Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 0: kd> !analyze -v
- Loading Kernel Symbols
- ..
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- .............................................................
- ................................................................
- ................................................................
- ....
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 0000009e`b1bc1018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KERNEL_SECURITY_CHECK_FAILURE (139)
- A kernel component has corrupted a critical data structure. The corruption
- could potentially allow a malicious user to gain control of this machine.
- Arguments:
- Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
- Arg2: ffffe08cb40af010, Address of the trap frame for the exception that caused the BugCheck
- Arg3: ffffe08cb40aef68, Address of the exception record for the exception that caused the BugCheck
- Arg4: 0000000000000000, Reserved
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 1031
- Key : Analysis.Elapsed.mSec
- Value: 1894
- Key : Analysis.IO.Other.Mb
- Value: 0
- Key : Analysis.IO.Read.Mb
- Value: 1
- Key : Analysis.IO.Write.Mb
- Value: 23
- Key : Analysis.Init.CPU.mSec
- Value: 828
- Key : Analysis.Init.Elapsed.mSec
- Value: 45970
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 108
- Key : Analysis.Version.DbgEng
- Value: 10.0.27871.1001
- Key : Analysis.Version.Description
- Value: 10.2505.01.02 amd64fre
- Key : Analysis.Version.Ext
- Value: 1.2505.1.2
- Key : Bugcheck.Code.LegacyAPI
- Value: 0x139
- Key : Bugcheck.Code.TargetModel
- Value: 0x139
- Key : Dump.Attributes.AsUlong
- Value: 0x21808
- Key : Dump.Attributes.DiagDataWrittenToHeader
- Value: 1
- Key : Dump.Attributes.ErrorCode
- Value: 0x0
- Key : Dump.Attributes.KernelGeneratedTriageDump
- Value: 1
- Key : Dump.Attributes.LastLine
- Value: Dump completed successfully.
- Key : Dump.Attributes.ProgressPercentage
- Value: 0
- Key : FailFast.Name
- Value: CORRUPT_LIST_ENTRY
- Key : FailFast.Type
- Value: 3
- Key : Failure.Bucket
- Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
- Key : Failure.Exception.Code
- Value: 0xc0000409
- Key : Failure.Exception.Record
- Value: 0xffffe08cb40aef68
- Key : Failure.Hash
- Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}
- Key : Hypervisor.Enlightenments.ValueHex
- Value: 0x7497cf94
- Key : Hypervisor.Flags.AnyHypervisorPresent
- Value: 1
- Key : Hypervisor.Flags.ApicEnlightened
- Value: 1
- Key : Hypervisor.Flags.ApicVirtualizationAvailable
- Value: 0
- Key : Hypervisor.Flags.AsyncMemoryHint
- Value: 0
- Key : Hypervisor.Flags.CoreSchedulerRequested
- Value: 0
- Key : Hypervisor.Flags.CpuManager
- Value: 1
- Key : Hypervisor.Flags.DeprecateAutoEoi
- Value: 0
- Key : Hypervisor.Flags.DynamicCpuDisabled
- Value: 1
- Key : Hypervisor.Flags.Epf
- Value: 0
- Key : Hypervisor.Flags.ExtendedProcessorMasks
- Value: 1
- Key : Hypervisor.Flags.HardwareMbecAvailable
- Value: 1
- Key : Hypervisor.Flags.MaxBankNumber
- Value: 0
- Key : Hypervisor.Flags.MemoryZeroingControl
- Value: 0
- Key : Hypervisor.Flags.NoExtendedRangeFlush
- Value: 0
- Key : Hypervisor.Flags.NoNonArchCoreSharing
- Value: 1
- Key : Hypervisor.Flags.Phase0InitDone
- Value: 1
- Key : Hypervisor.Flags.PowerSchedulerQos
- Value: 0
- Key : Hypervisor.Flags.RootScheduler
- Value: 0
- Key : Hypervisor.Flags.SynicAvailable
- Value: 1
- Key : Hypervisor.Flags.UseQpcBias
- Value: 0
- Key : Hypervisor.Flags.Value
- Value: 38408431
- Key : Hypervisor.Flags.ValueHex
- Value: 0x24a10ef
- Key : Hypervisor.Flags.VpAssistPage
- Value: 1
- Key : Hypervisor.Flags.VsmAvailable
- Value: 1
- Key : Hypervisor.RootFlags.AccessStats
- Value: 1
- Key : Hypervisor.RootFlags.CrashdumpEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.CreateVirtualProcessor
