Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\051119-11718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17134 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff801
2f68d000 PsLoadedModuleList = 0xfffff801
2fa3a2b0
Debug session time: Sat May 11 12:02:57.789 2019 (UTC - 4:00)
System Uptime: 0 days 2:32:11.612
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.......
***
***
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, fffffd8ce56e5c30, fffffd8ce56e5b88, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
***
***
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffd8ce56e5c30, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd8ce56e5b88, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.17134.706 (WinBuild.160101.0800)
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P1.20
BIOS_DATE: 07/11/2013
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: 970 Pro3 R2.0
BASEBOARD_VERSION:
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: 3
BUGCHECK_P2: fffffd8ce56e5c30
BUGCHECK_P3: fffffd8ce56e5b88
BUGCHECK_P4: 0
TRAP_FRAME: fffffd8ce56e5c30 -- (.trap 0xfffffd8ce56e5c30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd488775c0d30 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000080000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012f6be13e rsp=fffffd8ce56e5dc0 rbp=ffffd488775c0c60
r8=ffffd488775bf9b0 r9=ffffd488775c0c60 r10=fffff8012e3c4180
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!MiRemoveUnusedSubsection+0x82:
fffff801
2f6be13e cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffd8ce56e5b88 -- (.exr 0xfffffd8ce56e5b88)
ExceptionAddress: fffff8012f6be13e (nt!MiRemoveUnusedSubsection+0x0000000000000082)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 6
CPU_MHZ: da5
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: KRYPTON
ANALYSIS_SESSION_TIME: 05-11-2019 20:30:29.0666
ANALYSIS_VERSION: 10.0.14321.1024 x86fre
LAST_CONTROL_TRANSFER: from fffff8012f847c69 to fffff8012f8370a0
STACK_TEXT:
fffffd8c
e56e5908 fffff801
2f847c69 : 00000000
00000139 00000000
00000003 fffffd8c
e56e5c30 fffffd8c
e56e5b88 : nt!KeBugCheckEx
fffffd8c
e56e5910 fffff801
2f848010 : 00000000
00010011 fffff801
00000000 fffffcc7
84529508 00000000
00000000 : nt!KiBugCheckDispatch+0x69
fffffd8c
e56e5a50 fffff801
2f84661f : ffff8f08
a52a0990 fffff801
c48f7771 ffffb10b
721b49e8 ffffd488
7a990918 : nt!KiFastFailDispatch+0xd0
fffffd8c
e56e5c30 fffff801
2f6be13e : ffff8f08
9ddfb180 fffffd8c
00000000 fffffd8c
e56e5f60 fffff801
c48f6eff : nt!KiRaiseSecurityCheckFailure+0x2df
fffffd8c
e56e5dc0 fffff801
2f6bf5fd : ffffd488
775c0ce0 00000000
0ecbb000 fffffd8c
e56e6010 ffffd488
00000008 : nt!MiRemoveUnusedSubsection+0x82
fffffd8c
e56e5df0 fffff801
2f6bf3c9 : ffffd488
775c0c60 00000000
00000000 ffffd488
775c0ce0 ffffd488
775c0ce0 : nt!MiReferenceSubsection+0x75
fffffd8c
e56e5e20 fffff801
2f6b9ab6 : fffffd8c
e56e5f30 fffffd8c
e56e5f00 00000000
00000000 00000000
00000000 : nt!MiComputeDataFlushRange+0xd9
fffffd8c
e56e5e70 fffff801
2f6b9932 : fffffd8c
e56e6198 00000000
00000000 ffff8f08
9ddfb1b0 ffffd488
7a990918 : nt!MiComputeFlushRange+0x56
fffffd8c
e56e5ec0 fffff801
2f6b79c1 : 00000000
00000000 00000000
00000001 00000000
00000000 00000000
00000000 : nt!MmFlushSection+0x52
