I have attempted so many things at this point I've got no idea what to do. I've uninstalled and reinstalled drivers multiple times, I have restored/reset my pc, swapped out parts for older ones that had worked reliably in another computer that are compatible with my current motherboard, I have clean installed Windows and reformatted my hard drive, I have looked everywhere to fix problems but nothing. I have ordered some new parts, a new motherboard, hard drive and RAM so hopefully that fixes it. But in the meantime I would like if anyone can decipher my most recent dump file and help out. The stop code was "Kernel Security Check Failure" and it isn't the first today, probably the 4th. Other stop codes that have popped up are Bad Pool Header, IRQL Not or Less Equal, and some obscure ones to me like Auto Boost Invalid Lock Release. Sometimes everything just stops working as well and I can do nothing unless I press the shut down and stop it from fully shutting down. The most recent Dump file is below. I would also like to know if a 400W (Max 420W) is capable of running a MSI 970 Gaming Motherboard with an RX 460 and FX 6300 w/ 8gb ram and a 1tb 7200RPM hard drive. Thank you.
Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`5701f000 PsLoadedModuleList = 0xfffff800`5736b5a0
Debug session time: Sun Jul 23 13:38:44.877 2017 (UTC - 4:00)
System Uptime: 0 days 0:07:35.567
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, fffff80058e5a920, fffff80058e5a878, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiProcessExpiredTimerList+140318 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80058e5a920, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80058e5a878, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2105
BIOS_DATE: 07/23/2010
BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.
BASEBOARD_PRODUCT: M4A785TD-V EVO
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 0
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80058e5a920
BUGCHECK_P3: fffff80058e5a878
BUGCHECK_P4: 0
TRAP_FRAME: fffff80058e5a920 -- (.trap 0xfffff80058e5a920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff848cf3e0c398 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff848cf48eb158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800571b1e88 rsp=fffff80058e5aab0 rbp=ffff848cf0537080
r8=fffff800563f3800 r9=0000000000000001 r10=000000010f8a2488
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiProcessExpiredTimerList+0x140318:
fffff800`571b1e88 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80058e5a878 -- (.exr 0xfffff80058e5a878)
ExceptionAddress: fffff800571b1e88 (nt!KiProcessExpiredTimerList+0x0000000000140318)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: b61
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: a
CPU_STEPPING: 0
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
DEFAULT_BUCKET_ID: FAIL_FAST_LIST_ENTRY_CORRUPT
ANALYSIS_SESSION_HOST: DESKTOP-QQC317B
ANALYSIS_SESSION_TIME: 07-23-2017 14:01:04.0842
ANALYSIS_VERSION: 10.0.15063.468 amd64fre
LAST_CONTROL_TRANSFER: from fffff800571963a9 to fffff8005718afd0
STACK_TEXT:
fffff800`58e5a5f8 fffff800`571963a9 : 00000000`00000139 00000000`00000003 fffff800`58e5a920 fffff800`58e5a878 : nt!KeBugCheckEx
fffff800`58e5a600 fffff800`57196710 : ffff848c`f07b8500 fffff800`578ac5d6 ffff848c`f07b8580 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff800`58e5a740 fffff800`571956f7 : 00000000`001217e6 fffff800`57078162 00000000`0004fd1b 00000000`00004df7 : nt!KiFastFailDispatch+0xd0
fffff800`58e5a920 fffff800`571b1e88 : fffff800`563f0180 ffff848c`00000000 fffff800`58e5ac58 00000001`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
fffff800`58e5aab0 fffff800`57072c27 : fffff800`563f0180 00000000`002b6828 00000000`00000000 00000000`000043fa : nt!KiProcessExpiredTimerList+0x140318
fffff800`58e5aba0 fffff800`5718e07a : 00000000`00000000 fffff800`563f0180 00000000`001a6fe0 fffff800`57418a40 : nt!KiRetireDpcList+0x367
fffff800`58e5ada0 00000000`00000000 : fffff800`58e5b000 fffff800`58e55000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: a5119ebdc9ff71d34433e0daf4177502fc924f29
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4c40b7fb0bbce8125ab1be10c516c95e5579285e
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+140318
fffff800`571b1e88 cd29 int 29h
FAULT_INSTR_CODE: 8b4129cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiProcessExpiredTimerList+140318
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 58ccba4c
BUCKET_ID_FUNC_OFFSET: 140318
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
TARGET_TIME: 2017-07-23T17:38:44.000Z
OSBUILD: 15063
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-03-18 00:40:44
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: 7da
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist
FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`5701f000 PsLoadedModuleList = 0xfffff800`5736b5a0
Debug session time: Sun Jul 23 13:38:44.877 2017 (UTC - 4:00)
System Uptime: 0 days 0:07:35.567
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, fffff80058e5a920, fffff80058e5a878, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiProcessExpiredTimerList+140318 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80058e5a920, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80058e5a878, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2105
BIOS_DATE: 07/23/2010
BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.
