KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff968144ea0730, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff968144ea0688, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 656
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16672
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 9460
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.DumpHeader
Value: 0x139
Key : Bugcheck.Code.Register
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 071422-6109-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff968144ea0730
BUGCHECK_P3: ffff968144ea0688
BUGCHECK_P4: 0
TRAP_FRAME: ffff968144ea0730 -- (.trap 0xffff968144ea0730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff848e85fb3678 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017bfc2d99 rsp=ffff968144ea08c0 rbp=ffff848e8f3dddb8
r8=0000000000000000 r9=0000000000000000 r10=fffff801784b21c0
r11=0000000000000178 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
Ntfs!NtfsFspDispatch+0x20a59:
fffff801`7bfc2d99 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff968144ea0688 -- (.exr 0xffff968144ea0688)
ExceptionAddress: fffff8017bfc2d99 (Ntfs!NtfsFspDispatch+0x0000000000020a59)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff9681`44ea0408 fffff801`7862a4a9 : 00000000`00000139 00000000`00000003 ffff9681`44ea0730 ffff9681`44ea0688 : nt!KeBugCheckEx
ffff9681`44ea0410 fffff801`7862a8f2 : ffff848e`88f9d080 00000000`00000001 00000000`0020b544 ffff848e`84594a20 : nt!KiBugCheckDispatch+0x69
ffff9681`44ea0550 fffff801`78628bd2 : 00000000`0000000e ffff848e`8a61e040 00000000`0000000e ffff9681`44ea07f0 : nt!KiFastFailDispatch+0xb2
ffff9681`44ea0730 fffff801`7bfc2d99 : ffff848e`89cf5702 ffff848e`8ba79a88 ffff848e`8f3dddb8 ffff848e`8ba799f8 : nt!KiRaiseSecurityCheckFailure+0x312
ffff9681`44ea08c0 fffff801`784365ef : ffff848e`84525ca0 ffff848e`8a61e040 ffff848e`84525ca0 ffff848e`00000000 : Ntfs!NtfsFspDispatch+0x20a59
ffff9681`44ea0a00 fffff801`784d5ad5 : ffff848e`8a61e040 00000000`00000000 ffff848e`8a61e040 00078404`ad9bbffe : nt!ExpWorkerThread+0x14f
ffff9681`44ea0bf0 fffff801`7861b904 : ffffbd81`46dc0180 ffff848e`8a61e040 fffff801`784d5a80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9681`44ea0c40 00000000`00000000 : ffff9681`44ea1000 ffff9681`44e9b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!KiFastFailDispatch+b2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22000.739
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: b2
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}