fffffd8c
e56e5f70 fffff801
2f7a82c4 : ffffd488
775c21c8 00000000
00000000 ffffd488
00000000 00000000
00000000 : nt!CcFlushCachePriv+0x651
fffffd8c
e56e60c0 fffff801
c482b95a : ffffb10b
721b4b30 fffffd8c
e56e6700 ffffb10b
721b4901 ffffd488
7a990918 : nt!CcCoherencyFlushAndPurgeCache+0x64
fffffd8c
e56e6110 fffff801
c48eadcb : ffffb10b
721b4b30 fffffd8c
e56e6340 00000000
00000000 ffffd488
7a990918 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x2e
fffffd8c
e56e6150 fffff801
c4822395 : ffffd488
7a990918 ffffb10b
721b4b30 ffffd488
7a990918 ffffb10b
721b49e0 : Ntfs!NtfsFlushUserStream+0x93
fffffd8c
e56e61e0 fffff801
c48d429c : ffffd488
7a990918 ffffd488
72e69180 ffffb10b
721b49e0 fffffd8c
e56e6340 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x295
fffffd8c
e56e6310 fffff801
c4846889 : 00000000
c0000000 ffffd488
7bed3510 00000000
c0000000 ffffd488
7bed3510 : Ntfs!NtfsFlushVolume+0x270
fffffd8c
e56e6430 fffff801
c4836f4e : ffffd488
7a990918 ffffd488
7bed3510 ffffd488
73b51a70 00000000
00000001 : Ntfs!NtfsVolumeDasdIo+0x1d9
fffffd8c
e56e64e0 fffff801
c4836378 : ffffd488
7a990918 ffffd488
7bed3510 00000000
00000000 00000000
11000000 : Ntfs!NtfsCommonRead+0x9de
fffffd8c
e56e66d0 fffff801
2f725e69 : ffffd488
7c031b70 ffffd488
7bed3510 ffffd488
7bed3510 ffffd488
73b34a90 : Ntfs!NtfsFsdRead+0x1d8
fffffd8c
e56e6790 fffff801
c3b27207 : fffffd8c
e56e6860 fffff801
c3b253b4 00000000
00000000 00000000
00000003 : nt!IofCallDriver+0x59
fffffd8c
e56e67d0 fffff801
c3b251c6 : fffffd8c
e56e6860 ffffd488
7bb69520 fffffd8c
e56e68c0 fffff801
00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x157
fffffd8c
e56e6840 fffff801
2f725e69 : ffffd488
7bed3510 fffff801
2f726135 00000000
00000000 00000000
00000000 : FLTMGR!FltpDispatch+0xb6
fffffd8c
e56e68a0 fffff801
2fb88fab : fffffd8c
e56e6b80 ffffd488
7bb69520 00000000
00000000 0000001f
5cffc6c8 : nt!IofCallDriver+0x59
fffffd8c
e56e68e0 fffff801
2fb9fe62 : ffffd488
00000000 ffffd488
7bb69520 00000000
00000000 fffffd8c
e56e6b80 : nt!IopSynchronousServiceTail+0x1ab
fffffd8c
e56e6990 fffff801
2f847743 : 00000000
000009ec 00000000
00000000 00000000
00000000 00000000
00000000 : nt!NtReadFile+0x692
fffffd8c
e56e6a90 00007fff
4eb5aa64 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x13
0000001f
5cffc6a8 00000000
00000000 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : 0x00007fff
4eb5aa64
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: b5fc35a7b686d5f327c4dc842be431e4dc21ea06
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 96593989a6b98a8ba5be5fafc2ce53e8d205f248
THREAD_SHA1_HASH_MOD: 3e3752b3f59a10eecc1775417bc92a4429ad7723
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff801
2f848010 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5ca31432
IMAGE_VERSION: 10.0.17134.706
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_nt!KiFastFailDispatch
TARGET_TIME: 2019-05-11T16:02:57.000Z
OSBUILD: 17134
OSSERVICEPACK: 706
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-04-02 03:50:10
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.17134.706
ANALYSIS_SESSION_ELAPSED_TIME: b84
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_nt!kifastfaildispatch
FAILURE_ID_HASH: {36173680-6f08-995f-065a-3d368c996911}
[/spoiler]
Second to last.
