Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\101622-5281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`39400000 PsLoadedModuleList = 0xfffff805`3a02a270
Debug session time: Sun Oct 16 22:13:29.169 2022 (UTC + 8:00)
System Uptime: 0 days 0:06:00.863
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`397f71b0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffc184`489e9720=0000000000000139
11: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc184489e9a40, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffc184489e9998, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2952

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 190529

    Key  : Analysis.IO.Other.Mb
    Value: 19

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 41

    Key  : Analysis.Init.CPU.mSec
    Value: 624

    Key  : Analysis.Init.Elapsed.mSec
    Value: 228254

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  101622-5281-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc184489e9a40

BUGCHECK_P3: ffffc184489e9998

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc184489e9a40 -- (.trap 0xffffc184489e9a40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe08e39386840 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805396e2470 rsp=ffffc184489e9bd0 rbp=ffff81d8c0fb3c58
 r8=ffffe08e3935b840  r9=0000000000000200 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiInsertNewProcess+0xb4:
fffff805`396e2470 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc184489e9998 -- (.exr 0xffffc184489e9998)
ExceptionAddress: fffff805396e2470 (nt!MiInsertNewProcess+0x00000000000000b4)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Thunder.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffc184`489e9718 fffff805`39809169     : 00000000`00000139 00000000`00000003 ffffc184`489e9a40 ffffc184`489e9998 : nt!KeBugCheckEx
ffffc184`489e9720 fffff805`39809590     : 00000000`00000000 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc184`489e9860 fffff805`39807923     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc184`489e9a40 fffff805`396e2470     : ffffb181`f53ff000 ffffe08e`39386080 ffff81d8`c0fb3c58 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc184`489e9bd0 fffff805`39aabdec     : fffff805`3a050b00 ffff81d8`c0fb3c58 00000000`00000032 fffff805`39db11c4 : nt!MiInsertNewProcess+0xb4
ffffc184`489e9c20 fffff805`39a11c31     : 00000000`00006280 ffffb181`f53ff000 00000000`00000159 ffffc184`489ea280 : nt!MmCreateProcessAddressSpace+0x190
ffffc184`489e9c90 fffff805`39a153b7     : 00000000`00000000 ffffc184`489ea280 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x13f1
ffffc184`489ea200 fffff805`39808bb5     : 00000000`092afda0 00000000`00d9d000 00000000`00000000 00000000`092ae348 : nt!NtCreateUserProcess+0xa17
ffffc184`489ea9d0 00007ffc`6a58e664     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`092adfa8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`6a58e664


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1288

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------      您好,欢迎您咨询本站。感谢您提供的信息,引起此次蓝屏的程序是:Thunder.exe。请您参考以下方案看看能否解决。1.卸载迅雷软件。2.建议您先按照以下网站所记录的步骤尝试干净启动。(

点赞(15) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部