KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffbe017fdb9010, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffbe017fdb8f68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 24649
Key : Analysis.Init.CPU.mSec
Value: 405
Key : Analysis.Init.Elapsed.mSec
Value: 4462
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : FailFast.Name
Value: INCORRECT_STACK
Key : FailFast.Type
Value: 4
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffffbe017fdb9010
BUGCHECK_P3: ffffbe017fdb8f68
BUGCHECK_P4: 0
TRAP_FRAME: 4100360eb10d8d4c -- (.trap 0x4100360eb10d8d4c)
Unable to read trap frame at 4100360e`b10d8d4c
EXCEPTION_RECORD: ffffbe017fdb8f68 -- (.exr 0xffffbe017fdb8f68)
ExceptionAddress: fffff80734a91ba9 (nt!RtlpGetStackLimitsEx+0x0000000000165f39)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffbe01`7fdb8ce8 fffff807`34a07d69 : 00000000`00000139 00000000`00000004 ffffbe01`7fdb9010 ffffbe01`7fdb8f68 : nt!KeBugCheckEx
ffffbe01`7fdb8cf0 fffff807`34a08190 : 558d48c6`8b4d2024 e8100fe8`ce8b48df d08b44cf`7d8b48ff 483578d2`8545c033 : nt!KiBugCheckDispatch+0x69
ffffbe01`7fdb8e30 fffff807`34a06523 : ffffbe01`7fdb97c0 00000000`00000000 ffffbe01`7fdb8a60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffbe01`7fdb9010 fffff807`34a91ba9 : fffffe08`c03d8000 c7890150`9b02e808 ffffbe01`7fdb9710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffbe01`7fdb91a0 fffff807`34a91d77 : ffffbe01`7fdb9710 00000000`00000000 fffffe08`c03d7ff8 46890841`00000003 : nt!RtlpGetStackLimitsEx+0x165f39
ffffbe01`7fdb91d0 fffff807`3492abe6 : fffffe08`c03d7178 ffffbe01`7fdb9e20 fffffe08`c03d7178 ffffbe01`7fe0b440 : nt!RtlDispatchException+0x166017
ffffbe01`7fdb98f0 fffff807`349f6c42 : 8d4c0000`012c998b 10eb3851`8d4c2849 4100360e`b10d8d4c d18b4d00`000300bb : nt!KiDispatchException+0x186
ffffbe01`7fdb9fb0 fffff807`349f6c10 : ffff9388`ee2fa080 ffff9388`e5a47810 ffffab08`e8059748 00000000`00000150 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffe08`c03d7038 ffff9388`ee2fa080 : ffff9388`e5a47810 ffffab08`e8059748 00000000`00000150 fffff807`379ead9d : nt!KiExceptionDispatchOnExceptionStackContinue
fffffe08`c03d7040 ffff9388`e5a47810 : ffffab08`e8059748 00000000`00000150 fffff807`379ead9d ffffab08`eaab7ab0 : 0xffff9388`ee2fa080
fffffe08`c03d7048 ffffab08`e8059748 : 00000000`00000150 fffff807`379ead9d ffffab08`eaab7ab0 ffff9388`ef7dc530 : 0xffff9388`e5a47810
fffffe08`c03d7050 00000000`00000150 : fffff807`379ead9d ffffab08`eaab7ab0 ffff9388`ef7dc530 ffff9388`e9fbd050 : 0xffffab08`e8059748
fffffe08`c03d7058 fffff807`379ead9d : ffffab08`eaab7ab0 ffff9388`ef7dc530 ffff9388`e9fbd050 ffffab08`e67cda80 : 0x150
fffffe08`c03d7060 fffff807`379eaa48 : 00000000`00000000 ffff9388`ef7dc530 ffff9388`e5a47810 ffff9388`edd61d08 : FLTMGR!FltpAllocateFileNameInformation+0x13d
fffffe08`c03d7090 fffff807`379b3552 : ffff9388`edd61d08 fffffe08`c03d8000 fffffe08`c03d1000 fffff807`379da060 : FLTMGR!FltpCreateFileNameInformation+0x258
fffffe08`c03d7110 fffff807`379e9f1f : 00000000`00008000 ffff9388`ffff7fff ffff9388`edd61ca0 ffff9388`e9fbd050 : FLTMGR!FltpGetFileNameInformation+0x612
fffffe08`c03d71c0 fffff807`4e61eee8 : 00000000`00000000 fffff807`4e61a050 fffffe08`c03d72c0 00000000`00000000 : FLTMGR!FltGetFileNameInformationUnsafe+0x9f
fffffe08`c03d7240 fffff807`379ea39c : 00000000`00000000 ffffab08`eaab7ab0 00000002`00001000 fffff807`00000001 : bindflt!BfGenerateFileNameCallback+0x158
fffffe08`c03d7300 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpGetNormalizedFileNameWorker+0x18c
SYMBOL_NAME: bindflt!BfGenerateFileNameCallback+158
MODULE_NAME: bindflt
IMAGE_NAME: bindflt.sys
IMAGE_VERSION: 10.0.19041.870
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 158
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_bindflt!BfGenerateFileNameCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fc024336-057e-d51f-0a7e-a6a1af875e63}
Followup: MachineOwner
---------