APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffdd861c9c4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000010000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffffca857a35db80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 7ffdd861c9c4
BUGCHECK_P2: 0
BUGCHECK_P3: 10000
BUGCHECK_P4: ffffca857a35db80
FAULTING_IP:
+0
00007ffd`d861c9c4 ?? ???
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x1
PROCESS_NAME: nvcontainer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-02-2020 14:55:57.0863
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff80130bd33e9 to fffff80130bc1510
STACK_TEXT:
ffffca85`7a35d948 fffff801`30bd33e9 : 00000000`00000001 00007ffd`d861c9c4 00000000`00000000 00000000`00010000 : nt!KeBugCheckEx
ffffca85`7a35d950 fffff801`30bd3293 : ffffb58f`8acba080 000000de`892ff848 ffffca85`7a35daa8 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffca85`7a35da90 00007ffd`d861c9c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
000000de`892ff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d861c9c4
THREAD_SHA1_HASH_MOD_FUNC: 1b1fd012b2a510c586295e696f84a9476c8f91e5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a054393ae1713fef08345a54701ed3a92fa10c6
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiSystemServiceExitPico+1fe
fffff801`30bd3293 4883ec50 sub rsp,50h
FAULT_INSTR_CODE: 50ec8348
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_48_nt!KiSystemServiceExitPico
BUCKET_ID: 0x1_SysCallNum_48_nt!KiSystemServiceExitPico
PRIMARY_PROBLEM_CLASS: 0x1_SysCallNum_48_nt!KiSystemServiceExitPico
TARGET_TIME: 2020-02-21T00:49:04.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1f43
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1_syscallnum_48_nt!kisystemserviceexitpico
FAILURE_ID_HASH: {2384256b-c1e6-325c-03ac-4f8d902d84a9}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046bbee126, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8046bbee126
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff8046bf733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!PpmIdleExecuteTransition+1cc9b6
fffff804`6bbee126 488b8f885e0000 mov rcx,qword ptr [rdi+5E88h]
EXCEPTION_PARAMETER2: ffffffffffffffff
BUGCHECK_STR: 0x1E_c0000005_R
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-02-2020 14:56:00.0372
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffffc68060e5f138
LAST_CONTROL_TRANSFER: from fffff8046bca663e to fffff8046bbc1510
STACK_TEXT:
ffffc680`60e5f138 fffff804`6bca663e : 00000000`0000001e ffffffff`c0000005 fffff804`6bbee126 00000000`00000000 : nt!KeBugCheckEx
ffffc680`60e5f140 fffff804`6bbca342 : fffff804`6bf11000 fffff804`6ba00000 0005e530`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffffc680`60e5f180 fffff804`6bac2f15 : 00000000`00000000 00000000`00000000 ffffc680`60e5f6f0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffffc680`60e5f1b0 fffff804`6bac74ae : ffffd709`bdc295a8 ffffc680`60e5fe30 ffffd709`bdc295a8 00023129`8d15a531 : nt!RtlDispatchException+0x4a5
ffffc680`60e5f900 fffff804`6bbc2392 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffc680`60e5ffb0 fffff804`6bbc2360 : fffff804`6bbd3516 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffd709`bdc29468 fffff804`6bbd3516 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffdb85`01861780 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffd709`bdc29470 fffff804`6bbcf2a2 : ffffd709`bdc29620 00000000`00000002 ffffc680`60e00251 00000000`00000001 : nt!KiExceptionDispatch+0x116
ffffd709`bdc29650 fffff804`6bbee126 : 00023129`8d4c80fd ffffdb84`dad46050 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x322
ffffd709`bdc297e0 fffff804`6ba215ce : 00000000`00000003 00000000`00000002 ffffdb84`dad46140 00000000`00000008 : nt!PpmIdleExecuteTransition+0x1cc9b6
ffffd709`bdc29b00 fffff804`6bbc5018 : ffffffff`00000000 ffffc680`60e00180 ffffdb84`de6cd080 00000000`00000510 : nt!PoIdle+0x36e
