KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80708e6b000, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80708e6af58, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13196
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80708e6b000
BUGCHECK_P3: fffff80708e6af58
BUGCHECK_P4: 0
TRAP_FRAME: fffff80708e6b000 -- (.trap 0xfffff80708e6b000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff920746cc0d00 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff920746cc0500 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807083a74ff rsp=fffff80708e6b198 rbp=fffff80708e6b2d0
r8=00000000007ccaed r9=ffff920746cc0000 r10=ffff92074f80e418
r11=00000000007ccb33 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
NETIO!RemoveAndInsertTimerWheelElement+0x2082f:
fffff807`083a74ff cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80708e6af58 -- (.exr 0xfffff80708e6af58)
ExceptionAddress: fffff807083a74ff (NETIO!RemoveAndInsertTimerWheelElement+0x000000000002082f)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff807`08e6acd8 fffff807`04607169 : 00000000`00000139 00000000`00000003 fffff807`08e6b000 fffff807`08e6af58 : nt!KeBugCheckEx
fffff807`08e6ace0 fffff807`04607590 : 00000000`00000d7a ffff9207`4f80e010 fffff807`08e6af09 fffff807`0848eacc : nt!KiBugCheckDispatch+0x69
fffff807`08e6ae20 fffff807`04605923 : ffff5d04`40f87b67 00000000`00000002 00000000`00000000 fffff807`08e6b168 : nt!KiFastFailDispatch+0xd0
fffff807`08e6b000 fffff807`083a74ff : fffff807`08386c81 ffff9207`46cc0000 00000000`00000046 ffff9207`46cbf8e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`08e6b198 fffff807`08386c81 : ffff9207`46cc0000 00000000`00000046 ffff9207`46cbf8e0 ffff9207`4f80e010 : NETIO!RemoveAndInsertTimerWheelElement+0x2082f
fffff807`08e6b1a0 fffff807`08456094 : ffff9207`46c3f6d0 00000000`00000000 00000000`00000000 00000000`ffffffff : NETIO!RtlIndicateTimerWheelEntryTimerStart+0xf1
fffff807`08e6b1d0 fffff807`08454c5f : 00000000`00000000 00000000`ffffffff fffff807`08e6b4a0 00000000`00000000 : tcpip!TcpTcbFastDatagram+0x11a4
fffff807`08e6b3a0 fffff807`08453fff : 00000000`00000028 ffff9207`46d3e000 00000000`4b4120c0 ffff9207`46d3e000 : tcpip!TcpTcbReceive+0x18f
fffff807`08e6b5f0 fffff807`08453088 : 00000000`007ccb0b fffff807`0863dc00 00000000`0b1d4389 fffff807`08638598 : tcpip!TcpMatchReceive+0x51f
fffff807`08e6b8a0 fffff807`084b8a52 : ffff9207`46aa5270 00000000`0000bb01 00000000`00000000 ffff9207`46d3e001 : tcpip!TcpReceive+0x358
fffff807`08e6b990 fffff807`08479b30 : ffff9207`4b79e2a0 00000000`00000000 00000000`00000000 ffff9207`462f6a60 : tcpip!TcpNlClientReceiveDatagrams+0x22
fffff807`08e6b9d0 fffff807`0847647b : 00000000`00000001 00000000`00000000 00000000`00000000 ffff9207`46d3e000 : tcpip!IppProcessDeliverList+0xc0
fffff807`08e6bab0 fffff807`084759ff : fffff807`08638230 ffff9207`46cd88a0 ffff9207`46d3e000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b
fffff807`08e6bbb0 fffff807`08472d9c : ffff9207`4b92bd10 ffff9207`4b79e2a0 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
fffff807`08e6bcd0 fffff807`084befcf : ffff9207`4b79e2a0 00000000`00000000 fffff807`08e6bda1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
fffff807`08e6bd00 fffff807`084be5cc : ffff9207`4c26f001 ffff9207`46fed800 fffff807`084b1a50 fffff807`08e6c0dc : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x26f
fffff807`08e6be00 fffff807`0440d468 : ffff9207`46df67e0 00000000`00000002 fffff807`04f27600 fffff807`08e6c0f8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
fffff807`08e6bf50 fffff807`0440d3dd : fffff807`084be450 fffff807`08e6c0f8 ffff9207`468ffa70 fffff807`086018c4 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff807`08e6bfc0 fffff807`084b15ed : 00000000`00000014 fffff807`08516b2a ffff9207`4b79e420 fffff807`0873142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff807`08e6c000 fffff807`084b0ccd : 00000000`00000001 fffff807`08e6c160 ffff9207`46fed820 fffff807`08e6c170 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff807`08e6c060 fffff807`08201eb0 : ffff9207`4b8e1e61 00000000`00000001 ffff9207`4bad8870 fffff807`08e6c470 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff807`08e6c310 fffff807`08201ccb : ffff9207`46feb820 fffff807`00000001 fffff807`00000000 ffffa400`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff807`08e6c3f0 fffff807`08207ef0 : ffff9207`4b4111a0 ffff9207`4b79e201 ffff9207`4b4111a0 fffff807`08e6c401 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff807`08e6c470 fffff807`0823dee3 : ffff9207`4b79e2a0 fffff807`08e6c541 00000000`00000000 fffff807`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff807`08e6c4c0 fffff807`08204a94 : 00000000`0007fc8e 00000000`00000001 ffff9207`4b4111a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff807`08e6c590 fffff807`12f561d8 : ffff9207`4b6d7000 ffff9207`4b6d7000 00000000`00000000 ffff9207`4b6d75f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff807`08e6c620 fffff807`12f425a8 : 00000000`00000000 00000013`0abb6201 ffff9207`00000400 fffff807`08e6c798 : rt640x64!MpHandleRecvIntPriVLanJumbo+0x2c4
fffff807`08e6c710 fffff807`08207886 : 00000000`00000000 ffff9207`4b7e6010 ffff9207`4b834100 00000000`00000000 : rt640x64!MPHandleMessageInterrupt+0x398
fffff807`08e6c780 fffff807`044e535e : fffff807`010de240 00000000`00000000 00000000`00000004 fffff807`010db180 : ndis!ndisInterruptDpc+0x196
fffff807`08e6c860 fffff807`044e4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`08e6c9d0 fffff807`045f8d7e : 00000000`00000000 fffff807`010db180 fffff807`04f27600 ffff9207`4db3f080 : nt!KiRetireDpcList+0x1f4
fffff807`08e6cc60 00000000`00000000 : fffff807`08e6d000 fffff807`08e67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!RemoveAndInsertTimerWheelElement+2082f
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2082f
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_NETIO!RemoveAndInsertTimerWheelElement
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b2b60531-1e94-a5c9-4b1d-c7c19e7b13e7}
Followup: MachineOwner
---------