BASEBOARD_PRODUCT: M4A785TD-V EVO
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 0
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80058e5a920
BUGCHECK_P3: fffff80058e5a878
BUGCHECK_P4: 0
TRAP_FRAME: fffff80058e5a920 -- (.trap 0xfffff80058e5a920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff848cf3e0c398 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff848cf48eb158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800571b1e88 rsp=fffff80058e5aab0 rbp=ffff848cf0537080
r8=fffff800563f3800 r9=0000000000000001 r10=000000010f8a2488
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiProcessExpiredTimerList+0x140318:
fffff800`571b1e88 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80058e5a878 -- (.exr 0xfffff80058e5a878)
ExceptionAddress: fffff800571b1e88 (nt!KiProcessExpiredTimerList+0x0000000000140318)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 4
CPU_MHZ: b61
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 10
CPU_MODEL: a
CPU_STEPPING: 0
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
DEFAULT_BUCKET_ID: FAIL_FAST_LIST_ENTRY_CORRUPT
ANALYSIS_SESSION_HOST: DESKTOP-QQC317B
ANALYSIS_SESSION_TIME: 07-23-2017 14:01:04.0842
ANALYSIS_VERSION: 10.0.15063.468 amd64fre
LAST_CONTROL_TRANSFER: from fffff800571963a9 to fffff8005718afd0
STACK_TEXT:
fffff800`58e5a5f8 fffff800`571963a9 : 00000000`00000139 00000000`00000003 fffff800`58e5a920 fffff800`58e5a878 : nt!KeBugCheckEx
fffff800`58e5a600 fffff800`57196710 : ffff848c`f07b8500 fffff800`578ac5d6 ffff848c`f07b8580 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff800`58e5a740 fffff800`571956f7 : 00000000`001217e6 fffff800`57078162 00000000`0004fd1b 00000000`00004df7 : nt!KiFastFailDispatch+0xd0
fffff800`58e5a920 fffff800`571b1e88 : fffff800`563f0180 ffff848c`00000000 fffff800`58e5ac58 00000001`00000000 : nt!KiRaiseSecurityCheckFailure+0xf7
fffff800`58e5aab0 fffff800`57072c27 : fffff800`563f0180 00000000`002b6828 00000000`00000000 00000000`000043fa : nt!KiProcessExpiredTimerList+0x140318
fffff800`58e5aba0 fffff800`5718e07a : 00000000`00000000 fffff800`563f0180 00000000`001a6fe0 fffff800`57418a40 : nt!KiRetireDpcList+0x367
fffff800`58e5ada0 00000000`00000000 : fffff800`58e5b000 fffff800`58e55000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: a5119ebdc9ff71d34433e0daf4177502fc924f29
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4c40b7fb0bbce8125ab1be10c516c95e5579285e
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+140318
fffff800`571b1e88 cd29 int 29h
FAULT_INSTR_CODE: 8b4129cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiProcessExpiredTimerList+140318
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 58ccba4c
BUCKET_ID_FUNC_OFFSET: 140318
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList
TARGET_TIME: 2017-07-23T17:38:44.000Z
OSBUILD: 15063
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-03-18 00:40:44
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: 7da
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist
FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}
Followup: MachineOwner
---------