ffffd709`bdc29c60 00000000`00000000 : ffffd709`bdc2a000 ffffd709`bdc24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: d1c8b62ac56777b94dd670b8cedced5e9921dc6c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 45e5b0d2d2b0d9fcf4487dc003d7a456ac6a4b19
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!PpmIdleExecuteTransition+1cc9b6
fffff804`6bbee126 488b8f885e0000 mov rcx,qword ptr [rdi+5E88h]
FAULT_INSTR_CODE: 888f8b48
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: nt!PpmIdleExecuteTransition+1cc9b6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1cc9b6
FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!PpmIdleExecuteTransition
BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!PpmIdleExecuteTransition
PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_STACKPTR_ERROR_nt!PpmIdleExecuteTransition
TARGET_TIME: 2020-02-25T04:51:54.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 15fa
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_stackptr_error_nt!ppmidleexecutetransition
FAILURE_ID_HASH: {5b703f80-dbb5-9eb1-190d-90f12b075adb}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: fffff50413f08ea0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff50413f08df8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.657 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2008
BIOS_DATE: 12/06/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450-PLUS
BASEBOARD_VERSION: Rev X.0x
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 2
BUGCHECK_P2: fffff50413f08ea0
BUGCHECK_P3: fffff50413f08df8
BUGCHECK_P4: 0
TRAP_FRAME: fffff50413f08ea0 -- (.trap 0xfffff50413f08ea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff0a284aa5010 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff0cbbfa6cfc5 rsp=fffff50413f09038 rbp=ffff9685e87887d0
r8=fffff50413f09010 r9=0000000000001cff r10=fffff80674838650
r11=fffff50413f08fd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
win32kbase!_report_gsfailure+0x5:
fffff0cb`bfa6cfc5 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff50413f08df8 -- (.exr 0xfffff50413f08df8)
ExceptionAddress: fffff0cbbfa6cfc5 (win32kbase!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: NVIDIA Share.e
CURRENT_IRQL: 0
DEFAULT_BUCKET_ID: FAIL_FAST_STACK_COOKIE_CHECK_FAILURE
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-02-2020 14:56:06.0135
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff806749d33e9 to fffff806749c1510
STACK_TEXT:
fffff504`13f08b78 fffff806`749d33e9 : 00000000`00000139 00000000`00000002 fffff504`13f08ea0 fffff504`13f08df8 : nt!KeBugCheckEx
fffff504`13f08b80 fffff806`749d3810 : 00000001`ffffffff 0000018a`e6db8cae fffff806`74760180 fffff806`7475ec53 : nt!KiBugCheckDispatch+0x69
fffff504`13f08cc0 fffff806`749d1ba5 : 00000000`00000001 fffff0cb`bf9d5987 ffff9685`e87887d0 00000000`00989680 : nt!KiFastFailDispatch+0xd0
fffff504`13f08ea0 fffff0cb`bfa6cfc5 : fffff0cb`bf9d5382 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
fffff504`13f09038 fffff0cb`bf9d5382 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : win32kbase!_report_gsfailure+0x5
fffff504`13f09040 fffff0cb`bf64e81c : 00000081`462bf510 00000000`00001cff 00000000`00000000 00000000`ffffffff : win32kbase!EnterCrit+0x182
fffff504`13f09160 fffff806`749d2e18 : ffff9685`feeec080 00000081`462bf478 00000081`00000001 fffff504`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x4c
fffff504`13f09a90 00007ffc`1de49a84 : 00007ffc`200b1c0d 00000081`462bf510 00007ffb`e2f58d5e 00007ffb`e76d4998 : nt!KiSystemServiceCopyEnd+0x28
00000081`462bf458 00007ffc`200b1c0d : 00000081`462bf510 00007ffb`e2f58d5e 00007ffb`e76d4998 00007ffb`e2f31cf8 : 0x00007ffc`1de49a84
00000081`462bf460 00000081`462bf510 : 00007ffb`e2f58d5e 00007ffb`e76d4998 00007ffb`e2f31cf8 00000000`00000004 : 0x00007ffc`200b1c0d
