KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffd28eb5803810, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd28eb5803768, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 AORUS ELITE
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F4
BIOS_DATE: 01/08/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 AORUS ELITE
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 2
BUGCHECK_P2: ffffd28eb5803810
BUGCHECK_P3: ffffd28eb5803768
BUGCHECK_P4: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
EXCEPTION_RECORD: fffff47a3d1e8000 -- (.exr 0xfffff47a3d1e8000)
ExceptionAddress: 0000000000000000
ExceptionCode: b212e867
ExceptionFlags: 0a000000
NumberParameters: 0
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: Origin.exe
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: CODE_CORRUPTION
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-17-2020 20:53:56.0693
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff806777d32e9 to fffff806777c14e0
STACK_TEXT:
ffffd28e`b58034e8 fffff806`777d32e9 : 00000000`00000139 00000000`00000002 ffffd28e`b5803810 ffffd28e`b5803768 : nt!KeBugCheckEx
ffffd28e`b58034f0 fffff806`777d3710 : 00000000`00000000 ffff818f`30547ab8 ffffd28e`b5803699 fffff806`7760b063 : nt!KiBugCheckDispatch+0x69
ffffd28e`b5803630 fffff806`777d1aa5 : ffff818f`2d00fdf0 ffff818f`2d00fe10 00000000`00000000 fffff806`776fd155 : nt!KiFastFailDispatch+0xd0
ffffd28e`b5803810 ffffc220`d471d495 : ffffc220`d471f1b2 00000000`00000000 ffffd28e`b5803f90 ffffd28e`b5803a80 : nt!KiRaiseSecurityCheckFailure+0x325
ffffd28e`b58039a8 ffffc220`d471f1b2 : 00000000`00000000 ffffd28e`b5803f90 ffffd28e`b5803a80 ffffc220`d4688cd2 : win32kbase!_report_gsfailure+0x5
ffffd28e`b58039b0 ffffc220`d471f147 : ffffd28e`b5803f80 fffff806`776c5e34 ffffd28e`b5804060 00000001`00000002 : win32kbase!_GSHandlerCheckCommon+0x5a
ffffd28e`b58039e0 fffff806`777ca312 : ffffc220`d487a000 ffffc220`d4660000 00018204`002a5000 00000000`00000000 : win32kbase!_GSHandlerCheck+0x13
ffffd28e`b5803a10 fffff806`776c2fa5 : 00000000`00000000 00000000`00000000 ffffd28e`b5803f80 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffd28e`b5803a40 fffff806`776c753e : ffffd28e`b5804978 ffffd28e`b58046c0 ffffd28e`b5804978 00000000`00000001 : nt!RtlDispatchException+0x4a5
ffffd28e`b5804190 fffff806`777d341d : fffff47a`3d1e8000 ffffd28e`b5804a20 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffd28e`b5804840 fffff806`777cf605 : c0011020`06300056 00000000`00000400 00000000`00000001 ffff818f`28897040 : nt!KiExceptionDispatch+0x11d
ffffd28e`b5804a20 fffff806`77c1fc64 : 00000000`00000000 ffffd28e`b5805080 fffff806`7763f110 ffff818f`35c933a0 : nt!KiPageFault+0x445
ffffd28e`b5804bb8 ffffc220`d335ed12 : ffff818f`37a3bdf0 00000000`00000000 ffffc233`847388e0 ffff818f`36fab080 : nt!ObWaitForMultipleObjects+0xc4
ffffd28e`b58050b8 00000000`00000000 : 00000000`53084889 00000000`00000000 00000000`00001cff ffff818f`00000002 : win32kfull!xxxMsgWaitForMultipleObjectsEx+0xde
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
ffffc220d335ec40 - win32kfull!xxxMsgWaitForMultipleObjectsEx+c
[ 89:81 ]
1 error : !win32kfull (ffffc220d335ec40)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_ONE_BIT
TARGET_TIME: 2020-01-17T16:11:54.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 247f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_one_bit
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------