02000240 fffffd8f`67029790 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffffd8f`67029690 fffff800`e1f288d7 : 00000000`0000002b fffffd8f`67029781 ffffab02`da5a0010 fffff800`e1f12ff4 : USBXHCI!TR_TransferEventHandler+0x17
fffffd8f`670296c0 fffff800`e1f47042 : fffffd8f`67029818 fffffd8f`670297e8 00000000`00000000 fffffd8f`670297f0 : USBXHCI!Endpoint_TransferEventHandler+0x13f
fffffd8f`67029740 fffff800`e1f2b5b0 : ffffab02`dabf6f10 fffffd8f`67029839 ffffab02`dabf6fe0 00000003`5da3597e : USBXHCI!UsbDevice_TransferEventHandler+0x92
fffffd8f`670297a0 fffff800`e1f2bffc : 00000000`00000001 fffffd8f`670298b0 00000000`00010001 ffffab02`dabf6d10 : USBXHCI!Interrupter_DeferredWorkProcessor+0x500
fffffd8f`670298a0 fffff800`dfc3381d : ffffda81`7b560180 fffff800`e1044446 00000000`00000000 ffffab02`da6c7050 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffffd8f`670298d0 fffff801`47a79da7 : ffffffff`ffffffff fffffd8f`67029a10 00000000`0004c4b4 00000000`00000000 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9d [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffffd8f`67029910 fffff801`47a793ee : ffffda81`7b570400 00000000`00016800 00000000`00000001 ffffda81`7b570400 : nt!KiExecuteAllDpcs+0x2e7
fffffd8f`67029a50 fffff801`47bcb94a : ffffffff`00000000 ffffda81`7b560180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ae
fffffd8f`67029c60 00000000`00000000 : fffffd8f`6702a000 fffffd8f`67024000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
THREAD_SHA1_HASH_MOD_FUNC: 65c263cb5b2c7f728a5c2938b903f8dd80d380f8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 47e692461449237103a01ff560d4c3078e5ba421
THREAD_SHA1_HASH_MOD: 0023a171524cf13f97873d89d4b92cac8a6757e1
FOLLOWUP_IP:
mouclass!MouseClassServiceCallback+3ec
fffff800`e6943e8c 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: mouclass!MouseClassServiceCallback+3ec
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3ec
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
TARGET_TIME: 2019-05-02T08:54:18.000Z
OSBUILD: 17763
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1986-10-28 09:10:20
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: cfb5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_mouclass!mouseclassservicecallback
FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}
Followup: MachineOwner
---------------------------------------------------------------------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0f2d4f47b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc0f2d4f4708, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 58
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4406
BIOS_DATE: 02/28/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X470-PRO
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: 3
BUGCHECK_P2: fffffc0f2d4f47b0
BUGCHECK_P3: fffffc0f2d4f4708
BUGCHECK_P4: 0
TRAP_FRAME: fffffc0f2d4f47b0 -- (.trap 0xfffffc0f2d4f47b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffce0af6e021c0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffce0af822e180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805460ab537 rsp=fffffc0f2d4f4940 rbp=ffffe1011e5b9180
r8=0000000000000020 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ExpQueueWorkItem+0x19a857:
fffff805`460ab537 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffc0f2d4f4708 -- (.exr 0xfffffc0f2d4f4708)
ExceptionAddress: fffff805460ab537 (nt!ExpQueueWorkItem+0x000000000019a857)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
BUGCHECK_STR: 0x139
PROCESS_NAME: GTA5.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-MN8T37V
ANALYSIS_SESSION_TIME: 05-02-2019 13:35:24.0139
