KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff50d3e28b690, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff50d3e28b5e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: fffff50d3e28b690
BUGCHECK_P3: fffff50d3e28b5e8
BUGCHECK_P4: 0
TRAP_FRAME: fffff50d3e28b690 -- (.trap 0xfffff50d3e28b690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff838dacf3c768 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8042469a180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80428680327 rsp=fffff50d3e28b820 rbp=ffff838dacf3c760
r8=0000000000000000 r9=0000000000000008 r10=0000fffff804286d
r11=fffff50d3e28b3d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiProcessThreadWaitList+0xd7:
fffff804`28680327 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff50d3e28b5e8 -- (.exr 0xfffff50d3e28b5e8)
ExceptionAddress: fffff80428680327 (nt!KiProcessThreadWaitList+0x00000000000000d7)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 03-25-2020 22:37:24.0726
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff804287af729 to fffff8042879d860
STACK_TEXT:
fffff50d`3e28b368 fffff804`287af729 : 00000000`00000139 00000000`00000003 fffff50d`3e28b690 fffff50d`3e28b5e8 : nt!KeBugCheckEx
fffff50d`3e28b370 fffff804`287afb50 : 00000000`00000006 00000001`00000000 00000000`00000000 fffff50d`3e28b5d0 : nt!KiBugCheckDispatch+0x69
fffff50d`3e28b4b0 fffff804`287adee3 : 00000000`00000000 fffff804`28682225 00000000`00000008 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff50d`3e28b690 fffff804`28680327 : ffff838d`00000000 00000000`00000000 ffff838d`9e7771f0 00000000`00000080 : nt!KiRaiseSecurityCheckFailure+0x323
fffff50d`3e28b820 fffff804`28661ae0 : ffff838d`9e0a1d88 fffff50d`3e28b8f9 00000000`0000000d 00000000`00000002 : nt!KiProcessThreadWaitList+0xd7
fffff50d`3e28b870 fffff804`28662717 : ffff838d`a6a91330 00000000`00000000 ffff838d`00000019 ffff838d`9e176248 : nt!KiProcessExpiredTimerList+0x224
fffff50d`3e28b960 fffff804`286624dc : ffffd801`3d5c0180 00000000`00000019 ffffd801`0000b801 00000000`0000001a : nt!KiExpireTimerTable+0x1a7
fffff50d`3e28ba20 fffff804`2868309d : ffffd801`3d5c0180 fffff780`00000014 fffff50d`00000000 ffffd801`3d5c0180 : nt!KiTimerExpiration+0x134
fffff50d`3e28bae0 fffff804`287a13ce : ffffffff`00000000 ffffd801`3d5c0180 00000000`00000000 ffffd801`3d5cb340 : nt!KiRetireDpcList+0x1bd
fffff50d`3e28bc60 00000000`00000000 : fffff50d`3e28c000 fffff50d`3e286000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
THREAD_SHA1_HASH_MOD_FUNC: bf3dd0663a9cf95cff33ce5a7fe35cd674e57065
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 92bead3ecc6004081c66e59d97e1eff419aaaa7f
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+224
fffff804`28661ae0 e9b2feffff jmp nt!KiProcessExpiredTimerList+0xdb (fffff804`28661997)
FAULT_INSTR_CODE: fffeb2e9
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: nt!KiProcessExpiredTimerList+224
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b2da5bb
IMAGE_VERSION: 10.0.19041.84
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 224
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
TARGET_TIME: 2020-03-25T19:19:42.000Z
OSBUILD: 19041
OSSERVICEPACK: 84
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2009-12-20 07:19:07
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 4592
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist
FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8015a269690, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8015a2695e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: fffff8015a269690
BUGCHECK_P3: fffff8015a2695e8
BUGCHECK_P4: 0