- Value: 1
- Key : Hypervisor.RootFlags.DisableHyperthreading
- Value: 0
- Key : Hypervisor.RootFlags.HostTimelineSync
- Value: 1
- Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
- Value: 0
- Key : Hypervisor.RootFlags.IsHyperV
- Value: 1
- Key : Hypervisor.RootFlags.LivedumpEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.MapDeviceInterrupt
- Value: 1
- Key : Hypervisor.RootFlags.MceEnlightened
- Value: 1
- Key : Hypervisor.RootFlags.Nested
- Value: 0
- Key : Hypervisor.RootFlags.StartLogicalProcessor
- Value: 1
- Key : Hypervisor.RootFlags.Value
- Value: 1015
- Key : Hypervisor.RootFlags.ValueHex
- Value: 0x3f7
- BUGCHECK_CODE: 139
- BUGCHECK_P1: 3
- BUGCHECK_P2: ffffe08cb40af010
- BUGCHECK_P3: ffffe08cb40aef68
- BUGCHECK_P4: 0
- FILE_IN_CAB: 071625-8390-01.dmp
- TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
- DUMP_FILE_ATTRIBUTES: 0x21808
- Kernel Generated Triage Dump
- FAULTING_THREAD: ffff958fbcde8080
- TRAP_FRAME: ffffe08cb40af010 -- (.trap 0xffffe08cb40af010)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=ffff958fba6dfbd8 rbx=0000000000000000 rcx=0000000000000003
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff806a16c5c49 rsp=ffffe08cb40af1a0 rbp=ffff958fbcde8900
- r8=0000000000000000 r9=4000000000000220 r10=0000fffff806a16c
- r11=ffff757db7a00000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!EtwpDeleteRegistrationObject+0x109:
- fffff806`a16c5c49 cd29 int 29h
- Resetting default scope
- EXCEPTION_RECORD: ffffe08cb40aef68 -- (.exr 0xffffe08cb40aef68)
- ExceptionAddress: fffff806a16c5c49 (nt!EtwpDeleteRegistrationObject+0x0000000000000109)
- ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
- ExceptionFlags: 00000001
- NumberParameters: 1
- Parameter[0]: 0000000000000003
- Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: msedge.exe
- ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
- EXCEPTION_CODE_STR: c0000409
- EXCEPTION_PARAMETER1: 0000000000000003
- EXCEPTION_STR: 0xc0000409
- STACK_TEXT:
- ffffe08c`b40aece8 fffff806`a14b96e9 : 00000000`00000139 00000000`00000003 ffffe08c`b40af010 ffffe08c`b40aef68 : nt!KeBugCheckEx
- ffffe08c`b40aecf0 fffff806`a14b9cf2 : 00000000`334e9b3f fffff806`a11239f9 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- ffffe08c`b40aee30 fffff806`a14b7928 : ffffe900`0404cd30 fffff806`00000000 00000001`56ef1025 fffff806`00000000 : nt!KiFastFailDispatch+0xb2
- ffffe08c`b40af010 fffff806`a16c5c49 : ffff958f`bcc83d10 ffff958f`00000000 ffff958f`00000100 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x368
- ffffe08c`b40af1a0 fffff806`a165191a : ffff958f`bcc83ce0 00000000`00000000 ffff958f`bcc83d10 ffffde3f`fdc99350 : nt!EtwpDeleteRegistrationObject+0x109
- ffffe08c`b40af200 fffff806`a1105108 : 00000000`00000000 00000000`00000000 ffffe08c`b40af3a0 ffff958f`bcc83d10 : nt!ObpRemoveObjectRoutine+0x11a
- ffffe08c`b40af260 fffff806`a1657249 : 00000000`00000001 00000000`00000001 ffffe08c`b40af3f0 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0x108
- ffffe08c`b40af2a0 fffff806`a16559b9 : 00000000`00000000 00000000`0000000a 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x3d9
- ffffe08c`b40af3f0 fffff806`a14b8d58 : ffff958f`bcde8000 00000000`00000000 ffff958f`bcde8080 0000009e`b23fef28 : nt!NtClose+0xe9
- ffffe08c`b40af460 00007ffb`eba21fb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
- 0000009e`b23fee08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`eba21fb4
- SYMBOL_NAME: nt!KiFastFailDispatch+b2
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.26100.4652
- STACK_COMMAND: .process /r /p 0xffff958fbcde7080; .thread 0xffff958fbcde8080 ; kb
- BUCKET_ID_FUNC_OFFSET: b2
- FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment