*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff9025143f490, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff9025143f3e8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2343
Key : Analysis.Elapsed.mSec
Value: 4144
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 5766
Key : Analysis.Memory.CommitPeak.Mb
Value: 147
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
Key : Failure.Hash
Value: {364d2a10-fb5b-e8e9-9b5b-39c85a1b5a41}
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff9025143f490
BUGCHECK_P3: fffff9025143f3e8
BUGCHECK_P4: 0
FILE_IN_CAB: 061023-20046-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
TRAP_FRAME: fffff9025143f490 -- (.trap 0xfffff9025143f490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9b00d87a7b00 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc681da6f6080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80165ce9dce rsp=fffff9025143f628 rbp=00000000000000ff
r8=000000000000000f r9=ffff9b00d87a7b00 r10=ffffc681da6f6158
r11=ffff9b00d8840180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiRemoveThreadFromSharedReadyQueue+0x56:
fffff801`65ce9dce cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff9025143f3e8 -- (.exr 0xfffff9025143f3e8)
ExceptionAddress: fffff80165ce9dce (nt!KiRemoveThreadFromSharedReadyQueue+0x0000000000000056)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RDR2.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff902`5143f168 fffff801`65e0fd29 : 00000000`00000139 00000000`00000003 fffff902`5143f490 fffff902`5143f3e8 : nt!KeBugCheckEx
fffff902`5143f170 fffff801`65e10290 : 00000000`00000000 00000000`000000ff 00000000`00000000 fffff801`00000000 : nt!KiBugCheckDispatch+0x69
fffff902`5143f2b0 fffff801`65e0e25d : 43800000`43800000 ffffc681`d6bd2080 ffffc681`d7c0a080 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff902`5143f490 fffff801`65ce9dce : fffff801`65ce9d22 00000000`00000000 00000000`00000000 fffff070`d5ecfe50 : nt!KiRaiseSecurityCheckFailure+0x31d
fffff902`5143f628 fffff801`65ce9d22 : 00000000`00000000 00000000`00000000 fffff070`d5ecfe50 00000000`00000000 : nt!KiRemoveThreadFromSharedReadyQueue+0x56
fffff902`5143f630 fffff801`65c1d3b4 : ffff9b00`d8840180 00000000`00000000 fffff801`62deca00 fffff801`0000000f : nt!KiFindReadyThread+0xe2
fffff902`5143f6a0 fffff801`65c1caac : ffff9b00`d8840180 fffffff6`ffffffff fffff902`5143f900 00000000`00000006 : nt!KiSearchForNewThreadOnProcessor+0x254
fffff902`5143f720 fffff801`65c1beef : 00000000`00000005 00000000`00000000 fffff902`5143f8e0 00000000`00000000 : nt!KiSwapThread+0x5ec
fffff902`5143f7d0 fffff801`65c1b793 : ffffc681`00000000 fffff801`00000000 00000000`00040200 ffffc681`d6bd21c0 : nt!KiCommitThreadWait+0x14f
fffff902`5143f870 fffff801`66011641 : ffffc681`d7495b60 fffff801`00000006 00000000`00000001 ffffc681`dcedfc00 : nt!KeWaitForSingleObject+0x233
fffff902`5143f960 fffff801`6601159a : ffffc681`d6bd2080 00000000`00000000 00000000`00000000 ffffc681`dcedfc60 : nt!ObWaitForSingleObject+0x91
fffff902`5143f9c0 fffff801`65e0f4f5 : ffffc681`d6bd2080 0000019f`803a0720 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6a
fffff902`5143fa00 00007fff`919cd0e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000050`69dff678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`919cd0e4
SYMBOL_NAME: nt!KiSwapThread+5ec
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5ec
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiSwapThread
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {364d2a10-fb5b-e8e9-9b5b-39c85a1b5a41}
Followup: MachineOwner
---------