Question Windows 10 laptop keeps blue screening randomly ?

Mar 13, 2024
2
0
10
I am on an old MSI GT60 2PC Dominator laptop.

I have tried for hours to fix the blue screens (reinstalled windows 5 times). i did driver updates, but nothing is working.

Here is one of my Crash Dumps:

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffffb2811d7befa0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffb2811d7beef8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3358

Key : Analysis.Elapsed.mSec
Value: 8130

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 2

Key : Analysis.Init.CPU.mSec
Value: 515

Key : Analysis.Init.Elapsed.mSec
Value: 7423

Key : Analysis.Memory.CommitPeak.Mb
Value: 97

Key : Bugcheck.Code.LegacyAPI
Value: 0x139

Key : Bugcheck.Code.TargetModel
Value: 0x139

Key : FailFast.Name
Value: STACK_COOKIE_CHECK_FAILURE

Key : FailFast.Type
Value: 2

Key : Failure.Bucket
Value: 0x139_MISSING_GSFRAME_tcpip!_report_gsfailure

Key : Failure.Hash
Value: {33a64846-ba4d-9e86-d89a-752893ad80a6}

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 139

BUGCHECK_P1: 2

BUGCHECK_P2: ffffb2811d7befa0

BUGCHECK_P3: ffffb2811d7beef8

BUGCHECK_P4: 0

FILE_IN_CAB: 031324-16953-01.dmp

TRAP_FRAME: ffffb2811d7befa0 -- (.trap 0xffffb2811d7befa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80618fc0000 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80619065f95 rsp=ffffb2811d7bf138 rbp=ffffb2811d7bf710
r8=0000000000000000 r9=ffff9f0dc538d9d0 r10=ffff9f0dc538d9d0
r11=00000000000000d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
tcpip!_report_gsfailure+0x5:
fffff806`19065f95 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffb2811d7beef8 -- (.exr 0xffffb2811d7beef8)
ExceptionAddress: fffff80619065f95 (tcpip!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steam.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000002

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffb281`1d7bec78 fffff806`13211e29 : 00000000`00000139 00000000`00000002 ffffb281`1d7befa0 ffffb281`1d7beef8 : nt!KeBugCheckEx
ffffb281`1d7bec80 fffff806`132123d0 : 6d058b48`28ec8348 ffa32480`e8003755 ccccccc3`28c48348 cccccccc`cccccccc : nt!KiBugCheckDispatch+0x69
ffffb281`1d7bedc0 fffff806`132102dd : ffff9f0d`c6ffe0e8 ffffb281`1d7bf7c0 ffffb281`1d7bf210 ffffffff`c0000005 : nt!KiFastFailDispatch+0xd0
ffffb281`1d7befa0 fffff806`19065f95 : fffff806`19069316 ffffb281`1d7bf710 fffff806`130ab33f fffff806`191cce34 : nt!KiRaiseSecurityCheckFailure+0x31d
ffffb281`1d7bf138 fffff806`19069316 : ffffb281`1d7bf710 fffff806`130ab33f fffff806`191cce34 ffffb281`00000000 : tcpip!_report_gsfailure+0x5
ffffb281`1d7bf140 fffff806`190692ab : ffffb281`1d7bf210 00000000`00000000 ffffb281`1d7bf748 ffffb281`1d7bf720 : tcpip!_GSHandlerCheckCommon+0x5a
ffffb281`1d7bf170 fffff806`132082d2 : fffff806`19069298 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!_GSHandlerCheck+0x13
ffffb281`1d7bf1a0 fffff806`130ab127 : ffffb281`1d7bf710 00000000`00000000 ffffb281`1d7bf920 fffff806`18ff3000 : nt!RtlpExecuteHandlerForException+0x12
ffffb281`1d7bf1d0 fffff806`131394d6 : ffff9f0d`c538d798 ffffb281`1d7bfe20 ffff9f0d`c538d798 ffffc909`d0522950 : nt!RtlDispatchException+0x297
ffffb281`1d7bf8f0 fffff806`131fe9f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffb281`1d7bffb0 fffff806`131fe9c0 : fffff806`13211f65 ffffc909`d15c6e30 ffffc909`ba2c88a8 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff9f0d`c538d658 fffff806`13211f65 : ffffc909`d15c6e30 ffffc909`ba2c88a8 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffff9f0d`c538d660 fffff806`1320d41a : ffffc909`cd1ff040 34c4d17e`34c4d17e 00000000`00000000 ffffc909`ba33f960 : nt!KiExceptionDispatch+0x125
ffff9f0d`c538d840 fffff806`18ff3000 : 00000000`00008969 ffff9f0d`c538dad0 00000000`00000000 ffffc909`d0522950 : nt!KiGeneralProtectionFault+0x31a
ffff9f0d`c538d9d0 ffffc909`ce471544 : fffff806`00000000 ffffc909`ba33f940 fffff806`00000000 ffffc909`cb0fc120 : tcpip!UdpSegmentMessage+0x210
ffff9f0d`c538db00 fffff806`00000000 : ffffc909`ba33f940 fffff806`00000000 ffffc909`cb0fc120 00000000`00000000 : 0xffffc909`ce471544
ffff9f0d`c538db08 ffffc909`ba33f940 : fffff806`00000000 ffffc909`cb0fc120 00000000`00000000 ffffc909`cd1ff040 : 0xfffff806`00000000
ffff9f0d`c538db10 fffff806`00000000 : ffffc909`cb0fc120 00000000`00000000 ffffc909`cd1ff040 00000000`00000004 : 0xffffc909`ba33f940
ffff9f0d`c538db18 ffffc909`cb0fc120 : 00000000`00000000 ffffc909`cd1ff040 00000000`00000004 fffff806`e0000001 : 0xfffff806`00000000
ffff9f0d`c538db20 00000000`00000000 : ffffc909`cd1ff040 00000000`00000004 fffff806`e0000001 ffffc909`ba33f8a0 : 0xffffc909`cb0fc120


