B
Benjamín Jerez
Hello.
I've been having a lot of BSOD recently, my pc is almost unusable.
I thought It may be a software problem, so I made a clean windows install, buy it keeps crashig. I also ran a memtest86, and it showed no error.
here is the minidump
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc50f1badf270, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc50f1badf1c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2656
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-6SM3QN9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2673
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffc50f1badf270
BUGCHECK_P3: ffffc50f1badf1c8
BUGCHECK_P4: 0
TRAP_FRAME: ffffc50f1badf270 -- (.trap 0xffffc50f1badf270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f0aaa36d158 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041ac653e5 rsp=ffffc50f1badf400 rbp=ffffca81a1100180
r8=00000000000176c4 r9=0000000000000000 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!KiQueueReadyThread+0x17b305:
fffff804`1ac653e5 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc50f1badf1c8 -- (.exr 0xffffc50f1badf1c8)
ExceptionAddress: fffff8041ac653e5 (nt!KiQueueReadyThread+0x000000000017b305)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffc50f1badef48
STACK_TEXT:
ffffc50f`1badef48 fffff804`1abefa29 : 00000000`00000139 00000000`00000003 ffffc50f`1badf270 ffffc50f`1badf1c8 : nt!KeBugCheckEx
ffffc50f`1badef50 fffff804`1abefe50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50f`1badf090 fffff804`1abee1e3 : 00000000`00000000 ffffca81`a1100180 ffff9f0a`aa36d080 fffff804`1aa3f046 : nt!KiFastFailDispatch+0xd0
ffffc50f`1badf270 fffff804`1ac653e5 : ffffca81`a11088f0 ffffca81`a1100180 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc50f`1badf400 fffff804`1aa3e966 : ffff9f0a`aa3f0220 ffff9f0a`aa36d000 ffffc50f`00000000 00000000`00000000 : nt!KiQueueReadyThread+0x17b305
ffffc50f`1badf480 fffff804`1aa3e2aa : 00000000`00000000 fffff804`00000000 ffff9f0a`a8cfb370 00000000`00000000 : nt!KiExitDispatcher+0x286
ffffc50f`1badf4f0 fffff758`a8667d43 : fffff720`00000000 fffff720`0062a8a0 00000000`000f0003 ffff9f0a`aa3f00a0 : nt!KeSetEvent+0xea
ffffc50f`1badf580 fffff758`a87011c8 : 00000000`00000001 00000000`00007ffe ffffd473`d184271d fffff758`a8620520 : win32kfull!InternalSetTimer+0x4f3
ffffc50f`1badf610 fffff758`a86ffb40 : fffff720`01200040 ffffc50f`1badfb00 00000000`00000020 00000000`00000004 : win32kfull!SetRITTimer+0x28
ffffc50f`1badf650 fffff758`a86ffacb : 00000000`00000007 00000000`00000010 00000000`00000000 00000000`00000000 : win32kfull!AdjustRITDelayableTimers+0x2c
ffffc50f`1badf690 fffff758`a8a69aff : 00000000`00000000 ffffc50f`1badf7c0 00000000`00000000 00000000`00000000 : win32kfull!SetTimerCoalescingTolerance+0x5b
ffffc50f`1badf6c0 fffff758`a8a69742 : ffff9f0a`afcd21a0 ffff9f0a`afcd21a0 00000000`00000001 00000000`00000000 : win32kbase!xxxUserPowerEventCalloutWorker+0x22f
ffffc50f`1badfa30 fffff758`a86a9fd0 : ffff9f0a`aa36d080 00000000`00000000 00000000`00000025 00000000`00000025 : win32kbase!xxxUserPowerCalloutWorker+0xe2
ffffc50f`1badfaa0 fffff758`a852474d : ffff9f0a`aa36d080 fffff804`1abef2d8 00000000`00000000 00000000`00040246 : win32kfull!NtUserCallNoParam+0x70
ffffc50f`1badfad0 fffff804`1abef478 : 00000000`00000170 00000000`00000025 00000000`00000000 00000000`00000000 : win32k!NtUserCallNoParam+0x15
ffffc50f`1badfb00 00007ffc`0cb810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`34f3fe38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0cb810e4
SYMBOL_NAME: win32kfull!InternalSetTimer+4f3