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff80546076669 to fffff80546064f30
STACK_TEXT:
fffffc0f`2d4f4488 fffff805`46076669 : 00000000`00000139 00000000`00000003 fffffc0f`2d4f47b0 fffffc0f`2d4f4708 : nt!KeBugCheckEx
fffffc0f`2d4f4490 fffff805`46076a10 : ffffce0a`ef20f000 00000000`00000000 fffffc0f`2d4f4a30 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffc0f`2d4f45d0 fffff805`46074e08 : 00000000`00000000 fffff805`45f207d2 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc0f`2d4f47b0 fffff805`460ab537 : 00000000`00000000 00000000`00000000 ffffcaf8`6fd41615 ffffce0a`f7d33080 : nt!KiRaiseSecurityCheckFailure+0x308
fffffc0f`2d4f4940 fffff805`45f0f3fd : ffffce0a`ef063a20 00007ff7`f61083ac fffff805`462d1020 fffff805`00000000 : nt!ExpQueueWorkItem+0x19a857
fffffc0f`2d4f49d0 fffff805`45fda925 : 00000000`00000003 fffff805`462d1080 00000000`00000000 000000db`b0bff9f8 : nt!ExQueueWorkItem+0x3d
fffffc0f`2d4f4a10 fffff805`45fda814 : ffffce0a`f9844e90 fffffc0f`2d4f4b80 00007ff7`f61083ac 00000000`00000094 : nt!PopQueueWorkItem+0x1d
fffffc0f`2d4f4a40 fffff805`46026f7a : fffffc0f`2d4f4b80 00007ff7`f61083ac 00000000`00000003 ffffce0a`f9844e90 : nt!PopResetIdleTime+0x34
fffffc0f`2d4f4a70 fffff805`4647c253 : ffffce0a`f9844e90 00000000`00000003 00007ff7`f61083ac 00000000`00000003 : nt!PopSystemRequiredSet+0xe
fffffc0f`2d4f4aa0 fffff805`46076085 : ffffce0a`f7d33080 00000000`00000000 fffffc0f`80000002 00000000`00000000 : nt!NtSetThreadExecutionState+0x143
fffffc0f`2d4f4b00 00007ffd`7d851a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000db`b0bff9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`7d851a44
THREAD_SHA1_HASH_MOD_FUNC: e22993508a04ff7abdc17ea52f004451584a9955
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7c126352f0be490f7466f63d1c19a5ba11577c26
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`46076a10 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 1fa44fc4
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
TARGET_TIME: 2019-05-02T08:29:44.000Z
OSBUILD: 17763
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1986-10-28 09:10:20
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: d19
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
More...
i already tried sfc /scannow
updating drivers and memory test ...
but i steel get this two BSODs Kernel security check failure and Critical process died.
sometimes it happen when i click on shutdown or randomly while im working with pc.
i would be really happy if someones help me <3
Debugs:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd8f670286e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd8f67028638, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.Elapsed.Sec
Value: 53
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4406
BIOS_DATE: 02/28/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X470-PRO
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: 3
BUGCHECK_P2: fffffd8f670286e0
BUGCHECK_P3: fffffd8f67028638
BUGCHECK_P4: 0
TRAP_FRAME: fffffd8f670286e0 -- (.trap 0xfffffd8f670286e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffab02dc603348 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80147a824da rsp=fffffd8f67028870 rbp=ffffda817b560180
r8=0000000000000001 r9=0000000000000006 r10=0000000000000000
r11=fffffd8f670289e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiExitDispatcher+0x2da:
fffff801`47a824da cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffd8f67028638 -- (.exr 0xfffffd8f67028638)
ExceptionAddress: fffff80147a824da (nt!KiExitDispatcher+0x00000000000002da)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-MN8T37V
ANALYSIS_SESSION_TIME: 05-02-2019 13:26:13.0509