SYMBOL_NAME: tcpip!_report_gsfailure+5

MODULE_NAME: tcpip

IMAGE_NAME: tcpip.sys

IMAGE_VERSION: 10.0.19041.4170

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 5

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_tcpip!_report_gsfailure

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {33a64846-ba4d-9e86-d89a-752893ad80a6}

Followup: MachineOwner








And another one-

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff803324c8b0b, Address of the instruction which caused the BugCheck
Arg3: ffff8b0ca1491530, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3062

Key : Analysis.Elapsed.mSec
Value: 3715

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 562

Key : Analysis.Init.Elapsed.mSec
Value: 2173

Key : Analysis.Memory.CommitPeak.Mb
Value: 93

Key : Bugcheck.Code.LegacyAPI
Value: 0x3b

Key : Bugcheck.Code.TargetModel
Value: 0x3b

Key : Failure.Bucket
Value: AV_FLTMGR!TreeUnlinkMulti

Key : Failure.Hash
Value: {ca6fc98c-5b37-6c44-6983-7e23d46c66bf}

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff803324c8b0b

BUGCHECK_P3: ffff8b0ca1491530

BUGCHECK_P4: 0

FILE_IN_CAB: 031324-7734-01.dmp

CONTEXT: ffff8b0ca1491530 -- (.cxr 0xffff8b0ca1491530)
rax=aaaaaaaa00000000 rbx=0000000000000000 rcx=ffffb902fc439340
rdx=ffffb90311cdbd60 rsi=ffffb90311cdbd60 rdi=aaaaaaaa00000000
rip=fffff803324c8b0b rsp=ffff8b0ca1491f30 rbp=ffffb902fc82869c
r8=ffffffffffffffff r9=7fffb902fc439308 r10=fffff80335245370
r11=ffffb9030b98e080 r12=fffff803324e8060 r13=0000000000000000
r14=ffffb902fc439340 r15=0000000000004000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
FLTMGR!TreeUnlinkMulti+0x4b:
fffff803`324c8b0b 483b7020 cmp rsi,qword ptr [rax+20h] ds:002b:aaaaaaaa`00000020=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffff8b0c`a1491f30 fffff803`324fa857 : ffffb902`fc4392a0 ffffb902`00000000 ffff8b0c`00000000 00000000`ffffbfff : FLTMGR!TreeUnlinkMulti+0x4b
ffff8b0c`a1491f80 fffff803`324c69fe : ffffb903`104c2b70 ffffb903`11cdbd60 ffff8b0c`a14920a9 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject+0x157
ffff8b0c`a1491ff0 fffff803`324c5f7a : ffff8b0c`a1492200 ffff8b0c`a1492102 ffffb903`11cdbd00 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x89e
ffff8b0c`a1492110 fffff803`324c5021 : ffff8b0c`a1493000 ffff8b0c`a148d000 ffffb903`112df010 ffff8b0c`a1492220 : FLTMGR!FltpPassThroughInternal+0xca
ffff8b0c`a1492160 fffff803`324c4a2b : ffffffff`fffe7960 00000000`00000000 ffffb903`112df010 ffff8b0c`a14928a0 : FLTMGR!FltpPassThrough+0x541
ffff8b0c`a14921f0 fffff803`35235cf5 : ffffb903`11cdbd60 fffff803`35d238c0 ffffb902`fc7d1aa0 00000000`00000000 : FLTMGR!FltpDispatch+0x8b