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_STACKPTR_ERROR_win32kfull!InternalSetTimer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6d41284-2d8d-9f4e-8a85-83d570096469}
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc50f1badf270, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc50f1badf1c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-6SM3QN9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2328
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffc50f1badf270
BUGCHECK_P3: ffffc50f1badf1c8
BUGCHECK_P4: 0
TRAP_FRAME: ffffc50f1badf270 -- (.trap 0xffffc50f1badf270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f0aaa36d158 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041ac653e5 rsp=ffffc50f1badf400 rbp=ffffca81a1100180
r8=00000000000176c4 r9=0000000000000000 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!KiQueueReadyThread+0x17b305:
fffff804`1ac653e5 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc50f1badf1c8 -- (.exr 0xffffc50f1badf1c8)
ExceptionAddress: fffff8041ac653e5 (nt!KiQueueReadyThread+0x000000000017b305)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffc50f1badef48
STACK_TEXT:
ffffc50f`1badef48 fffff804`1abefa29 : 00000000`00000139 00000000`00000003 ffffc50f`1badf270 ffffc50f`1badf1c8 : nt!KeBugCheckEx
ffffc50f`1badef50 fffff804`1abefe50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50f`1badf090 fffff804`1abee1e3 : 00000000`00000000 ffffca81`a1100180 ffff9f0a`aa36d080 fffff804`1aa3f046 : nt!KiFastFailDispatch+0xd0
ffffc50f`1badf270 fffff804`1ac653e5 : ffffca81`a11088f0 ffffca81`a1100180 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc50f`1badf400 fffff804`1aa3e966 : ffff9f0a`aa3f0220 ffff9f0a`aa36d000 ffffc50f`00000000 00000000`00000000 : nt!KiQueueReadyThread+0x17b305
ffffc50f`1badf480 fffff804`1aa3e2aa : 00000000`00000000 fffff804`00000000 ffff9f0a`a8cfb370 00000000`00000000 : nt!KiExitDispatcher+0x286
ffffc50f`1badf4f0 fffff758`a8667d43 : fffff720`00000000 fffff720`0062a8a0 00000000`000f0003 ffff9f0a`aa3f00a0 : nt!KeSetEvent+0xea
ffffc50f`1badf580 fffff758`a87011c8 : 00000000`00000001 00000000`00007ffe ffffd473`d184271d fffff758`a8620520 : win32kfull!InternalSetTimer+0x4f3
ffffc50f`1badf610 fffff758`a86ffb40 : fffff720`01200040 ffffc50f`1badfb00 00000000`00000020 00000000`00000004 : win32kfull!SetRITTimer+0x28
ffffc50f`1badf650 fffff758`a86ffacb : 00000000`00000007 00000000`00000010 00000000`00000000 00000000`00000000 : win32kfull!AdjustRITDelayableTimers+0x2c
ffffc50f`1badf690 fffff758`a8a69aff : 00000000`00000000 ffffc50f`1badf7c0 00000000`00000000 00000000`00000000 : win32kfull!SetTimerCoalescingTolerance+0x5b
ffffc50f`1badf6c0 fffff758`a8a69742 : ffff9f0a`afcd21a0 ffff9f0a`afcd21a0 00000000`00000001 00000000`00000000 : win32kbase!xxxUserPowerEventCalloutWorker+0x22f
ffffc50f`1badfa30 fffff758`a86a9fd0 : ffff9f0a`aa36d080 00000000`00000000 00000000`00000025 00000000`00000025 : win32kbase!xxxUserPowerCalloutWorker+0xe2
ffffc50f`1badfaa0 fffff758`a852474d : ffff9f0a`aa36d080 fffff804`1abef2d8 00000000`00000000 00000000`00040246 : win32kfull!NtUserCallNoParam+0x70
ffffc50f`1badfad0 fffff804`1abef478 : 00000000`00000170 00000000`00000025 00000000`00000000 00000000`00000000 : win32k!NtUserCallNoParam+0x15
ffffc50f`1badfb00 00007ffc`0cb810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`34f3fe38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0cb810e4
SYMBOL_NAME: win32kfull!InternalSetTimer+4f3
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_STACKPTR_ERROR_win32kfull!InternalSetTimer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6d41284-2d8d-9f4e-8a85-83d570096469}
Followup: MachineOwner
---------
Continue reading...
