KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8185e9c2e5e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff8185e9c2e538, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for klmouflt.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0802
BIOS_DATE: 09/06/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X299-DELUXE
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffff8185e9c2e5e0
BUGCHECK_P3: ffff8185e9c2e538
BUGCHECK_P4: 0
TRAP_FRAME: ffff8185e9c2e5e0 -- (.trap 0xffff8185e9c2e5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8185e9c2e7e0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804289244ed rsp=ffff8185e9c2e778 rbp=ffff8185e9c2e7f0
r8=ffffc90c8c76ae98 r9=ffff8185e9c2e8e4 r10=fffff804106d0290
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
mouclass!MouseClassDequeueRead+0x51:
fffff804`289244ed cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff8185e9c2e538 -- (.exr 0xffff8185e9c2e538)
ExceptionAddress: fffff804289244ed (mouclass!MouseClassDequeueRead+0x0000000000000051)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 18
CPU_MHZ: b58
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R) SIG: 200005E'00000000 (cache) 200005E'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-14-2020 16:58:50.0002
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff804107ef929 to fffff804107dda20
STACK_TEXT:
ffff8185`e9c2e2b8 fffff804`107ef929 : 00000000`00000139 00000000`00000003 ffff8185`e9c2e5e0 ffff8185`e9c2e538 : nt!KeBugCheckEx
ffff8185`e9c2e2c0 fffff804`107efd50 : 00000000`00000040 00000000`00000b24 00000000`00000002 ffffc90c`960c3140 : nt!KiBugCheckDispatch+0x69
ffff8185`e9c2e400 fffff804`107ee0e3 : 00000000`00000246 00000000`000005ce 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8185`e9c2e5e0 fffff804`289244ed : fffff804`28924c7a ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8185`e9c2e778 fffff804`28924c7a : ffffc90c`8c76ae00 ffffc90c`8c780010 00000000`00000000 ffff8185`e9c2e8f0 : mouclass!MouseClassDequeueRead+0x51
ffff8185`e9c2e780 fffff804`28911403 : ffffc90c`8c73fde0 ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 : mouclass!MouseClassServiceCallback+0x9a
ffff8185`e9c2e820 ffffc90c`8c73fde0 : ffffc90c`8c73fc90 ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 : klmouflt+0x1403
ffff8185`e9c2e828 ffffc90c`8c73fc90 : ffffc90c`8d299a10 ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 : 0xffffc90c`8c73fde0
ffff8185`e9c2e830 ffffc90c`8d299a10 : ffff8185`e9c2e8e4 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 : 0xffffc90c`8c73fc90
ffff8185`e9c2e838 ffff8185`e9c2e8e4 : 00000000`000001a0 fffff804`287c23c4 00000000`ffffff81 00000000`00000008 : 0xffffc90c`8d299a10
ffff8185`e9c2e840 00000000`000001a0 : fffff804`287c23c4 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 : 0xffff8185`e9c2e8e4
ffff8185`e9c2e848 fffff804`287c23c4 : 00000000`ffffff81 00000000`00000008 ffffc90c`8d299a20 00000000`00000000 : 0x1a0
ffff8185`e9c2e850 fffff804`288f3aa8 : 00000000`00000000 00000000`00000002 ffff8185`e9c2e8f8 ffffc90c`8d2998b0 : HIDPARSE!HidP_GetScaledUsageValue+0x174
ffff8185`e9c2e8a0 fffff804`1063c7ce : 00000000`00000000 ffff8185`e9c2ea00 00000000`00000001 ffff8185`00000000 : mouhid!MouHid_ReadComplete+0x758
ffff8185`e9c2e940 fffff804`1063c697 : 00000000`00000000 ffffc90c`8808f006 ffffc90c`8d2b4970 00000000`00000000 : nt!IopfCompleteRequest+0x11e
ffff8185`e9c2ea30 fffff804`2878aef5 : ffffc90c`8ce4d5d8 ffffc90c`8c76c102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
ffff8185`e9c2ea60 fffff804`2878a7ed : ffffc90c`8c76c1d0 ffffc90c`8c76c102 ffffc90c`8c76c1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
ffff8185`e9c2eb60 fffff804`1063c7ce : ffffc90c`8c77f010 ffffc90c`8c77f010 ffff8185`e9c2ec01 ffffc90c`8c77f75b : HIDCLASS!HidpInterruptReadComplete+0x37d
ffff8185`e9c2ec00 fffff804`1063c697 : 00000000`00000001 00000000`00000000 ffffc90c`8c685020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffff8185`e9c2ecf0 fffff804`125a811a : 00000000`00000000 ffffc90c`86475dd0 ffffc90c`8c77f010 ffff8185`e9c2edd0 : nt!IofCompleteRequest+0x17
ffff8185`e9c2ed20 fffff804`125a5bbf : ffffc90c`8dcdbb02 ffffc90c`8c6b87a0 ffffc90c`8c77f010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffff8185`e9c2edb0 fffff804`27af0eed : 00000000`ffffff02 ffffc90c`8dcdba30 ffffc90c`8c685400 ffffc90c`8c685400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffff8185`e9c2ee10 fffff804`27af0db1 : ffffc90c`8dcdbbd0 00000000`00000009 ffffc90c`8dcdbc60 ffff8185`e9c2f028 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc9
ffff8185`e9c2ee70 fffff804`27af0ba0 : 00000000`00000004 ffff8185`e9c2efe0 00000000`00000000 ffffc90c`8c71f050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
ffff8185`e9c2ef20 fffff804`27ae88c1 : 00000000`00000004 ffff8185`e9c2eff8 00000000`00000008 ffff8185`e9c2f000 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
ffff8185`e9c2ef50 fffff804`27ae83f5 : 00000000`00000780 000036f3`799a1700 ffffc90c`868d4330 ffffc90c`8c545cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb1
ffff8185`e9c2efb0 fffff804`27ae80cc : 00000000`00000002 00000000`00000000 000036f3`81809328 00000000`00000001 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffff8185`e9c2f0b0 fffff804`125a38f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffff8185`e9c2f0e0 fffff804`1063a69e : ffffa001`5d9e3240 00000000`00000000 ffff8185`e9c2f3e0 fffff804`27a8870b : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
ffff8185`e9c2f120 fffff804`10639984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffff8185`e9c2f290 fffff804`107e158e : ffffffff`00000000 ffffa001`5d9e0180 ffffa001`5d9eb640 ffffc90c`944c0080 : nt!KiRetireDpcList+0x1f4
ffff8185`e9c2f520 00000000`00000000 : ffff8185`e9c30000 ffff8185`e9c29000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
THREAD_SHA1_HASH_MOD_FUNC: 931af43e969acb28bfcd3c2b381f80f78cc4f846
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e2d89e4c50aad9703c19b45d03b5c6c0c8c6111b
THREAD_SHA1_HASH_MOD: d578d3c817ef1357b91cc3984614fa81edbcc04f
FOLLOWUP_IP:
mouclass!MouseClassDequeueRead+51
fffff804`289244ed cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: mouclass!MouseClassDequeueRead+51
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3e1aa9cc
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 51
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead
TARGET_TIME: 2020-06-12T21:59:14.000Z
OSBUILD: 19041
OSSERVICEPACK: 329
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 7275
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_mouclass!mouseclassdequeueread
FAILURE_ID_HASH: {6b5843fa-650f-1f9f-d95b-388440977a32}
Followup: MachineOwner
---------