[spoiler]
Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\051119-9265-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 17134 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff802
4909f000 PsLoadedModuleList = 0xfffff802
4944c2b0
Debug session time: Sat May 11 16:45:21.247 2019 (UTC - 4:00)
System Uptime: 0 days 0:08:27.071
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
[LIST]
[*]*
[*]Bugcheck Analysis *
[*]*
[/LIST]
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffff948d5ae7ce30, ffff948d5ae7cd88, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiFastFailDispatch+d0 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
[LIST]
[*]*
[*]Bugcheck Analysis *
[*]*
[/LIST]
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff948d5ae7ce30, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff948d5ae7cd88, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.17134.706 (WinBuild.160101.0800)
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P1.20
BIOS_DATE: 07/11/2013
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: 970 Pro3 R2.0
BASEBOARD_VERSION:
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: 3
BUGCHECK_P2: ffff948d5ae7ce30
BUGCHECK_P3: ffff948d5ae7cd88
BUGCHECK_P4: 0
TRAP_FRAME: ffff948d5ae7ce30 -- (.trap 0xffff948d5ae7ce30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcd8936085f28 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcd8936085f88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802490d6efc rsp=ffff948d5ae7cfc0 rbp=ffff948d5ae7d0c0
r8=ffff948d5ae7cfc8 r9=0000000000000000 r10=0000000000000fff
r11=0000000000000050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiDeleteVad+0x18dc:
fffff802
490d6efc cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff948d5ae7cd88 -- (.exr 0xffff948d5ae7cd88)
ExceptionAddress: fffff802490d6efc (nt!MiDeleteVad+0x00000000000018dc)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 6
CPU_MHZ: da5
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: ShellExperienc
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: KRYPTON
ANALYSIS_SESSION_TIME: 05-11-2019 20:25:57.0355
ANALYSIS_VERSION: 10.0.14321.1024 x86fre
LAST_CONTROL_TRANSFER: from fffff80249259c69 to fffff802492490a0
STACK_TEXT:
ffff948d
5ae7cb08 fffff802
49259c69 : 00000000
00000139 00000000
00000003 ffff948d
5ae7ce30 ffff948d
5ae7cd88 : nt!KeBugCheckEx
ffff948d
5ae7cb10 fffff802
4925a010 : 0a000006
07f4e867 00000000
00000000 00000000
00000010 ffffcd89
35a1f880 : nt!KiBugCheckDispatch+0x69
ffff948d
5ae7cc50 fffff802
4925861f : ffff8080
bd2b9180 00000000
00000001 ffff948d
5ae7d1a0 00000000
00000030 : nt!KiFastFailDispatch+0xd0
ffff948d
5ae7ce30 fffff802
490d6efc : 00000000
00000008 00000000
00000000 ffffcd89
00000002 ffffcd89
36085f20 : nt!KiRaiseSecurityCheckFailure+0x2df
ffff948d
5ae7cfc0 fffff802
4955b223 : ffffcd89
00000000 ffffcd89
35b5b080 ffffcd89
36c422f0 00000000
00000000 : nt!MiDeleteVad+0x18dc
ffff948d
5ae7d2f0 fffff802
49558ef0 : ffffcd89
36c422f0 00000000
00000000 000001a5
ef5d0000 00000000
00000000 : nt!MiUnmapVad+0xa7