00000081`462bf468 00007ffb`e2f58d5e : 00007ffb`e76d4998 00007ffb`e2f31cf8 00000000`00000004 00007ffb`e6f59bc6 : 0x00000081`462bf510
00000081`462bf470 00007ffb`e76d4998 : 00007ffb`e2f31cf8 00000000`00000004 00007ffb`e6f59bc6 00000270`d20e0c70 : 0x00007ffb`e2f58d5e
00000081`462bf478 00007ffb`e2f31cf8 : 00000000`00000004 00007ffb`e6f59bc6 00000270`d20e0c70 00007ffb`e2f146e1 : 0x00007ffb`e76d4998
00000081`462bf480 00000000`00000004 : 00007ffb`e6f59bc6 00000270`d20e0c70 00007ffb`e2f146e1 3f7cac08`3126e979 : 0x00007ffb`e2f31cf8
00000081`462bf488 00007ffb`e6f59bc6 : 00000270`d20e0c70 00007ffb`e2f146e1 3f7cac08`3126e979 00000270`d20e0c78 : 0x4
00000081`462bf490 00000270`d20e0c70 : 00007ffb`e2f146e1 3f7cac08`3126e979 00000270`d20e0c78 00000270`d1c36f30 : 0x00007ffb`e6f59bc6
00000081`462bf498 00007ffb`e2f146e1 : 3f7cac08`3126e979 00000270`d20e0c78 00000270`d1c36f30 00007ffb`e36ff55f : 0x00000270`d20e0c70
00000081`462bf4a0 3f7cac08`3126e979 : 00000270`d20e0c78 00000270`d1c36f30 00007ffb`e36ff55f 00007ffb`00000004 : 0x00007ffb`e2f146e1
00000081`462bf4a8 00000270`d20e0c78 : 00000270`d1c36f30 00007ffb`e36ff55f 00007ffb`00000004 00007ffb`e3d59348 : 0x3f7cac08`3126e979
00000081`462bf4b0 00000270`d1c36f30 : 00007ffb`e36ff55f 00007ffb`00000004 00007ffb`e3d59348 00000000`00000007 : 0x00000270`d20e0c78
00000081`462bf4b8 00007ffb`e36ff55f : 00007ffb`00000004 00007ffb`e3d59348 00000000`00000007 00000001`00ecc6f4 : 0x00000270`d1c36f30
00000081`462bf4c0 00007ffb`00000004 : 00007ffb`e3d59348 00000000`00000007 00000001`00ecc6f4 00007ffb`00000001 : 0x00007ffb`e36ff55f
00000081`462bf4c8 00007ffb`e3d59348 : 00000000`00000007 00000001`00ecc6f4 00007ffb`00000001 00000034`0f85434b : 0x00007ffb`00000004
00000081`462bf4d0 00000000`00000007 : 00000001`00ecc6f4 00007ffb`00000001 00000034`0f85434b 00007ffb`e3d59348 : 0x00007ffb`e3d59348
00000081`462bf4d8 00000001`00ecc6f4 : 00007ffb`00000001 00000034`0f85434b 00007ffb`e3d59348 00000001`00ecc6f3 : 0x7
00000081`462bf4e0 00007ffb`00000001 : 00000034`0f85434b 00007ffb`e3d59348 00000001`00ecc6f3 00000270`d02c7301 : 0x00000001`00ecc6f4
00000081`462bf4e8 00000034`0f85434b : 00007ffb`e3d59348 00000001`00ecc6f3 00000270`d02c7301 00000001`00000004 : 0x00007ffb`00000001
00000081`462bf4f0 00007ffb`e3d59348 : 00000001`00ecc6f3 00000270`d02c7301 00000001`00000004 00000034`0f854344 : 0x00000034`0f85434b
00000081`462bf4f8 00000001`00ecc6f3 : 00000270`d02c7301 00000001`00000004 00000034`0f854344 0000507f`c18f91c7 : 0x00007ffb`e3d59348
00000081`462bf500 00000270`d02c7301 : 00000001`00000004 00000034`0f854344 0000507f`c18f91c7 00000000`00000000 : 0x00000001`00ecc6f3
00000081`462bf508 00000001`00000004 : 00000034`0f854344 0000507f`c18f91c7 00000000`00000000 00000000`00000000 : 0x00000270`d02c7301
00000081`462bf510 00000034`0f854344 : 0000507f`c18f91c7 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`00000004
00000081`462bf518 0000507f`c18f91c7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000034`0f854344
00000081`462bf520 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0000507f`c18f91c7
THREAD_SHA1_HASH_MOD_FUNC: d64580e33f81756bb1fb06570b34f6e45f58ed19
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 20cc343d7b821123921a646d93721950f5218aa8
THREAD_SHA1_HASH_MOD: c4e0a73bf763948f9c720654821f1e040109ccc2
FOLLOWUP_IP:
win32kbase!_report_gsfailure+5
fffff0cb`bfa6cfc5 cd29 int 29h
FAULT_INSTR_CODE: cccc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32kbase!_report_gsfailure+5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
BUCKET_ID: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_win32kbase!_report_gsfailure
TARGET_TIME: 2020-03-02T07:29:07.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.657
ANALYSIS_SESSION_ELAPSED_TIME: 6d2
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_win32kbase!_report_gsfailure
FAILURE_ID_HASH: {f22c2e43-4b0d-a5dc-7d6c-399075f6e217}
Followup: MachineOwner
---------