Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: ffffe3847095f280, Address of the trap frame for the exception that caused the BugCheck
- Arg3: ffffe3847095f1d8, Address of the exception record for the exception that caused the BugCheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 3296
- Key : Analysis.Elapsed.mSec
- Value: 14439
- Key : Analysis.IO.Other.Mb
- Value: 1
- Key : Analysis.IO.Read.Mb
- Value: 0
- Key : Analysis.IO.Write.Mb
- Value: 2
- Key : Analysis.Init.CPU.mSec
- Value: 546
- Key : Analysis.Init.Elapsed.mSec
- Value: 5403
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 93
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x139
- Key : FailFast.Name
- Value: CORRUPT_LIST_ENTRY
- Key : FailFast.Type
- Value: 3
- Key : Failure.Bucket
- Value: 0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function
- Key : Failure.Hash
- Value: {59d8eb10-b2e4-7df6-f6a5-49968226dbb8}
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Version
- Value: 10.0.19041.1
- BUGCHECK_CODE: 139
- BUGCHECK_P1: 3
- BUGCHECK_P2: ffffe3847095f280
- BUGCHECK_P3: ffffe3847095f1d8
- BUGCHECK_P4: 0
- FILE_IN_CAB: 061023-27984-01.dmp
- TRAP_FRAME: ffffe3847095f280 -- (.trap 0xffffe3847095f280)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff805a96fbc08 rbx=0000000000000000 rcx=0000000000000003
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8058261994d rsp=ffffe3847095f410 rbp=ffff8b030c824080
- r8=0000000000000001 r9=0000000000000002 r10=0000000000000001
- r11=fffff8057ff81180 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na pe cy
- nt!KiExitDispatcher+0x1ad:
- fffff805`8261994d cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffffe3847095f1d8 -- (.exr 0xffffe3847095f1d8)
- ExceptionAddress: fffff8058261994d (nt!KiExitDispatcher+0x00000000000001ad)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- EXCEPTION_STR: 0xc0000409
- STACK_TEXT:
- ffffe384`7095ef58 fffff805`8280fd29 : 00000000`00000139 00000000`00000003 ffffe384`7095f280 ffffe384`7095f1d8 : nt!KeBugCheckEx
- ffffe384`7095ef60 fffff805`82810290 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffe384`7095f0a0 fffff805`8280e25d : 00000000`0000000f 00000000`00000000 00000000`00000000 55555555`55555555 : nt!KiFastFailDispatch+0xd0
- ffffe384`7095f280 fffff805`8261994d : 00000000`00000000 ffffe384`7095f4c1 ffff8b03`180f7000 fffff805`00000000 : nt!KiRaiseSecurityCheckFailure+0x31d
- ffffe384`7095f410 fffff805`826ebd01 : fffff805`7ff81180 00000000`00000000 fffff805`7ff81101 fffff805`82db7074 : nt!KiExitDispatcher+0x1ad
- ffffe384`7095f480 fffff808`c8b387b1 : 00000000`00000100 ffff8b03`1b3e0068 ffffd104`3f562a70 00000000`00000002 : nt!KeInsertQueueApc+0x151
- ffffe384`7095f520 00000000`00000100 : ffff8b03`1b3e0068 ffffd104`3f562a70 00000000`00000002 00000000`00000000 : BEDaisy+0x3287b1
- ffffe384`7095f528 ffff8b03`1b3e0068 : ffffd104`3f562a70 00000000`00000002 00000000`00000000 00000000`00000000 : 0x100
- ffffe384`7095f530 ffffd104`3f562a70 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8b03`1b3e0068
- ffffe384`7095f538 00000000`00000002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffd104`3f562a70
- ffffe384`7095f540 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00003601 : 0x2
- SYMBOL_NAME: BEDaisy+3287b1
- MODULE_NAME: BEDaisy
- IMAGE_NAME: BEDaisy.sys
- STACK_COMMAND: .cxr; .ecxr ; kb
- BUCKET_ID_FUNC_OFFSET: 3287b1
- FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {59d8eb10-b2e4-7df6-f6a5-49968226dbb8}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement