You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff208510c9970, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff208510c98c8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
"C:\Windows\System32\KERNELBASE.dll" was not found in the image list.
Debugger will attempt to load "C:\Windows\System32\KERNELBASE.dll" at given base 00000000`00000000.
Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to add module at 00000000`00000000
TRAP_FRAME: fffff208510c9970 -- (.trap 0xfffff208510c9970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda084ac90b90 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff804756b6370 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804756b1772 rsp=fffff208510c9b08 rbp=fffff208510c9c89
r8=0000000000000000 r9=0000000000000fff r10=ffffa20003219000
r11=fffff208510c9b30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
injdrv+0x1772:
fffff804`756b1772 cd29 int 29h
Resetting default scope
7: kd> .trap 0xfffff208510c9970
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda084ac90b90 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff804756b6370 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804756b1772 rsp=fffff208510c9b08 rbp=fffff208510c9c89
r8=0000000000000000 r9=0000000000000fff r10=ffffa20003219000
r11=fffff208510c9b30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
injdrv+0x1772:
fffff804`756b1772 cd29 int 29h
k
*** Stack trace for last set context - .thread/.cxr resets it
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff208510c9970, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff208510c98c8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
"C:\Windows\System32\KERNELBASE.dll" was not found in the image list.
Debugger will attempt to load "C:\Windows\System32\KERNELBASE.dll" at given base 00000000`00000000.
Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to add module at 00000000`00000000
KEY_VALUES_STRING: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff208510c9970
BUGCHECK_P3: fffff208510c98c8
BUGCHECK_P4: 0
TRAP_FRAME: fffff208510c9970 -- (.trap 0xfffff208510c9970)
Some register values may be zeroed or incorrect. rax=ffffda084ac90b90 rbx=0000000000000000 rcx=0000000000000003 rdx=fffff804756b6370 rsi=0000000000000000 rdi=0000000000000000 rip=fffff804756b1772 rsp=fffff208510c9b08 rbp=fffff208510c9c89 r8=0000000000000000 r9=0000000000000fff r10=ffffa20003219000 r11=fffff208510c9b30 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc injdrv+0x1772: fffff804`756b1772 cd29 int 29h Resetting default scopeNOTE: The trap frame does not contain all registers.
EXCEPTION_RECORD: fffff208510c98c8 -- (.exr 0xfffff208510c98c8)
ExceptionAddress: fffff804756b1772 (injdrv+0x0000000000001772)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
PROCESS_NAME: ngentask.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff208
510c8ea8 fffff804
720a9522 : 0000000000000003 00000000
00000003 fffff208510c9010 fffff804
71f1db90 : nt!DbgBreakPointWithStatusfffff208
510c8eb0 fffff804
720a8c12 : 0000000000000003 fffff208
510c9010 fffff80471fd5b60 00000000
00000139 : nt!KiBugCheckDebugBreak+0x12fffff208
510c8f10 fffff804
71fc15e7 : ffffda084a8f6ae0 fffff804
71e40b8a fffff208510c9c60 00000000
ffff7fff : nt!KeBugCheck2+0x952fffff208
510c9610 fffff804
71fd32e9 : 0000000000000139 00000000
00000003 fffff208510c9970 fffff208
510c98c8 : nt!KeBugCheckEx+0x107fffff208
510c9650 fffff804
71fd3710 : 0000000000000000 00000000
00000000 ffffb28a8afb1730 fffff208
510c9840 : nt!KiBugCheckDispatch+0x69fffff208
510c9790 fffff804
71fd1aa5 : ffffda083f267300 fffff804
72460351 0000000000000000 00000000
00000000 : nt!KiFastFailDispatch+0xd0fffff208
510c9970 fffff804
756b1772 : fffff804756b182d 00000000
00000000 0000000000000000 00000000
000000c8 : nt!KiRaiseSecurityCheckFailure+0x325fffff208
510c9b08 fffff804
756b182d : 0000000000000000 00000000
00000000 00000000000000c8 fffff804
71f9fb13 : injdrv+0x1772fffff208
510c9b10 fffff804
756b2a61 : fffff804756b6370 fffff804
756b6370 0000000000000000 fffff804
7216f06d : injdrv+0x182dfffff208
510c9b40 fffff804
756b28d8 : fffff804756b6370 00000000
00000030 ffffda0800000000 fffff804
74dea5a0 : injdrv+0x2a61fffff208
510c9b70 fffff804
756b19b7 : fffff804756b6370 ffffda08
4ac90b90 ffffda0843c089a0 ffffda08
00000000 : injdrv+0x28d8fffff208
510c9bb0 fffff804
756b19e7 : 0000000000000000 00000000
00000380 ffffda0843c08970 ffffda08
4a0d72c0 : injdrv+0x19b7fffff208
510c9bf0 fffff804
723cd996 : ffffda084a0d72c0 00000000
00000380 fffff208510c9c60 00000000
00000000 : injdrv+0x19e7fffff208