I've been having a lot of BSOD recently, my pc is almost unusable.
I thought It may be a software problem, so I made a clean windows install, buy it keeps crashig. I also ran a memtest86, and it showed no error.
here is the minidump
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc50f1badf270, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc50f1badf1c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2656
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-6SM3QN9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2673
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffc50f1badf270
BUGCHECK_P3: ffffc50f1badf1c8
BUGCHECK_P4: 0
TRAP_FRAME: ffffc50f1badf270 -- (.trap 0xffffc50f1badf270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f0aaa36d158 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041ac653e5 rsp=ffffc50f1badf400 rbp=ffffca81a1100180
r8=00000000000176c4 r9=0000000000000000 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!KiQueueReadyThread+0x17b305:
fffff804`1ac653e5 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc50f1badf1c8 -- (.exr 0xffffc50f1badf1c8)
ExceptionAddress: fffff8041ac653e5 (nt!KiQueueReadyThread+0x000000000017b305)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffc50f1badef48
STACK_TEXT:
ffffc50f`1badef48 fffff804`1abefa29 : 00000000`00000139 00000000`00000003 ffffc50f`1badf270 ffffc50f`1badf1c8 : nt!KeBugCheckEx
ffffc50f`1badef50 fffff804`1abefe50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50f`1badf090 fffff804`1abee1e3 : 00000000`00000000 ffffca81`a1100180 ffff9f0a`aa36d080 fffff804`1aa3f046 : nt!KiFastFailDispatch+0xd0
ffffc50f`1badf270 fffff804`1ac653e5 : ffffca81`a11088f0 ffffca81`a1100180 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc50f`1badf400 fffff804`1aa3e966 : ffff9f0a`aa3f0220 ffff9f0a`aa36d000 ffffc50f`00000000 00000000`00000000 : nt!KiQueueReadyThread+0x17b305
ffffc50f`1badf480 fffff804`1aa3e2aa : 00000000`00000000 fffff804`00000000 ffff9f0a`a8cfb370 00000000`00000000 : nt!KiExitDispatcher+0x286
ffffc50f`1badf4f0 fffff758`a8667d43 : fffff720`00000000 fffff720`0062a8a0 00000000`000f0003 ffff9f0a`aa3f00a0 : nt!KeSetEvent+0xea
ffffc50f`1badf580 fffff758`a87011c8 : 00000000`00000001 00000000`00007ffe ffffd473`d184271d fffff758`a8620520 : win32kfull!InternalSetTimer+0x4f3
ffffc50f`1badf610 fffff758`a86ffb40 : fffff720`01200040 ffffc50f`1badfb00 00000000`00000020 00000000`00000004 : win32kfull!SetRITTimer+0x28
ffffc50f`1badf650 fffff758`a86ffacb : 00000000`00000007 00000000`00000010 00000000`00000000 00000000`00000000 : win32kfull!AdjustRITDelayableTimers+0x2c
ffffc50f`1badf690 fffff758`a8a69aff : 00000000`00000000 ffffc50f`1badf7c0 00000000`00000000 00000000`00000000 : win32kfull!SetTimerCoalescingTolerance+0x5b
ffffc50f`1badf6c0 fffff758`a8a69742 : ffff9f0a`afcd21a0 ffff9f0a`afcd21a0 00000000`00000001 00000000`00000000 : win32kbase!xxxUserPowerEventCalloutWorker+0x22f
ffffc50f`1badfa30 fffff758`a86a9fd0 : ffff9f0a`aa36d080 00000000`00000000 00000000`00000025 00000000`00000025 : win32kbase!xxxUserPowerCalloutWorker+0xe2
ffffc50f`1badfaa0 fffff758`a852474d : ffff9f0a`aa36d080 fffff804`1abef2d8 00000000`00000000 00000000`00040246 : win32kfull!NtUserCallNoParam+0x70
ffffc50f`1badfad0 fffff804`1abef478 : 00000000`00000170 00000000`00000025 00000000`00000000 00000000`00000000 : win32k!NtUserCallNoParam+0x15
ffffc50f`1badfb00 00007ffc`0cb810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`34f3fe38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0cb810e4
SYMBOL_NAME: win32kfull!InternalSetTimer+4f3
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_STACKPTR_ERROR_win32kfull!InternalSetTimer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6d41284-2d8d-9f4e-8a85-83d570096469}
