KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffc3003eb9dff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc3003eb9df48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffffc3003eb9dff0
BUGCHECK_P3: ffffc3003eb9df48
BUGCHECK_P4: 0
TRAP_FRAME: ffffc3003eb9dff0 -- (.trap 0xffffc3003eb9dff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe8e27d04000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffffe8e27d0a000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075744e2d3 rsp=ffffc3003eb9e180 rbp=ffffc3003eb9e6f0
r8=fffffe8e27d0a000 r9=ffffc3003eb9e701 r10=ffffd989c7252080
r11=000000007aeab6a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x12e557:
fffff807`5744e2d3 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc3003eb9df48 -- (.exr 0xffffc3003eb9df48)
ExceptionAddress: fffff8075744e2d3 (nt!RtlpGetStackLimitsEx+0x000000000012e557)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vegas170.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffc3003eb9dcc8
STACK_TEXT:
ffffc300`3eb9dcc8 fffff807`573d1ae9 : 00000000`00000139 00000000`00000004 ffffc300`3eb9dff0 ffffc300`3eb9df48 : nt!KeBugCheckEx
ffffc300`3eb9dcd0 fffff807`573d1f10 : 00000080`00000030 00090000`00000000 00010018`00000064 00010000`00000eda : nt!KiBugCheckDispatch+0x69
ffffc300`3eb9de10 fffff807`573d02a5 : fffff807`57326958 fffff807`5760d024 ffffc300`3eb9e7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc300`3eb9dff0 fffff807`5744e2d3 : 00000000`00000000 00000000`000002f5 0005e4a0`00ab5000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x325
ffffc300`3eb9e180 fffff807`5742db82 : fffffe8e`27d098c8 00000000`00000000 ffffc300`3eb9e6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x12e557
ffffc300`3eb9e1b0 fffff807`572c738e : fffffe8e`27d098c8 ffffc300`3eb9ee30 fffffe8e`27d098c8 00000000`00090fb0 : nt!RtlDispatchException+0x16b232
ffffc300`3eb9e900 fffff807`573c0b42 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffc300`3eb9efb0 fffff807`573c0b10 : fffff807`573d1c16 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffe8e`27d09788 fffff807`573d1c16 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffe8e`27d09790 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.295
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80625045d5d, Address of the instruction which caused the bugcheck
Arg3: ffffa58e24de1af0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 22
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80625045d5d
BUGCHECK_P3: ffffa58e24de1af0
BUGCHECK_P4: 0
CONTEXT: ffffa58e24de1af0 -- (.cxr 0xffffa58e24de1af0)
rax=0000000000001de0 rbx=fffbdf0832a00000 rcx=ffffc78035a30858
rdx=0000000000000020 rsi=ffffdf084d9d0700 rdi=ffffdf084d9d06f0
rip=fffff80625045d5d rsp=ffffa58e24de24e0 rbp=0000000064536553
r8=0000000000000030 r9=ffffc78035a00000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000ddd r13=0000000000000001
r14=0000000000000070 r15=0000000000000003
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExFreeHeapPool+0x21d:
fffff806`25045d5d 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:fffbdf08`32a00028=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffa58e`24de24e0 fffff806`2536e0a9 : 00000000`00000000 ffffdf08`65daa2d0 ffffa58e`24de2770 01000000`00100000 : nt!ExFreeHeapPool+0x21d
ffffa58e`24de2600 fffff806`255c9dde : ffff8006`00000054 ffffa58e`24de2660 00000000`00000010 00000000`00000054 : nt!ExFreePool+0x9
ffffa58e`24de2630 fffff806`255db4dd : ffff8006`87c16ce0 ffffa58e`24de2770 ffffa58e`24de2770 00000000`00000000 : nt!SeDefaultObjectMethod+0x5e
ffffa58e`24de2690 fffff806`255d8e2a : 00000000`08000000 00000000`00000001 00000000`00000001 00000000`08000000 : nt!ObInsertObjectEx+0x37d
ffffa58e`24de2940 fffff806`255d8b30 : 0000001d`859fef80 00000000`000f0007 0000001d`859fef98 ffff8006`80b31400 : nt!MiCreateSectionCommon+0x28a
ffffa58e`24de2a20 fffff806`251d2918 : ffff8006`851ed080 0000001d`859ff7d8 ffffa58e`24de2aa8 0000018a`d4c6ebb0 : nt!NtCreateSection+0x60
ffffa58e`24de2a90 00007ffc`fa35ca14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001d`859fef28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`fa35ca14
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.18362.329
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xffffa58e24de1af0 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ff9b4d7c9c0
Arg3: 000000000000001d
Arg4: ffffc68c06325b00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 7ff9b4d7c9c0
BUGCHECK_P3: 1d
BUGCHECK_P4: ffffc68c06325b00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
STACK_TEXT:
ffffc68c`06325958 fffff805`2da0ce62 : 00000000`0000001a 00000000`00061941 00007ff9`b4d7c9c0 00000000`0000001d : nt!KeBugCheckEx
ffffc68c`06325960 fffff805`2d9cf120 : 000001ec`00000000 ffffc68c`00000001 000001ec`5a2d7580 ffffc68c`06325b80 : nt!MmAccessFault+0x19a0f2
ffffc68c`06325b00 00007ff9`b4d7c9c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000071`56efe908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b4d7c9c0
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5deef4f7-7ffd-da2a-fbcb-ad563ba13c90}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa48f326e27c8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80125a9e79e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 6
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa48f326e27c8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80125a9e79e
BUGCHECK_P4: 2
READ_ADDRESS: fffff801257723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801256293b8: Unable to get Flags value from nt!KdVersionBlock
fffff801256293b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa48f326e27c8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Steam.exe
TRAP_FRAME: ffff9d8da4fc2630 -- (.trap 0xffff9d8da4fc2630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffa48f326e27 rbx=0000000000000000 rcx=0000000000000027
rdx=ffffa48f326e27e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80125a9e79e rsp=ffff9d8da4fc27c8 rbp=ffffcf87b607c640
r8=0000000000000000 r9=ffffa48f326e27b0 r10=0000000000131900
r11=ffff9d8da4fc2810 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei pl nz na po cy
nt!ObpCaptureHandleInformation+0x8e:
fffff801`25a9e79e 410fb64118 movzx eax,byte ptr [r9+18h] ds:ffffa48f`326e27c8=??
