KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: fffff805777e6d40, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff805777e6c98, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: 2
BUGCHECK_P2: fffff805777e6d40
BUGCHECK_P3: fffff805777e6c98
BUGCHECK_P4: 0
TRAP_FRAME: fffff805777e6d40 -- (.trap 0xfffff805777e6d40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000103 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8058cbb4de5 rsp=fffff805777e6ed8 rbp=ffff9c0a787ceebc
r8=0000000000000001 r9=0000000000000000 r10=fffff805742484f0
r11=0000000000000058 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
fffff805`8cbb4de5 ?? ???
Resetting default scope
EXCEPTION_RECORD: fffff805777e6c98 -- (.exr 0xfffff805777e6c98)
ExceptionAddress: fffff8058cbb4de5
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CPU_COUNT: 4
CPU_MHZ: 95a
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-GULEPCP
ANALYSIS_SESSION_TIME: 05-02-2020 14:20:49.0389
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff805743d32e9 to fffff805743c14e0
STACK_TEXT:
fffff805`777e6ed8 fffff805`8cbb1a27 : 00000000`00000000 ffff9c0a`787ceebc 00000000`00000000 fffff805`00000000 : 0xfffff805`8cbb4de5
fffff805`777e6ee0 00000000`00000000 : ffff9c0a`787ceebc 00000000`00000000 fffff805`00000000 ffff9c0a`00000020 : 0xfffff805`8cbb1a27
STACK_COMMAND: .trap 0xfffff805777e6d40 ; kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST_0x139
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_0x139
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_0x139
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x139
TARGET_TIME: 2020-05-01T03:44:42.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: 62
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_0x139
FAILURE_ID_HASH: {bec1bc00-1c8a-a417-55b2-9f8b67cbb1c5}
Followup: MachineOwner