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc50f1badf270, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc50f1badf1c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-6SM3QN9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2328
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffc50f1badf270
BUGCHECK_P3: ffffc50f1badf1c8
BUGCHECK_P4: 0
TRAP_FRAME: ffffc50f1badf270 -- (.trap 0xffffc50f1badf270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9f0aaa36d158 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8041ac653e5 rsp=ffffc50f1badf400 rbp=ffffca81a1100180
r8=00000000000176c4 r9=0000000000000000 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!KiQueueReadyThread+0x17b305:
fffff804`1ac653e5 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc50f1badf1c8 -- (.exr 0xffffc50f1badf1c8)
ExceptionAddress: fffff8041ac653e5 (nt!KiQueueReadyThread+0x000000000017b305)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffc50f1badef48
STACK_TEXT:
ffffc50f`1badef48 fffff804`1abefa29 : 00000000`00000139 00000000`00000003 ffffc50f`1badf270 ffffc50f`1badf1c8 : nt!KeBugCheckEx
ffffc50f`1badef50 fffff804`1abefe50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc50f`1badf090 fffff804`1abee1e3 : 00000000`00000000 ffffca81`a1100180 ffff9f0a`aa36d080 fffff804`1aa3f046 : nt!KiFastFailDispatch+0xd0
ffffc50f`1badf270 fffff804`1ac653e5 : ffffca81`a11088f0 ffffca81`a1100180 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc50f`1badf400 fffff804`1aa3e966 : ffff9f0a`aa3f0220 ffff9f0a`aa36d000 ffffc50f`00000000 00000000`00000000 : nt!KiQueueReadyThread+0x17b305
ffffc50f`1badf480 fffff804`1aa3e2aa : 00000000`00000000 fffff804`00000000 ffff9f0a`a8cfb370 00000000`00000000 : nt!KiExitDispatcher+0x286
ffffc50f`1badf4f0 fffff758`a8667d43 : fffff720`00000000 fffff720`0062a8a0 00000000`000f0003 ffff9f0a`aa3f00a0 : nt!KeSetEvent+0xea
ffffc50f`1badf580 fffff758`a87011c8 : 00000000`00000001 00000000`00007ffe ffffd473`d184271d fffff758`a8620520 : win32kfull!InternalSetTimer+0x4f3
ffffc50f`1badf610 fffff758`a86ffb40 : fffff720`01200040 ffffc50f`1badfb00 00000000`00000020 00000000`00000004 : win32kfull!SetRITTimer+0x28
ffffc50f`1badf650 fffff758`a86ffacb : 00000000`00000007 00000000`00000010 00000000`00000000 00000000`00000000 : win32kfull!AdjustRITDelayableTimers+0x2c
ffffc50f`1badf690 fffff758`a8a69aff : 00000000`00000000 ffffc50f`1badf7c0 00000000`00000000 00000000`00000000 : win32kfull!SetTimerCoalescingTolerance+0x5b
ffffc50f`1badf6c0 fffff758`a8a69742 : ffff9f0a`afcd21a0 ffff9f0a`afcd21a0 00000000`00000001 00000000`00000000 : win32kbase!xxxUserPowerEventCalloutWorker+0x22f
ffffc50f`1badfa30 fffff758`a86a9fd0 : ffff9f0a`aa36d080 00000000`00000000 00000000`00000025 00000000`00000025 : win32kbase!xxxUserPowerCalloutWorker+0xe2
ffffc50f`1badfaa0 fffff758`a852474d : ffff9f0a`aa36d080 fffff804`1abef2d8 00000000`00000000 00000000`00040246 : win32kfull!NtUserCallNoParam+0x70
ffffc50f`1badfad0 fffff804`1abef478 : 00000000`00000170 00000000`00000025 00000000`00000000 00000000`00000000 : win32k!NtUserCallNoParam+0x15
ffffc50f`1badfb00 00007ffc`0cb810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`34f3fe38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0cb810e4
SYMBOL_NAME: win32kfull!InternalSetTimer+4f3
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f3
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_STACKPTR_ERROR_win32kfull!InternalSetTimer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6d41284-2d8d-9f4e-8a85-83d570096469}
Followup: MachineOwner
---------
Continue reading...