ffff948d
5ae7d320 fffff802
495e6d47 : ffffad0a
00000000 ffffad0a
50e21c70 ffffad0a
50e21c70 ffffad0a
50e21c70 : nt!MiUnmapViewOfSection+0x120
ffff948d
5ae7d400 fffff802
49580289 : ffffad0a
50e21c60 ffffad0a
50e21c70 ffffad0a
50e21c70 ffffcd89
353cd1c0 : nt!AlpcViewDestroyProcedure+0xe7
ffff948d
5ae7d470 fffff802
495e7cc0 : ffffcd89
353cd1c0 ffffcd89
353cd1b8 ffffcd89
353cd1c0 ffffcd89
353cd1c0 : nt!AlpcpDereferenceBlobEx+0x59
ffff948d
5ae7d4b0 fffff802
495e7b5f : ffffffff
ffffffff 00000000
00000001 ffffcd89
353cd1d0 ffffcd89
353cd1d0 : nt!AlpcpFlushResourcesPort+0xd8
ffff948d
5ae7d4e0 fffff802
495e7a9a : ffffcd89
353cd070 ffffcd89
30f545d0 ffffcd89
353cd040 00000000
00000001 : nt!AlpcpDoPortCleanup+0x97
ffff948d
5ae7d520 fffff802
49592562 : ffffcd89
30f545d0 ffffcd89
00000000 ffffcd89
00000000 ffffcd89
353cd040 : nt!AlpcpClosePort+0x4a
ffff948d
5ae7d550 fffff802
496251c5 : 00000000
01418abc ffffcd89
33f8b0c0 00000000
00000001 00000000
00000080 : nt!ObCloseHandleTableEntry+0x212
ffff948d
5ae7d690 fffff802
495f18a9 : 00000000
00000000 00000000
00000001 ffffcd89
35a1f678 ffffffff
ffffff01 : nt!ExSweepHandleTable+0xc5
ffff948d
5ae7d740 fffff802
49545341 : ffffffff
ffffffff ffffcd89
35a1f380 ffffffff
00000000 ffffcd89
00000000 : nt!ObKillProcess+0x35
ffff948d
5ae7d770 fffff802
49553d9c : ffffcd89
35a1f380 ffffad0a
4d317060 ffff948d
5ae7d988 00000000
00000000 : nt!PspRundownSingleProcess+0x121
ffff948d
5ae7d7f0 fffff802
49638813 : ffffcd89
00000001 fffff802
49132c01 0000005f
6d877000 ffffffff
ffffffff : nt!PspExitThread+0x5ac
ffff948d
5ae7d8f0 fffff802
49139370 : ffffcd89
33d02398 ffffffff
00000006 ffffcd89
33571000 ffffad0a
4d4af600 : nt!KiSchedulerApcTerminate+0x33
ffff948d
5ae7d930 fffff802
4924d150 : 00000000
00000000 ffff948d
5ae7d9c0 97e3d71b
de381700 00000000
00000000 : nt!KiDeliverApc+0x3a0
ffff948d
5ae7d9c0 fffff802
492597ea : ffffcd89
35b5b080 00000000
00000000 00000000
00000000 000001a5
e4c82910 : nt!KiInitiateUserApc+0x70
ffff948d
5ae7db00 00007ffd
40685b24 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : nt!KiSystemServiceExit+0x9f
0000005f
6eaff9b8 00000000
00000000 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : 0x00007ffd
40685b24
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 77cfa9fd5e60f3f23ccda67a4477190eb5a21268
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ca913a6dfe881375866a2114d6afb46a4a321b0a
THREAD_SHA1_HASH_MOD: 7c2b727fe0ab8515945a4d96a0f6fa917ccf2d6e
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff802
4925a010 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5ca31432
IMAGE_VERSION: 10.0.17134.706
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_nt!KiFastFailDispatch
TARGET_TIME: 2019-05-11T20:45:21.000Z
OSBUILD: 17134
OSSERVICEPACK: 706
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-04-02 03:50:10
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.17134.706
ANALYSIS_SESSION_ELAPSED_TIME: a7e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_nt!kifastfaildispatch
FAILURE_ID_HASH: {36173680-6f08-995f-065a-3d368c996911}