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff80147bd9669 to fffff80147bc7f30
STACK_TEXT:
fffffd8f`670283b8 fffff801`47bd9669 : 00000000`00000139 00000000`00000003 fffffd8f`670286e0 fffffd8f`67028638 : nt!KeBugCheckEx
fffffd8f`670283c0 fffff801`47bd9a10 : fffffd8f`670286f0 fffff801`4840aae6 fffffd8f`00000000 00001f80`00000204 : nt!KiBugCheckDispatch+0x69
fffffd8f`67028500 fffff801`47bd7e08 : 00000000`00000000 ffffab02`dc606080 ffffab02`daeb8b90 fffff800`dfc38e56 : nt!KiFastFailDispatch+0xd0
fffffd8f`670286e0 fffff801`47a824da : ffffab02`daed7760 fffff800`dfc3a13b ffffab02`daeb8b90 ffffab02`daed7760 : nt!KiRaiseSecurityCheckFailure+0x308
fffffd8f`67028870 fffff801`47a81c34 : ffffab02`00000000 00000000`000b0000 ffffab02`dc606001 fffff800`e6904bc0 : nt!KiExitDispatcher+0x2da
fffffd8f`670288e0 fffff801`47a80367 : 00000000`00000000 fffffd8f`67028a06 00000000`00000004 00000000`00000002 : nt!IopfCompleteRequest+0x18b4
fffffd8f`670289f0 fffff800`e6943e8c : 00000000`00000018 fffffd8f`67028a90 ffffab02`daf0bec0 ffffab02`daf0c010 : nt!IofCompleteRequest+0x17
fffffd8f`67028a20 fffff800`e6933964 : ffffab02`e6190680 00000000`00000002 ffffab02`daf3b5f0 ffffab02`daf0bd60 : mouclass!MouseClassServiceCallback+0x3ec
fffffd8f`67028ac0 fffff801`47a8054d : 00000000`00000000 fffffd8f`67028e00 00000000`00000001 ffffab02`00000000 : mouhid!MouHid_ReadComplete+0x744
fffffd8f`67028b60 fffff801`47a80367 : ffffab02`daf0c010 00000000`00000006 ffffab02`daec5210 ffffab02`daf06b60 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67028c70 fffff800`e68a35cc : ffffab02`daf06b60 ffffab02`daf06b02 00000000`00000008 ffffab02`daf06b70 : nt!IofCompleteRequest+0x17
fffffd8f`67028ca0 fffff800`e68a332f : ffffab02`dad5dde0 ffffab02`dad5dd02 ffffab02`dae73710 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x21c
fffffd8f`67028d60 fffff801`47a8054d : ffffab02`daf02993 00000000`00000000 ffffab02`d4602301 00500030`73556f49 : HIDCLASS!HidpInterruptReadComplete+0x2df
fffffd8f`67028e10 fffff801`47a80367 : ffffab02`daf02440 fffffd8f`67028f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67028f20 fffff800`dfc388c8 : 00000000`00000000 ffffab02`da930760 00000000`00000002 fffff800`dfc3b1d0 : nt!IofCompleteRequest+0x17
fffffd8f`67028f50 fffff800`dfc3645c : ffffab02`daee6702 00000000`00000000 ffffab02`daf02440 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x228 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffd8f`67028fe0 fffff800`e6904d5d : fffffd8f`670290b0 ffffab02`da930760 fffffd8f`670290f9 ffffab02`daee1600 : Wdf01000!imp_WdfRequestCompleteWithInformation+0x9c [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 571]
fffffd8f`67029040 fffff800`e6904ec1 : ffffab02`daea5ba0 00000000`00000000 fffffd8f`670290f9 000054fd`256cf898 : sshid+0x4d5d
fffffd8f`67029080 fffff800`e6902412 : 00000000`01000000 fffffd8f`670290f9 ffffab02`daee1601 ffffab02`00500030 : sshid+0x4ec1
fffffd8f`670290b0 fffff800`dfca04b8 : ffffab02`daeee510 00000000`00000009 ffffab02`daef4228 00000000`00000000 : sshid+0x2412
fffffd8f`67029160 fffff800`dfc331a9 : ffffab02`daed7ae0 00000000`00000001 ffffab02`00000000 fffff800`00000000 : Wdf01000!FxUsbPipeContinuousReader::_FxUsbPipeRequestComplete+0x68 [minkernel\wdf\framework\shared\targets\usb\fxusbpipe.cpp @ 302]
fffffd8f`670291e0 fffff800`dfc3ad68 : 000054fd`25128518 ffffab02`daed7ae0 ffffab02`daed7ae0 ffffab02`dadc2da0 : Wdf01000!FxRequestBase::CompleteSubmitted+0xe9 [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 530]
fffffd8f`67029270 fffff801`47b391c6 : ffffab02`daeb8980 ffffab02`da3a4f02 ffffab02`00000000 ffffab02`daee6750 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xe8 [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