Resetting default scope
STACK_TEXT:
ffff9d8d`a4fc2388 fffff801`253e31d6 : 00000000`00000050 ffffa48f`326e27c8 00000000`00000000 ffff9d8d`a4fc2630 : nt!KeBugCheckEx
ffff9d8d`a4fc2390 fffff801`252730bf : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa48f`326e27c8 : nt!MiSystemFault+0x1d64a6
ffff9d8d`a4fc2490 fffff801`253cf120 : 00000000`00000120 ffff9d8d`a4fc26b0 ffffba81`e7800050 00000000`00000000 : nt!MmAccessFault+0x34f
ffff9d8d`a4fc2630 fffff801`25a9e79e : fffff801`25b0bd49 00000000`00001e34 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffff9d8d`a4fc27c8 fffff801`25b0bd49 : 00000000`00001e34 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x8e
ffff9d8d`a4fc27d0 fffff801`25b095d5 : fffff801`25a9e710 ffffcf87`b607c658 ffff9d8d`0017fffc 00000000`0017fffc : nt!ExpSnapShotHandleTables+0x131
ffff9d8d`a4fc2860 fffff801`259a6bf8 : 00000000`11d9c050 ffffa48d`00020000 00000800`00131900 ffffba81`e7800050 : nt!ExpGetHandleInformation+0x71
ffff9d8d`a4fc28b0 fffff801`257e019b : 00000000`00180010 00000000`00000000 00000000`00000002 00000000`0000c000 : nt!ExpQuerySystemInformation+0x1c6938
ffff9d8d`a4fc2ac0 fffff801`253d2918 : ffffa48d`3632b080 00000000`0a8afec4 00000000`00000001 ffff9d8d`a4fc2b80 : nt!NtQuerySystemInformation+0x2b
ffff9d8d`a4fc2b00 00007ffd`961dc794 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`041fdea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`961dc794
SYMBOL_NAME: nt!ObpCaptureHandleInformation+8e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8e
FAILURE_BUCKET_ID: AV_R_INVALID_nt!ObpCaptureHandleInformation
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ca33f0ed-ea4f-08da-9cd1-d248328d82af}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffa78019e464f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa78019e46448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffffa78019e464f0
BUGCHECK_P3: ffffa78019e46448
BUGCHECK_P4: 0
TRAP_FRAME: ffffa78019e464f0 -- (.trap 0xffffa78019e464f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8a8f816fd000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffff8a8f81703000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064be4ecc7 rsp=ffffa78019e46680 rbp=ffffa78019e466f0
r8=ffff8a8f81703000 r9=ffffa78019e46710 r10=ffffe6817242e080
r11=ffffa78019e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x12e6cb:
fffff806`4be4ecc7 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffa78019e46448 -- (.exr 0xffffa78019e46448)
ExceptionAddress: fffff8064be4ecc7 (nt!RtlpGetStackLimitsEx+0x000000000012e6cb)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffa78019e461c8
STACK_TEXT:
ffffa780`19e461c8 fffff806`4bdd2ee9 : 00000000`00000139 00000000`00000004 ffffa780`19e464f0 ffffa780`19e46448 : nt!KeBugCheckEx
ffffa780`19e461d0 fffff806`4bdd3310 : 00000001`ffffffff fffffff6`00000008 00020000`00060b51 00000000`00520068 : nt!KiBugCheckDispatch+0x69
ffffa780`19e46310 fffff806`4bdd16a5 : 00000000`00000000 ffffe681`65f8d080 00000000`00000000 00001f80`00dc02f5 : nt!KiFastFailDispatch+0xd0
ffffa780`19e464f0 fffff806`4be4ecc7 : ffffa780`19e46930 ffffa780`19dffdc8 00000001`00000010 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffa780`19e46680 fffff806`4bcc3171 : ffffa780`19e46930 ffffa780`19dffdc8 000004e8`fffffb30 000004d0`00000003 : nt!RtlpGetStackLimitsEx+0x12e6cb
ffffa780`19e466b0 fffff806`4bcc7aee : ffffa780`19dffdc8 ffffa780`19e46e30 ffffa780`19dffdc8 ffffa780`19d9c240 : nt!RtlDispatchException+0xc1
ffffa780`19e46900 fffff806`4bdc1f22 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffa780`19e46fb0 fffff806`4bdc1ef0 : fffff806`4bdd3016 00000000`3e3e0c90 00000070`00000030 00020000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa780`19dffc88 fffff806`4bdd3016 : 00000000`3e3e0c90 00000070`00000030 00020000`00000000 00010018`00000054 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa780`19dffc90 fffff806`4bdcd5ab : 00000000`7461632e 00000028`00000100 00030000`00180400 00000020`00000008 : nt!KiExceptionDispatch+0x116
ffffa780`19dffe70 fffff806`4bfc7e27 : 00000000`43636450 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffffa780`19e00000 00000000`43636450 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000005f0 : nt!_xmm+0x233e7
ffffa780`19e00008 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`000005f0 00000000`00000174 : 0x43636450
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.356
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------