Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com) Online Crash Dump Analysis Service See http://www.osronline.com for more information Windows 8 Kernel Version 9600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 9600.17041.amd64fre.winblue_gdr.140305-1710 Machine Name: Kernel base = 0xfffff801`d8087000 PsLoadedModuleList = 0xfffff801`d83512d0 Debug session time: Fri May 2 01:16:03.023 2014 (UTC - 4:00) System Uptime: 0 days 0:01:54.881 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: fffff801d9b1a900, Address of the trap frame for the exception that caused the bugcheck Arg3: fffff801d9b1a858, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x139 PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff801d81e6ae9 to fffff801d81dafa0 STACK_TEXT: fffff801`d9b1a5d8 fffff801`d81e6ae9 : 00000000`00000139 00000000`00000003 fffff801`d9b1a900 fffff801`d9b1a858 : nt!KeBugCheckEx fffff801`d9b1a5e0 fffff801`d81e6e10 : ffffd000`e4340180 fffff801`d836d180 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff801`d9b1a720 fffff801`d81e6034 : 00000000`00000001 fffff801`d812a3de 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0 fffff801`d9b1a900 fffff801`d820e68e : ffffe000`6e252d18 fffff801`a6ce2ff0 ffffe000`00000001 00000000`00000002 : nt!KiRaiseSecurityCheckFailure+0xf4 fffff801`d9b1aa90 fffff801`d80e0de7 : ffffffff`ff676980 00000000`00000001 ffffffff`fffe7960 ffffe000`00000002 : nt! ?? ::FNODOBFM::`string'+0x231de fffff801`d9b1aaf0 fffff801`d81deaea : fffff801`d836d180 fffff801`d836d180 fffff801`d83d4a00 ffffe000`73773880 : nt!KiRetireDpcList+0xac7 fffff801`d9b1ada0 00000000`00000000 : fffff801`d9b1b000 fffff801`d9b15000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a STACK_COMMAND: kb FOLLOWUP_IP: nt!KiFastFailDispatch+d0 fffff801`d81e6e10 c644242000 mov byte ptr [rsp+20h],0 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiFastFailDispatch+d0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 5318053f FAILURE_BUCKET_ID: X64_0x139_nt!KiFastFailDispatch+d0 BUCKET_ID: X64_0x139_nt!KiFastFailDispatch+d0 Followup: MachineOwner