TRAP_FRAME: fffff8015a269690 -- (.trap 0xfffff8015a269690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff82015daa9868 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdc0088ede180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80154a80327 rsp=fffff8015a269820 rbp=ffff82015daa9860
r8=0000000000000000 r9=0000000000000008 r10=0000fffff80154ad
r11=fffff8015a2693d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiProcessThreadWaitList+0xd7:
fffff801`54a80327 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff8015a2695e8 -- (.exr 0xfffff8015a2695e8)
ExceptionAddress: fffff80154a80327 (nt!KiProcessThreadWaitList+0x00000000000000d7)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 03-25-2020 22:37:22.0543
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80154baf729 to fffff80154b9d860
STACK_TEXT:
fffff801`5a269368 fffff801`54baf729 : 00000000`00000139 00000000`00000003 fffff801`5a269690 fffff801`5a2695e8 : nt!KeBugCheckEx
fffff801`5a269370 fffff801`54bafb50 : 00000000`00000006 00000001`00000001 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff801`5a2694b0 fffff801`54badee3 : 00000000`00000000 fffff801`54a82225 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff801`5a269690 fffff801`54a80327 : ffff8201`00000000 00000000`00000000 ffff8201`5f9df1f0 00000000`00000080 : nt!KiRaiseSecurityCheckFailure+0x323
fffff801`5a269820 fffff801`54a61ae0 : ffff8201`5b7c7568 fffff801`5a2698f9 00000000`00000009 00000000`00000002 : nt!KiProcessThreadWaitList+0xd7
fffff801`5a269870 fffff801`54a62717 : ffff8201`53320330 00000000`00000000 ffff8201`0000001f ffff8201`6229d6c0 : nt!KiProcessExpiredTimerList+0x224
fffff801`5a269960 fffff801`54a624dc : fffff801`524bf180 00000000`00000037 fffff801`0001ac1f 00000000`0000001a : nt!KiExpireTimerTable+0x1a7
fffff801`5a269a20 fffff801`54a8309d : fffff801`524bf180 fffff780`00000014 fffff801`00000000 fffff801`524bf180 : nt!KiTimerExpiration+0x134
fffff801`5a269ae0 fffff801`54ba13ce : 00000000`00000000 fffff801`524bf180 00000000`001a6550 fffff801`55527600 : nt!KiRetireDpcList+0x1bd
fffff801`5a269c60 00000000`00000000 : fffff801`5a26a000 fffff801`5a264000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
THREAD_SHA1_HASH_MOD_FUNC: bf3dd0663a9cf95cff33ce5a7fe35cd674e57065
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 92bead3ecc6004081c66e59d97e1eff419aaaa7f
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+224
fffff801`54a61ae0 e9b2feffff jmp nt!KiProcessExpiredTimerList+0xdb (fffff801`54a61997)
FAULT_INSTR_CODE: fffeb2e9
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: nt!KiProcessExpiredTimerList+224
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b2da5bb
IMAGE_VERSION: 10.0.19041.84
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 224
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
TARGET_TIME: 2020-03-25T18:51:13.000Z
OSBUILD: 19041
OSSERVICEPACK: 84
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2009-12-20 07:19:07
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: db19
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist
FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8062d095da7, The address that the exception occurred at
Arg3: ffffee06ac9e45e8, Parameter 0 of the exception
Arg4: ffffb101912fe920, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for rt640x64.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8062d095da7
BUGCHECK_P3: ffffee06ac9e45e8
BUGCHECK_P4: ffffb101912fe920
WRITE_ADDRESS: fffff8062dafb388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffb101912fe920
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!RtlpHpVsFreeChunkInsert+eb
