KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffc780873fb4f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc780873fb448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd.
SYSTEM_PRODUCT_NAME: MS-7C52
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 3.50
BIOS_DATE: 04/20/2020
BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd.
BASEBOARD_PRODUCT: B450M-A PRO MAX (MS-7C52)
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 4
BUGCHECK_P2: ffffc780873fb4f0
BUGCHECK_P3: ffffc780873fb448
BUGCHECK_P4: 0
TRAP_FRAME: accb2b18a08b2b1c -- (.trap 0xaccb2b18a08b2b1c)
Unable to read trap frame at accb2b18`a08b2b1c
EXCEPTION_RECORD: 10f407361cb40732 -- (.exr 0x10f407361cb40732)
Cannot read Exception record @ 10f407361cb40732
CPU_COUNT: 6
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-11-2020 00:01:41.0051
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffffc780873fb1c8
LAST_CONTROL_TRANSFER: from fffff800519d41e9 to fffff800519c23a0
STACK_TEXT:
ffffc780`873fb1c8 fffff800`519d41e9 : 00000000`00000139 00000000`00000004 ffffc780`873fb4f0 ffffc780`873fb448 : nt!KeBugCheckEx
ffffc780`873fb1d0 fffff800`519d4610 : 6ee31cab`62a31caf 55d38e0b`59938e0f cadc30c5`c69c30c1 f1eca265`fdaca261 : nt!KiBugCheckDispatch+0x69
ffffc780`873fb310 fffff800`519d29a3 : 32b0b352`3ef0b356 098021f2`05c021f6 b42d9dfd`b86d9df9 8f1d0f5d`835d0f59 : nt!KiFastFailDispatch+0xd0
ffffc780`873fb4f0 fffff800`51a49ba1 : ffffc780`873fb930 ffffc780`87a83df8 00000001`00000010 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc780`873fb680 fffff800`51889471 : ffffc780`873fb930 ffffc780`87a83df8 000004e8`fffffb30 000004d0`00000003 : nt!RtlpGetStackLimitsEx+0x135ac5
ffffc780`873fb6b0 fffff800`5188ddee : ffffc780`87a83df8 ffffc780`873fbe30 ffffc780`87a83df8 ffffab09`6b80da20 : nt!RtlDispatchException+0xc1
ffffc780`873fb900 fffff800`519c3212 : 10f40736`1cb40732 2bc49596`27849592 accb2b18`a08b2b1c 97fbb9b8`9bbbb9bc : nt!KiDispatchException+0x16e
ffffc780`873fbfb0 fffff800`519c31e0 : fffff800`519d4316 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffc780`87a83cb8 fffff800`519d4316 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffc780`87a83cc0 fffff800`519ce8a9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
ffffc780`87a83ea0 fffff800`519ced90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x329
ffffc780`87a84030 fffff800`5190c1c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x10
00000000`6b80d728 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiCheckFatalAccessViolation+0x18
THREAD_SHA1_HASH_MOD_FUNC: df95c3a02fbdf7335374ddde4aeb093ac830e7d3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 15a4a12b8c1972009e9120ed197029bf35ba82c6
THREAD_SHA1_HASH_MOD: fe34192f63d13620a8987d294372ee74d699cfee
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff800`519d4610 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ff75719
IMAGE_VERSION: 10.0.18362.900
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
TARGET_TIME: 2020-06-10T17:02:35.000Z
OSBUILD: 18362
OSSERVICEPACK: 900
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2012-07-07 00:22:33
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1dbf
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------