My PC have BSODs many times. I cant find a reason. Please help me fix it
Here is minidump log
Here is minidump log
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8042ade55d0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff8042ade5528, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2421
Key : Analysis.Elapsed.mSec
Value: 7711
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 30
Key : Analysis.Init.CPU.mSec
Value: 593
Key : Analysis.Init.Elapsed.mSec
Value: 35609
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
Key : Failure.Hash
Value: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Key : WER.OS.Branch
Value: ni_release_svc_prod3
Key : WER.OS.Version
Value: 10.0.22621.2506
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff8042ade55d0
BUGCHECK_P3: fffff8042ade5528
BUGCHECK_P4: 0
FILE_IN_CAB: 042124-6953-01.dmp
TRAP_FRAME: fffff8042ade55d0 -- (.trap 0xfffff8042ade55d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb28e386a0198 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc3005fdc3040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042d8402d6 rsp=fffff8042ade5760 rbp=fffff8042993d180
r8=0000000000000102 r9=0000000000000000 r10=0000000000085f2b
r11=fffff80429940d80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!KiTryUnwaitThread+0x1daad6:
fffff804`2d8402d6 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff8042ade5528 -- (.exr 0xfffff8042ade5528)
ExceptionAddress: fffff8042d8402d6 (nt!KiTryUnwaitThread+0x00000000001daad6)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff804`2ade52a8 fffff804`2d82c5e9 : 00000000`00000139 00000000`00000003 fffff804`2ade55d0 fffff804`2ade5528 : nt!KeBugCheckEx
fffff804`2ade52b0 fffff804`2d82cbb2 : 00000000`00000020 fffff804`2d6d4e4a fffff804`2e14c700 fffff804`2d72b10a : nt!KiBugCheckDispatch+0x69
fffff804`2ade53f0 fffff804`2d82a906 : ffffb28e`2a31b200 fffff804`2d790af4 00000000`00000000 fffff804`2993d180 : nt!KiFastFailDispatch+0xb2
fffff804`2ade55d0 fffff804`2d8402d6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
fffff804`2ade5760 fffff804`2d67675c : ffffb28e`386a01c8 00000000`00000000 ffffb28e`386a0290 fffff804`2d638a2a : nt!KiTryUnwaitThread+0x1daad6
fffff804`2ade57c0 fffff804`2d67629a : ffffb28e`386a01c0 00000000`00000000 fffff804`2ade5af8 00000000`00000000 : nt!KiTimerWaitTest+0x1fc
fffff804`2ade5860 fffff804`2d673084 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`299437e8 : nt!KiProcessExpiredTimerList+0xda
fffff804`2ade5990 fffff804`2d81bb5e : fffff804`295cdb50 fffff804`2993d180 fffff804`2e14c700 ffffb28e`318f2080 : nt!KiRetireDpcList+0xaf4
fffff804`2ade5c40 00000000`00000000 : fffff804`2ade6000 fffff804`2ade0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+1fc
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3155
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fc
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
OS_VERSION: 10.0.22621.2506
BUILDLAB_STR: ni_release_svc_prod3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Followup: MachineOwner
---------
0: kd> lmvm nt
Browse full module list
start end module name
fffff804`2d400000 fffff804`2e447000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\2A832A6884144D88C39DB4B4DB66D71C1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\6479E1C71047000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 6479E1C7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00B876D8
ImageSize: 01047000
File version: 10.0.22621.3155
Product version: 10.0.22621.3155
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.22621.3155
FileVersion: 10.0.22621.3155 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8042ade55d0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff8042ade5528, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2421
Key : Analysis.Elapsed.mSec
Value: 7711
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 30
Key : Analysis.Init.CPU.mSec
Value: 593
Key : Analysis.Init.Elapsed.mSec
Value: 35609
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
Key : Failure.Hash
Value: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Key : WER.OS.Branch
Value: ni_release_svc_prod3
Key : WER.OS.Version
Value: 10.0.22621.2506
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff8042ade55d0
BUGCHECK_P3: fffff8042ade5528
BUGCHECK_P4: 0
FILE_IN_CAB: 042124-6953-01.dmp
TRAP_FRAME: fffff8042ade55d0 -- (.trap 0xfffff8042ade55d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb28e386a0198 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc3005fdc3040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042d8402d6 rsp=fffff8042ade5760 rbp=fffff8042993d180
r8=0000000000000102 r9=0000000000000000 r10=0000000000085f2b
r11=fffff80429940d80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!KiTryUnwaitThread+0x1daad6:
fffff804`2d8402d6 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff8042ade5528 -- (.exr 0xfffff8042ade5528)
ExceptionAddress: fffff8042d8402d6 (nt!KiTryUnwaitThread+0x00000000001daad6)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff804`2ade52a8 fffff804`2d82c5e9 : 00000000`00000139 00000000`00000003 fffff804`2ade55d0 fffff804`2ade5528 : nt!KeBugCheckEx
fffff804`2ade52b0 fffff804`2d82cbb2 : 00000000`00000020 fffff804`2d6d4e4a fffff804`2e14c700 fffff804`2d72b10a : nt!KiBugCheckDispatch+0x69
fffff804`2ade53f0 fffff804`2d82a906 : ffffb28e`2a31b200 fffff804`2d790af4 00000000`00000000 fffff804`2993d180 : nt!KiFastFailDispatch+0xb2
fffff804`2ade55d0 fffff804`2d8402d6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
fffff804`2ade5760 fffff804`2d67675c : ffffb28e`386a01c8 00000000`00000000 ffffb28e`386a0290 fffff804`2d638a2a : nt!KiTryUnwaitThread+0x1daad6
fffff804`2ade57c0 fffff804`2d67629a : ffffb28e`386a01c0 00000000`00000000 fffff804`2ade5af8 00000000`00000000 : nt!KiTimerWaitTest+0x1fc
fffff804`2ade5860 fffff804`2d673084 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`299437e8 : nt!KiProcessExpiredTimerList+0xda
fffff804`2ade5990 fffff804`2d81bb5e : fffff804`295cdb50 fffff804`2993d180 fffff804`2e14c700 ffffb28e`318f2080 : nt!KiRetireDpcList+0xaf4
fffff804`2ade5c40 00000000`00000000 : fffff804`2ade6000 fffff804`2ade0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+1fc
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.3155
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fc
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
OS_VERSION: 10.0.22621.2506
BUILDLAB_STR: ni_release_svc_prod3
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Followup: MachineOwner
---------
0: kd> lmvm nt
Browse full module list
start end module name
fffff804`2d400000 fffff804`2e447000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\2A832A6884144D88C39DB4B4DB66D71C1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\6479E1C71047000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 6479E1C7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00B876D8
ImageSize: 01047000
File version: 10.0.22621.3155
Product version: 10.0.22621.3155
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.22621.3155
FileVersion: 10.0.22621.3155 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.