ffff8b0c`a1492250 fffff803`3564289f : ffffb903`11cdbd60 ffffb902`fc7d1aa0 ffffb902`fc5f1be0 ffffb902`fc5f1be0 : nt!IofCallDriver+0x55
ffff8b0c`a1492290 fffff803`35646040 : ffffb902`fa6bd820 00000000`00000000 ffffb903`11cdbd30 ffffb903`112df010 : nt!IopDeleteFile+0x14f
ffff8b0c`a1492310 fffff803`35245c07 : 00000000`00000000 00000000`00000000 ffff8b0c`a1492650 ffffb903`11cdbd60 : nt!ObpRemoveObjectRoutine+0x80
ffff8b0c`a1492370 fffff803`35245b2e : fffff803`324f7270 00000000`00000001 ffff8b0c`a14928a0 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0xc7
ffff8b0c`a14923b0 fffff803`35656f5d : ffffb903`11cdbd60 00000000`00000000 ffff8b0c`a1492650 fffff803`324f7270 : nt!HalPutDmaAdapter+0xe
ffff8b0c`a14923e0 fffff803`3564abb7 : ffffb902`fc7438f0 fffff803`324f7270 ffffb903`0ec0f010 ffffde8e`8bc17801 : nt!IopParseDevice+0x1e0d
ffff8b0c`a1492550 fffff803`3565316a : ffffb903`0ec0f001 ffff8b0c`a14927b8 00000000`00000040 ffffb902`fa6bd820 : nt!ObpLookupObjectName+0x1117
ffff8b0c`a1492720 fffff803`356ec125 : ffff8b0c`00000000 000000cb`c85fdaa0 000000cb`c85fe001 000000cb`c85fda70 : nt!ObOpenObjectByNameEx+0x1fa
ffff8b0c`a1492850 fffff803`35411578 : ffffb903`0b98e080 00000000`00000000 ffffb903`0b98e080 00000251`0d3401a0 : nt!NtQueryAttributesFile+0x1c5
ffff8b0c`a1492b00 00007ff8`7aacd784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cb`c85fd9f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`7aacd784


STACK_COMMAND: .process /r /p 0x43dfffffffffffff; .cxr 0xffff8b0ca1491530 ; kb

SYMBOL_NAME: FLTMGR!TreeUnlinkMulti+4b

MODULE_NAME: FLTMGR

IMAGE_NAME: FLTMGR.SYS

IMAGE_VERSION: 10.0.19041.4106

BUCKET_ID_FUNC_OFFSET: 4b

FAILURE_BUCKET_ID: AV_FLTMGR!TreeUnlinkMulti

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ca6fc98c-5b37-6c44-6983-7e23d46c66bf}

Followup: MachineOwner
---------
 

Lutfij

Titan
Moderator
Welcome to the forums, newcomer!

(reinstalled windows 5 times)
Where did you source the installer for your OS? You might want to try and install the OS in offline mode first, then manually install all relevant drivers(that are the latest version) in an elevated command, i.e, Right click installer>Run as Administrator.

Steam, Chrome and possibly your internet adapter's at fault.
 
Mar 13, 2024
2
0
10
Welcome to the forums, newcomer!

(reinstalled windows 5 times)
Where did you source the installer for your OS? You might want to try and install the OS in offline mode first, then manually install all relevant drivers(that are the latest version) in an elevated command, i.e, Right click installer>Run as Administrator.

Steam, Chrome and possibly your internet adapter's at fault.
why would those be causing the crashes? and i reset it using the cloud download method.