fffff806`2d095da7 8b08 mov ecx,dword ptr [rax]
EXCEPTION_PARAMETER1: ffffee06ac9e45e8
EXCEPTION_PARAMETER2: ffffb101912fe920
BUGCHECK_STR: 0x1E_c0000005
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-7KGVC4E
ANALYSIS_SESSION_TIME: 03-25-2020 22:37:27.0826
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
EXCEPTION_RECORD: a100a0e8a0e0a0d0 -- (.exr 0xa100a0e8a0e0a0d0)
Cannot read Exception record @ a100a0e8a0e0a0d0
TRAP_FRAME: a178a170a160a148 -- (.trap 0xa178a170a160a148)
Unable to read trap frame at a178a170`a160a148
BAD_STACK_POINTER: ffffb101912fe098
LAST_CONTROL_TRANSFER: from fffff8062d2a96cf to fffff8062d19d860
STACK_TEXT:
ffffb101`912fe098 fffff806`2d2a96cf : 00000000`0000001e ffffffff`c0000005 fffff806`2d095da7 ffffee06`ac9e45e8 : nt!KeBugCheckEx
ffffb101`912fe0a0 fffff806`2d1b67ac : ffffee06`ac9e50c0 fffff806`2d0f1b75 ffffee06`ac9e4820 ffffb101`912fe700 : nt!KiFatalFilter+0x1f
ffffb101`912fe0e0 fffff806`2d179152 : ffffee06`00000002 00000000`00000000 ffffee06`ac9e0000 ffffee06`ac9e6000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffb101`912fe120 fffff806`2d1a6722 : 00000000`00000000 ffffb101`912fe700 ffffee06`ac9e50c0 00000000`00000000 : nt!_C_specific_handler+0xa2
ffffb101`912fe190 fffff806`2d0485d0 : 00000000`00000000 ffffb101`912fe700 ffffee06`ac9e50c0 a460a458`a450a448 : nt!RtlpExecuteHandlerForException+0x12
ffffb101`912fe1c0 fffff806`2d0ccdd6 : ffffee06`ac9e45e8 ffffb101`912fee20 ffffee06`ac9e45e8 00000000`00000000 : nt!RtlDispatchException+0x280
ffffb101`912fe8f0 fffff806`2d19e6f2 : a100a0e8`a0e0a0d0 a140a130`a118a110 a178a170`a160a148 a1c0a1a8`a1a0a190 : nt!KiDispatchException+0x186
ffffb101`912fefb0 fffff806`2d19e6c0 : fffff806`2d1af865 00000000`00000000 fffff806`2fd31fce 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffee06`ac9e44a8 fffff806`2d1af865 : 00000000`00000000 fffff806`2fd31fce 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffee06`ac9e44b0 fffff806`2d1ab5a0 : 00000000`00000000 ffffee06`ac9e4968 00000000`00000002 fffff806`2d007939 : nt!KiExceptionDispatch+0x125
ffffee06`ac9e4690 fffff806`2d095da7 : ffffde0a`33010280 ffffde0a`42803e20 00000000`00000000 00000000`00000001 : nt!KiGeneralProtectionFault+0x320
ffffee06`ac9e4820 fffff806`2d095c6e : 0000005e`00000000 ffffde0a`42802000 00000000`00000000 ffffde0a`42803e20 : nt!RtlpHpVsFreeChunkInsert+0xeb
ffffee06`ac9e4850 fffff806`2d095296 : 00000000`00000000 00000000`0000007a 00000000`ffffde0a ffffde0a`33010280 : nt!RtlpHpVsChunkFree+0xaa
ffffee06`ac9e48a0 fffff806`2d0951ab : ffffde0a`33010280 00000000`00000000 00000000`00000000 ffffee06`ac9e4a00 : nt!RtlpHpVsContextFreeInternal+0xb6
ffffee06`ac9e48f0 fffff806`2d092f9e : ffffde0a`425e8ff0 00000000`00000005 ffffde0a`33010280 fffff806`2d069620 : nt!RtlpHpVsContextFreeList+0x5b
ffffee06`ac9e4950 fffff806`2d069643 : ffffde0a`33010100 ffffde0a`427ba000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0xd6
ffffee06`ac9e49a0 fffff806`2d069554 : 00000000`00000000 00000000`00000000 ffffde0a`427ba010 fffff806`000005d0 : nt!RtlpHpSegFree+0x83
ffffee06`ac9e49e0 fffff806`2d068b65 : ffffde0a`427ba000 ffffee06`ac9e4a90 00000000`00044fd0 00000000`000005c0 : nt!RtlpHpFreeHeap+0xa8
ffffee06`ac9e4a30 fffff806`2d734019 : ffffde0a`41d6e480 00000000`00000000 00000000`00000000 00000000`42526354 : nt!ExFreeHeapPool+0x179
ffffee06`ac9e4ad0 fffff806`2fd57263 : ffffde0a`4028da40 00000000`00000001 00000000`00000000 00000000`00000001 : nt!ExFreePool+0x9
ffffee06`ac9e4b00 fffff806`2fbe5af3 : 00000000`00000000 00000000`00000002 00000000`00000001 00000000`00000000 : tcpip!TcpTcbReassemblyFreeNetBufferList+0x63