510c9c20 fffff804
7245da9c : ffffffff00000000 fffff208
510caa10 fffff208510ca301 ffffda08
4b41d120 : nt!PspCallProcessNotifyRoutines+0x212fffff208
510c9cf0 fffff804
7242fba4 : ffffda084aec60c0 ffffda08
4a0d72c0 fffff208510ca4b0 fffff208
510ca370 : nt!PspInsertThread+0x5e8fffff208
510c9de0 fffff804
71fd2d18 : 00000000004ffda0 00000000
00774000 0000000000000000 00000000
00000000 : nt!NtCreateUserProcess+0x964fffff208
510caa90 00007ffd
54ddd934 : 00007ffd52fa04f8 00007ffd
00580058 0000000000a901dc 00000000
004fe050 : nt!KiSystemServiceCopyEnd+0x2800000000
004fdd28 00007ffd
52fa04f8 : 00007ffd00580058 00000000
00a901dc 00000000004fe050 00000000
00a901c0 : ntdll!NtCreateUserProcess+0x1400000000
004fdd30 00007ffd
52f9fce0 : 00000000004fe050 00000000
004fdef8 0000000002000000 00000000
02000000 : wow64!Wow64NtCreateUserProcess+0xe400000000
004fde10 00007ffd
52f97123 : 00000000005fea01 00000000
00774000 00007ffd52f9f790 00000000
00000000 : wow64!whNtCreateUserProcess+0x55000000000
004fe0f0 00000000
777f1783 : 0000002377871e7c 00007ffd
54d90023 0000000000000000 00000000
005fdf4c : wow64!Wow64SystemServiceEx+0x15300000000
004fe9b0 00000000
777f1199 : 00000000005ff61c 00007ffd
52f9c864 00000000004fea80 00007ffd
52f9bf58 : wow64cpu!ServiceNoTurbo+0xb00000000
004fea60 00007ffd
52f9c77a : 0000000000773000 00000000
00450080 0000000000000000 00000000
004ff2e0 : wow64cpu!BTCpuSimulate+0x900000000
004feaa0 00007ffd
52f9c637 : 0000000000000000 00000000
00912178 0000000000000000 00000000
00000000 : wow64!RunCpuSimulation+0xa00000000
004fead0 00007ffd
54e13fb3 : 0000000000772000 00000000
00772000 00007ffd54e6d4c0 00000000
00000010 : wow64!Wow64LdrpInitialize+0x12700000000
004fed80 00007ffd
54e01db5 : 0000000000000001 00000000
00000000 0000000000000000 00000000
00000001 : ntdll!LdrpInitializeProcess+0x186b00000000
004ff1c0 00007ffd
54db1853 : 0000000000000000 00007ffd
54d40000 0000000000000000 00000000
00774000 : ntdll!_LdrpInitialize+0x5054900000000
004ff260 00007ffd
54db17fe : 00000000004ff2e0 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!LdrpInitialize+0x3b00000000
004ff290 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : ntdll!LdrInitializeThunk+0xeSYMBOL_NAME: injdrv+1772
MODULE_NAME: injdrv
IMAGE_NAME: injdrv.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1772
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_injdrv!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b45b9d7e-89f1-dfe2-8192-89894ee49511}
Followup: MachineOwner
7: kd> .trap 0xfffff208510c9970
Some register values may be zeroed or incorrect. rax=ffffda084ac90b90 rbx=0000000000000000 rcx=0000000000000003 rdx=fffff804756b6370 rsi=0000000000000000 rdi=0000000000000000 rip=fffff804756b1772 rsp=fffff208510c9b08 rbp=fffff208510c9c89 r8=0000000000000000 r9=0000000000000fff r10=ffffa20003219000 r11=fffff208510c9b30 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc injdrv+0x1772: fffff804`756b1772 cd29 int 29hNOTE: The trap frame does not contain all registers.
k
*** Stack trace for last set context - .thread/.cxr resets it
Child-SP RetAddr Call Site
00 fffff208
510c9b08 fffff804
756b182d injdrv+0x177201 fffff208
510c9b10 fffff804
756b2a61 injdrv+0x182d02 fffff208
510c9b40 fffff804
756b28d8 injdrv+0x2a6103 fffff208
510c9b70 fffff804
756b19b7 injdrv+0x28d804 fffff208510c9bb0 fffff804756b19e7 injdrv+0x19b7
05 fffff208510c9bf0 fffff804723cd996 injdrv+0x19e7
06 fffff208510c9c20 fffff8047245da9c nt!PspCallProcessNotifyRoutines+0x212
07 fffff208510c9cf0 fffff8047242fba4 nt!PspInsertThread+0x5e8
08 fffff208510c9de0 fffff80471fd2d18 nt!NtCreateUserProcess+0x964
09 fffff208510caa90 00007ffd54ddd934 nt!KiSystemServiceCopyEnd+0x28
0a 00000000004fdd28 00007ffd52fa04f8 ntdll!NtCreateUserProcess+0x14
0b 00000000004fdd30 00007ffd52f9fce0 wow64!Wow64NtCreateUserProcess+0xe4
0c 00000000004fde10 00007ffd52f97123 wow64!whNtCreateUserProcess+0x550
0d 00000000004fe0f0 00000000777f1783 wow64!Wow64SystemServiceEx+0x153
0e 00000000004fe9b0 00000000777f1199 wow64cpu!ServiceNoTurbo+0xb
0f 00000000004fea60 00007ffd52f9c77a wow64cpu!BTCpuSimulate+0x9
10 00000000004feaa0 00007ffd52f9c637 wow64!RunCpuSimulation+0xa
11 00000000004fead0 00007ffd54e13fb3 wow64!Wow64LdrpInitialize+0x127
12 00000000004fed80 00007ffd54e01db5 ntdll!LdrpInitializeProcess+0x186b
13 00000000004ff1c0 00007ffd54db1853 ntdll!_LdrpInitialize+0x50549
14 00000000004ff260 00007ffd54db17fe ntdll!LdrpInitialize+0x3b
15 00000000004ff290 0000000000000000 ntdll!LdrInitializeThunk+0xe
The text was updated successfully, but these errors were encountered: