5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd00023f573a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd00023f572f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x139
PROCESS_NAME: igfxext.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80261f5ede9 to fffff80261f532a0
STACK_TEXT:
ffffd000`23f57078 fffff802`61f5ede9 : 00000000`00000139 00000000`00000003 ffffd000`23f573a0 ffffd000`23f572f8 : nt!KeBugCheckEx
ffffd000`23f57080 fffff802`61f5f110 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`23f571c0 fffff802`61f5e334 : ffffc000`4d85ff70 ffffe001`2d264398 ffffc000`4d85ff70 00000000`00000090 : nt!KiFastFailDispatch+0xd0
ffffd000`23f573a0 fffff802`61f68df1 : 00000000`00000004 ffffc000`4da217a0 ffffe001`2cd37610 ffffc000`4da217d0 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`23f57530 fffff802`6219dab5 : ffffc000`4da217d0 ffffe001`2cd37610 ffffc000`4da217a0 00000000`00000009 : nt! ?? ::FNODOBFM::`string'+0x5631
ffffd000`23f57560 fffff802`621a832c : 00000000`00000000 ffffc000`4da217d0 ffffe001`2cd37610 00000000`00000000 : nt!SepTokenDeleteMethod+0xe1
ffffd000`23f57590 fffff802`61e766cf : 00000000`00000000 ffffd000`23f576b0 ffffc000`4da217d0 ffffe001`36531080 : nt!ObpRemoveObjectRoutine+0x64
ffffd000`23f575f0 fffff802`6219cc4d : ffffe001`32538080 ffffe001`36531368 ffffd000`23f576b0 ffffe001`36531080 : nt!ObfDereferenceObject+0x8f
ffffd000`23f57630 fffff802`621a832c : 00000000`00000000 00000000`00000000 ffffe001`2cd3c230 ffffe001`36531050 : nt!PspProcessDelete+0x219
ffffd000`23f576e0 fffff802`61e787ff : 00000000`00000000 00000000`0000014c ffffe001`36531080 ffffe001`36531080 : nt!ObpRemoveObjectRoutine+0x64
ffffd000`23f57740 fffff801`130bde18 : ffffe001`349b7510 00000000`00000bd0 00000000`00000002 ffffe001`349b7510 : nt!ObfDereferenceObjectWithTag+0x8f
ffffd000`23f57780 ffffe001`349b7510 : 00000000`00000bd0 00000000`00000002 ffffe001`349b7510 fffff801`13140d90 : mfehidk+0x37e18
ffffd000`23f57788 00000000`00000bd0 : 00000000`00000002 ffffe001`349b7510 fffff801`13140d90 fffff801`130bef75 : 0xffffe001`349b7510
ffffd000`23f57790 00000000`00000002 : ffffe001`349b7510 fffff801`13140d90 fffff801`130bef75 00000000`0000014c : 0xbd0
ffffd000`23f57798 ffffe001`349b7510 : fffff801`13140d90 fffff801`130bef75 00000000`0000014c 00000000`00000bd0 : 0x2
ffffd000`23f577a0 fffff801`13140d90 : fffff801`130bef75 00000000`0000014c 00000000`00000bd0 ffffe001`349b7510 : 0xffffe001`349b7510
ffffd000`23f577a8 fffff801`130bef75 : 00000000`0000014c 00000000`00000bd0 ffffe001`349b7510 fffff801`13140d90 : mfehidk+0xbad90
ffffd000`23f577b0 00000000`0000014c : 00000000`00000bd0 ffffe001`349b7510 fffff801`13140d90 ffffd000`23f57810 : mfehidk+0x38f75
ffffd000`23f577b8 00000000`00000bd0 : ffffe001`349b7510 fffff801`13140d90 ffffd000`23f57810 00000000`00000000 : 0x14c
ffffd000`23f577c0 ffffe001`349b7510 : fffff801`13140d90 ffffd000`23f57810 00000000`00000000 00000000`00000000 : 0xbd0
ffffd000`23f577c8 fffff801`13140d90 : ffffd000`23f57810 00000000`00000000 00000000`00000000 fffff801`13140d90 : 0xffffe001`349b7510
ffffd000`23f577d0 ffffd000`23f57810 : 00000000`00000000 00000000`00000000 fffff801`13140d90 00000000`00000001 : mfehidk+0xbad90
ffffd000`23f577d8 00000000`00000000 : 00000000`00000000 fffff801`13140d90 00000000`00000001 ffffe001`355b38c0 : 0xffffd000`23f57810
STACK_COMMAND: kb
FOLLOWUP_IP:
mfehidk+37e18
fffff801`130bde18 ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: mfehidk+37e18
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mfehidk
IMAGE_NAME: mfehidk.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 558ddbf8
FAILURE_BUCKET_ID: 0x139_VRF_3_mfehidk+37e18
BUCKET_ID: 0x139_VRF_3_mfehidk+37e18
Followup: MachineOwner
---------