fffffd8f`670292e0 fffff801`47a8054d : ffffab02`daee6c13 fffffd8f`670293b9 00000000`00000000 00000000`00000000 : nt!IopUnloadSafeCompletion+0x56
fffffd8f`67029310 fffff801`47a80367 : ffffab02`daee6750 fffff800`e1f43f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x1cd
fffffd8f`67029420 fffff800`dfc388c8 : 00000000`00000000 ffffab02`daeea0d0 00000000`00000002 fffff800`e1f34fab : nt!IofCompleteRequest+0x17
fffffd8f`67029450 fffff800`dfc3839b : fffffd8f`67029802 fffffd8f`67029571 ffffab02`daee6750 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x228 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffffd8f`670294e0 fffff800`e1f42ee8 : 00000000`ffffff02 ffffab02`daeea0d0 ffffab02`daeaa9f0 ffffab02`daeaa9f0 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffffd8f`67029540 fffff800`e1f40ed7 : ffffab02`daeea270 00000000`00000001 ffffab02`daeea300 fffffd8f`67029818 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x18c
fffffd8f`670295a0 fffff800`e1f3f770 : ffffab02`00000001 fffffd8f`67029719 fffffd8f`00000000 fffff800`dfd32053 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x41f
fffffd8f`67029660 fffff800`e1f35183 : 00000000`00000088 00000000`00000000 00000000`02000240 fffffd8f`67029790 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffffd8f`67029690 fffff800`e1f288d7 : 00000000`0000002b fffffd8f`67029781 ffffab02`da5a0010 fffff800`e1f12ff4 : USBXHCI!TR_TransferEventHandler+0x17
fffffd8f`670296c0 fffff800`e1f47042 : fffffd8f`67029818 fffffd8f`670297e8 00000000`00000000 fffffd8f`670297f0 : USBXHCI!Endpoint_TransferEventHandler+0x13f
fffffd8f`67029740 fffff800`e1f2b5b0 : ffffab02`dabf6f10 fffffd8f`67029839 ffffab02`dabf6fe0 00000003`5da3597e : USBXHCI!UsbDevice_TransferEventHandler+0x92
fffffd8f`670297a0 fffff800`e1f2bffc : 00000000`00000001 fffffd8f`670298b0 00000000`00010001 ffffab02`dabf6d10 : USBXHCI!Interrupter_DeferredWorkProcessor+0x500
fffffd8f`670298a0 fffff800`dfc3381d : ffffda81`7b560180 fffff800`e1044446 00000000`00000000 ffffab02`da6c7050 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffffd8f`670298d0 fffff801`47a79da7 : ffffffff`ffffffff fffffd8f`67029a10 00000000`0004c4b4 00000000`00000000 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9d [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffffd8f`67029910 fffff801`47a793ee : ffffda81`7b570400 00000000`00016800 00000000`00000001 ffffda81`7b570400 : nt!KiExecuteAllDpcs+0x2e7
fffffd8f`67029a50 fffff801`47bcb94a : ffffffff`00000000 ffffda81`7b560180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ae
fffffd8f`67029c60 00000000`00000000 : fffffd8f`6702a000 fffffd8f`67024000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
THREAD_SHA1_HASH_MOD_FUNC: 65c263cb5b2c7f728a5c2938b903f8dd80d380f8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 47e692461449237103a01ff560d4c3078e5ba421
THREAD_SHA1_HASH_MOD: 0023a171524cf13f97873d89d4b92cac8a6757e1
FOLLOWUP_IP:
mouclass!MouseClassServiceCallback+3ec
fffff800`e6943e8c 0f1f440000 nop dword ptr [rax+rax]
FAULT_INSTR_CODE: 441f0f
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: mouclass!MouseClassServiceCallback+3ec
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 3ec
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback
TARGET_TIME: 2019-05-02T08:54:18.000Z
OSBUILD: 17763
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1986-10-28 09:10:20
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: cfb5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_mouclass!mouseclassservicecallback
FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}
