Hi
i keep getting random bsod errors with different codes i tested every hardware component and everything seems fine here is my specs
Operating System
Windows 10 Pro 64-bit
CPU
AMD Ryzen 5 3500X 47 °C
Matisse 7nm Technology
RAM
8.00GB Single-Channel Unknown @ 1596MHz (16-18-18-36)
Motherboard
Gigabyte Technology Co. Ltd. B450M GAMING (AM4) 31 °C
Graphics
S22F350 (1920x1080@60Hz)
2047MB NVIDIA GeForce GTX 1660 SUPER (ZOTAC International) 32 °C
Storage
111GB Patriot Burst (SATA (SSD)) 33 °C
931GB Western Digital WDC WD10EZEX-21WN4A0 (SATA ) 33 °C
931GB Western Digital WDC WD10JPVX-60JC3T0 (SATA ) 30 °C
and here is the memory.dmp
i keep getting random bsod errors with different codes i tested every hardware component and everything seems fine here is my specs
Operating System
Windows 10 Pro 64-bit
CPU
AMD Ryzen 5 3500X 47 °C
Matisse 7nm Technology
RAM
8.00GB Single-Channel Unknown @ 1596MHz (16-18-18-36)
Motherboard
Gigabyte Technology Co. Ltd. B450M GAMING (AM4) 31 °C
Graphics
S22F350 (1920x1080@60Hz)
2047MB NVIDIA GeForce GTX 1660 SUPER (ZOTAC International) 32 °C
Storage
111GB Patriot Burst (SATA (SSD)) 33 °C
931GB Western Digital WDC WD10EZEX-21WN4A0 (SATA ) 33 °C
931GB Western Digital WDC WD10JPVX-60JC3T0 (SATA ) 30 °C
and here is the memory.dmp
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803
Debug session time: Sun Feb 7 18:40:43.245 2021 (UTC + 2:00)
System Uptime: 0 days 0:10:46.872
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803
0: kd> !analyze -v
***
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80317e6c640, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80317e6c598, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-E2QA0OP
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3053
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80317e6c640
BUGCHECK_P3: fffff80317e6c598
BUGCHECK_P4: 0
TRAP_FRAME: fffff80317e6c640 -- (.trap 0xfffff80317e6c640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd3810a557158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd3810a08e158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803134127b0 rsp=fffff80317e6c7d0 rbp=fffff8030f8b3180
r8=0000000000000102 r9=0000000000000000 r10=fffff8030f8b6ac0
r11=000000018190e7fb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiTryUnwaitThread+0x1c6460:
fffff803
SYMBOL_NAME: nt!KiTimerWaitTest+1e6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1e6
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803
13000000 PsLoadedModuleList = 0xfffff803
13c2a4b0Debug session time: Sun Feb 7 18:40:43.245 2021 (UTC + 2:00)
System Uptime: 0 days 0:10:46.872
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803
133f5a80 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff803
17e6c320=00000000000001390: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80317e6c640, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80317e6c598, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-E2QA0OP
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3053
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80317e6c640
BUGCHECK_P3: fffff80317e6c598
BUGCHECK_P4: 0
TRAP_FRAME: fffff80317e6c640 -- (.trap 0xfffff80317e6c640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd3810a557158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd3810a08e158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803134127b0 rsp=fffff80317e6c7d0 rbp=fffff8030f8b3180
r8=0000000000000102 r9=0000000000000000 r10=fffff8030f8b6ac0
r11=000000018190e7fb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiTryUnwaitThread+0x1c6460:
fffff803
134127b0 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80317e6c598 -- (.exr 0xfffff80317e6c598)
ExceptionAddress: fffff803134127b0 (nt!KiTryUnwaitThread+0x00000000001c6460)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff803
17e6c318 fffff80313407a69 : 00000000
00000139 0000000000000003 fffff803
17e6c640 fffff80317e6c598 : nt!KeBugCheckEx
fffff803
17e6c320 fffff80313407e90 : fffff803
17e6c758 0000000000000000 fffff803
17e6c4d0 0000000000000000 : nt!KiBugCheckDispatch+0x69
fffff803
17e6c460 fffff80313406223 : ffffd381
059fa010 0000000000000000 ffffffff
ffffffd1 fffff80325e3ea52 : nt!KiFastFailDispatch+0xd0
fffff803
17e6c640 fffff803134127b0 : 00000000
00000000 0000000000989680 00000000
00000002 0000000000000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff803
17e6c7d0 fffff803132452d6 : ffffd381
0a557188 0000000000000000 ffffd381
0a557250 0000000000000000 : nt!KiTryUnwaitThread+0x1c6460
fffff803
17e6c830 fffff80313244e7c : ffffd381
0a557180 0000000000000000 fffff803
17e6cb18 0000000000000000 : nt!KiTimerWaitTest+0x1e6
fffff803
17e6c8e0 fffff803132072e9 : 00000000
00000000 0000000000000000 00000000
00140001 000000000000607c : nt!KiProcessExpiredTimerList+0xdc
fffff803
17e6c9d0 fffff803133f95ee : 00000000
00000000 fffff8030f8b3180 fffff803
13d27600 ffffd3810af8a080 : nt!KiRetireDpcList+0x9d9
fffff803
17e6cc60 0000000000000000 : fffff803
17e6d000 fffff80317e67000 00000000
00000000 00000000`00000000 : nt!KiIdleLoop+0x9eSYMBOL_NAME: nt!KiTimerWaitTest+1e6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1e6
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Followup: MachineOwner
---------
Last edited by a moderator: