*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc90e8426ee60, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffc90e8426edb8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3671
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17214
Key : Analysis.Init.CPU.mSec
Value: 828
Key : Analysis.Init.Elapsed.mSec
Value: 12727
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 060122-10015-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffc90e8426ee60
BUGCHECK_P3: ffffc90e8426edb8
BUGCHECK_P4: 0
TRAP_FRAME: ffffc90e8426ee60 -- (.trap 0xffffc90e8426ee60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc90e8426ef01 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8005d8ff7388 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8020386fd35 rsp=ffffc90e8426eff0 rbp=ffff8005e625a3b0
r8=ffff8005e625a3b0 r9=0000000000000f63 r10=0000000069757262
r11=0000000000001001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe cy
nt!ExInterlockedInsertTailList+0x14f945:
fffff802`0386fd35 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc90e8426edb8 -- (.exr 0xffffc90e8426edb8)
ExceptionAddress: fffff8020386fd35 (nt!ExInterlockedInsertTailList+0x000000000014f945)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: amcap.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffc90e`8426eb38 fffff802`03809c69 : 00000000`00000139 00000000`00000003 ffffc90e`8426ee60 ffffc90e`8426edb8 : nt!KeBugCheckEx
ffffc90e`8426eb40 fffff802`0380a090 : 00000000`00000007 ffff8005`00000000 ffff8005`e70e0e50 ffff8005`dcf3ce80 : nt!KiBugCheckDispatch+0x69
ffffc90e`8426ec80 fffff802`03808423 : 00000000`00000740 ffff8005`e2628000 00000000`00000740 ffffc90e`8426ef71 : nt!KiFastFailDispatch+0xd0
ffffc90e`8426ee60 fffff802`0386fd35 : ffff8005`dc814000 fffff802`00000000 ffff8005`d8ff7388 ffff8005`dc87af90 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc90e`8426eff0 fffff802`0edf5338 : ffff8005`dc814000 00000000`00000000 00000000`00000000 ffff8005`00000000 : nt!ExInterlockedInsertTailList+0x14f945
ffffc90e`8426f020 ffff8005`dc814000 : 00000000`00000000 00000000`00000000 ffff8005`00000000 0000000d`00000001 : SMIksdrv+0x5338
ffffc90e`8426f028 00000000`00000000 : 00000000`00000000 ffff8005`00000000 0000000d`00000001 00000000`00000001 : 0xffff8005`dc814000
SYMBOL_NAME: SMIksdrv+5338
MODULE_NAME: SMIksdrv
IMAGE_NAME: SMIksdrv.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5338
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_SMIksdrv!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ebedc7fb-55dc-b0cb-40e1-46566a0854af}
Followup: MachineOwner
---------