Followup: MachineOwner
---------------------------------------------------------------------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc0f2d4f47b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffc0f2d4f4708, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 58
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 4406
BIOS_DATE: 02/28/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X470-PRO
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: 3
BUGCHECK_P2: fffffc0f2d4f47b0
BUGCHECK_P3: fffffc0f2d4f4708
BUGCHECK_P4: 0
TRAP_FRAME: fffffc0f2d4f47b0 -- (.trap 0xfffffc0f2d4f47b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffce0af6e021c0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffce0af822e180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805460ab537 rsp=fffffc0f2d4f4940 rbp=ffffe1011e5b9180
r8=0000000000000020 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ExpQueueWorkItem+0x19a857:
fffff805`460ab537 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffc0f2d4f4708 -- (.exr 0xfffffc0f2d4f4708)
ExceptionAddress: fffff805460ab537 (nt!ExpQueueWorkItem+0x000000000019a857)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
BUGCHECK_STR: 0x139
PROCESS_NAME: GTA5.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-MN8T37V
ANALYSIS_SESSION_TIME: 05-02-2019 13:35:24.0139
ANALYSIS_VERSION: 10.0.18869.1002 amd64fre
LAST_CONTROL_TRANSFER: from fffff80546076669 to fffff80546064f30
STACK_TEXT:
fffffc0f`2d4f4488 fffff805`46076669 : 00000000`00000139 00000000`00000003 fffffc0f`2d4f47b0 fffffc0f`2d4f4708 : nt!KeBugCheckEx
fffffc0f`2d4f4490 fffff805`46076a10 : ffffce0a`ef20f000 00000000`00000000 fffffc0f`2d4f4a30 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffc0f`2d4f45d0 fffff805`46074e08 : 00000000`00000000 fffff805`45f207d2 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffc0f`2d4f47b0 fffff805`460ab537 : 00000000`00000000 00000000`00000000 ffffcaf8`6fd41615 ffffce0a`f7d33080 : nt!KiRaiseSecurityCheckFailure+0x308
fffffc0f`2d4f4940 fffff805`45f0f3fd : ffffce0a`ef063a20 00007ff7`f61083ac fffff805`462d1020 fffff805`00000000 : nt!ExpQueueWorkItem+0x19a857
fffffc0f`2d4f49d0 fffff805`45fda925 : 00000000`00000003 fffff805`462d1080 00000000`00000000 000000db`b0bff9f8 : nt!ExQueueWorkItem+0x3d
fffffc0f`2d4f4a10 fffff805`45fda814 : ffffce0a`f9844e90 fffffc0f`2d4f4b80 00007ff7`f61083ac 00000000`00000094 : nt!PopQueueWorkItem+0x1d
fffffc0f`2d4f4a40 fffff805`46026f7a : fffffc0f`2d4f4b80 00007ff7`f61083ac 00000000`00000003 ffffce0a`f9844e90 : nt!PopResetIdleTime+0x34
fffffc0f`2d4f4a70 fffff805`4647c253 : ffffce0a`f9844e90 00000000`00000003 00007ff7`f61083ac 00000000`00000003 : nt!PopSystemRequiredSet+0xe
fffffc0f`2d4f4aa0 fffff805`46076085 : ffffce0a`f7d33080 00000000`00000000 fffffc0f`80000002 00000000`00000000 : nt!NtSetThreadExecutionState+0x143
fffffc0f`2d4f4b00 00007ffd`7d851a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000db`b0bff9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`7d851a44
THREAD_SHA1_HASH_MOD_FUNC: e22993508a04ff7abdc17ea52f004451584a9955
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 7c126352f0be490f7466f63d1c19a5ba11577c26
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff805`46076a10 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 1fa44fc4
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
TARGET_TIME: 2019-05-02T08:29:44.000Z
OSBUILD: 17763
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1986-10-28 09:10:20
BUILDDATESTAMP_STR: 180914-1434
BUILDLAB_STR: rs5_release
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME: d19
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
More...