*******************************************************************************
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd833abb77a0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffffd833abb76f8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 953
Key : Analysis.Elapsed.mSec
Value: 1612
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 4915
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Analysis.Version.DbgEng
Value: 10.0.27725.1000
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_clipsp!unknown_function
Key : Failure.Hash
Value: {2641899c-eab7-b63c-c9a9-0c2055e7b4c1}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffd833abb77a0
BUGCHECK_P3: fffffd833abb76f8
BUGCHECK_P4: 0
FILE_IN_CAB: 110724-7406-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
FAULTING_THREAD: ffff9007e8d62080
TRAP_FRAME: fffffd833abb77a0 -- (.trap 0xfffffd833abb77a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd589b295fc40 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd589b295fc40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045b90737d rsp=fffffd833abb7930 rbp=ffffd589b295fc40
r8=0000000000000000 r9=0000000000000000 r10=0000000000000776
r11=ffffd589b698d93c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
clipsp+0xf737d:
fffff804`5b90737d ?? ???
Resetting default scope
EXCEPTION_RECORD: fffffd833abb76f8 -- (.exr 0xfffffd833abb76f8)
ExceptionAddress: fffff8045b90737d (clipsp+0x00000000000f737d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Das System hat in dieser Anwendung den berlauf eines stapelbasierten Puffers ermittelt. Dieser berlauf k nnte einem b sartigen Benutzer erm glichen, die Steuerung der Anwendung zu bernehmen.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffd83`3abb7478 fffff804`5ec2ac29 : 00000000`00000139 00000000`00000003 fffffd83`3abb77a0 fffffd83`3abb76f8 : nt!KeBugCheckEx
fffffd83`3abb7480 fffff804`5ec2b1f2 : ffffd589`000b6984 ffffd589`00000000 00000000`05000000 ffffd589`a30003b9 : nt!KiBugCheckDispatch+0x69
fffffd83`3abb75c0 fffff804`5ec28edb : 00000000`00000000 ffffd589`ffffffff fffffd83`3abb7930 00000000`50494c43 : nt!KiFastFailDispatch+0xb2
fffffd83`3abb77a0 fffff804`5b90737d : ffffd589`aeaaaad0 fffff804`5b907790 fffff804`5b8b6630 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x35b
fffffd83`3abb7930 ffffd589`aeaaaad0 : fffff804`5b907790 fffff804`5b8b6630 00000000`00000001 fffffd83`3abb7ad0 : clipsp+0xf737d
fffffd83`3abb7938 fffff804`5b907790 : fffff804`5b8b6630 00000000`00000001 fffffd83`3abb7ad0 00000000`0000003c : 0xffffd589`aeaaaad0
fffffd83`3abb7940 fffff804`5b8b6630 : 00000000`00000001 fffffd83`3abb7ad0 00000000`0000003c 00000000`00000000 : clipsp+0xf7790
fffffd83`3abb7948 00000000`00000001 : fffffd83`3abb7ad0 00000000`0000003c 00000000`00000000 fffff804`5b8c7e6f : clipsp+0xa6630
fffffd83`3abb7950 fffffd83`3abb7ad0 : 00000000`0000003c 00000000`00000000 fffff804`5b8c7e6f 00000000`0000000f : 0x1
fffffd83`3abb7958 00000000`0000003c : 00000000`00000000 fffff804`5b8c7e6f 00000000`0000000f 00000000`00000000 : 0xfffffd83`3abb7ad0
fffffd83`3abb7960 00000000`00000000 : fffff804`5b8c7e6f 00000000`0000000f 00000000`00000000 fffffd83`3abb7a31 : 0x3c
SYMBOL_NAME: clipsp+f737d
MODULE_NAME: clipsp
IMAGE_NAME: clipsp.sys
STACK_COMMAND: .process /r /p 0xffff9007ec32e080; .thread 0xffff9007e8d62080 ; kb
BUCKET_ID_FUNC_OFFSET: f737d
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_clipsp!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2641899c-eab7-b63c-c9a9-0c2055e7b4c1}
Followup: MachineOwner
---------