ffffee06`ac9e4b30 fffff806`2fd2ee12 : 00000000`00000000 00000000`00989601 ffffde0a`4028d8c0 00000000`00000100 : NETIO!NetioDereferenceNetBufferListChain+0x103
ffffee06`ac9e4bb0 fffff806`2fd2d7ce : ffffde0a`36bfd370 ffffde0a`3f0f1040 ffffde0a`00000004 00000000`00000000 : tcpip!TcpReceive+0x442
ffffee06`ac9e4ca0 fffff806`2fd53d69 : 00000000`00000000 ffffde0a`3bf42780 ffffde0a`37dd0601 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
ffffee06`ac9e4ce0 fffff806`2fd6685e : ffffde0a`3b7fa140 ffffde0a`385c9720 00000000`00040206 fffff806`2d084200 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
ffffee06`ac9e4f70 fffff806`2d09bba7 : ffffde0a`377f85f0 ffffee06`ac9e5268 ffffde0a`372ee040 00000000`00000002 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
ffffee06`ac9e50c0 fffff806`2d09bb1d : fffff806`2fd66730 ffffee06`ac9e5268 ffffde0a`377f85f0 fffff806`2fbe23af : nt!KeExpandKernelStackAndCalloutInternal+0x77
ffffee06`ac9e5130 fffff806`2fd5888d : ffffee06`00000004 ffffee06`ac9e5102 ffffde0a`4193fe20 fffff806`2ffe142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffee06`ac9e5170 fffff806`2fd57f6d : 00000000`00000001 ffffee06`ac9e52d0 ffffde0a`385c9720 ffffee06`ac9e52e0 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffffee06`ac9e51d0 fffff806`2fa71eb0 : ffffde0a`382fb481 00000000`00000001 ffffde0a`3c1f41f0 ffffee06`ac9e55e0 : tcpip!FlReceiveNetBufferListChain+0x46d
ffffee06`ac9e5480 fffff806`2fa71ccb : ffffde0a`3c2023b0 fffff806`00000001 ffffee06`00000000 ffffee06`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffffee06`ac9e5560 fffff806`2fa77ef0 : ffffde0a`386ea1a0 ffffde0a`3bf65c01 ffffde0a`386ea1a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffffee06`ac9e55e0 fffff806`2faadcf3 : ffffde0a`3bf65c60 ffffee06`ac9e56b1 00000000`00000000 00000000`00000202 : ndis!ndisCallReceiveHandler+0x60
ffffee06`ac9e5630 fffff806`2fa74a94 : 00000000`00000b41 00000000`00000001 ffffde0a`386ea1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffffee06`ac9e5700 fffff806`39e58017 : fffff806`2efb2b30 fffff806`2efb2b30 ffffee06`ac9e5890 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffffee06`ac9e5790 fffff806`2efb2b2f : fffff806`2efb2b30 ffffee06`ac9e5890 00000000`00000000 ffffde0a`00000001 : rt640x64+0x28017
ffffee06`ac9e5798 fffff806`2efb2b2f : ffffee06`ac9e5890 00000000`00000000 ffffde0a`00000001 fffff806`2d1a4d93 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffffee06`ac9e57a0 ffffee06`ac9e5890 : 00000000`00000000 ffffde0a`00000001 fffff806`2d1a4d93 00000002`912d0001 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffffee06`ac9e57a8 00000000`00000000 : ffffde0a`00000001 fffff806`2d1a4d93 00000002`912d0001 80000000`00000001 : 0xffffee06`ac9e5890
THREAD_SHA1_HASH_MOD_FUNC: 9366a2762fc1668c450fe259c6bbf233d7a3e9b3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 592178274dcd0539081be3b72c436b5265e12022
THREAD_SHA1_HASH_MOD: 45983810096273aebf2b55536114b0ccc7b45860
FOLLOWUP_IP:
nt!ExFreePool+9
fffff806`2d734019 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 13
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.84
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_nt!ExFreePool
BUCKET_ID: 0x1E_c0000005_STACKPTR_ERROR_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_STACKPTR_ERROR_nt!ExFreePool
TARGET_TIME: 2020-03-25T19:20:53.000Z
OSBUILD: 19041
OSSERVICEPACK: 84
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2009-12-20 07:19:07
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 26427
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_stackptr_error_nt!exfreepool
FAILURE_ID_HASH: {bf73f4aa-d0f4-ff68-472b-5166c586b255}
Followup: Pool_corruption
---------