New
#1
Random BSOD different error messages
Recently I have been getting a ton of BSOD errors that I've slowly gotten to happen less frequently but still occuring. Previously the errors were happening during gaming or other serious video/audio usage but I somewhat resolved this issue by resetting my BIOS settings that over the time had been getting wacky. Oddly, sometimes when I bluescreen, the WiFi adapter I use will not work upon bootup, unless I unplug and replug it in. Those BSODs were happening all the time. When the PC would bootup, it would insta-bluescreen again for 4-5 times ina row before it would be allowed to run for 10 minutes to just rinse and repeat.
After all of this, the PC was running good but now the errors happen randomly and the error message is usually different. I have done a Memtest with 4 passes that lasted for 2hours and had 0 errors. This is a complete dumpfile that was analyzed by Windbg so I will include that. Kernal security check failure was the message accompanied with it.
This is the file that was suppose to attached with the post by description of the [how to make bsod posts], I don't think it contains some of the newer error files since I changed how they were suppose to be saved. I think im using big dumpfiles instead of the miniones.
Attachment 137372
Code:Microsoft (R) Windows Debugger Version 10.0.15063.137 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\MEMORY.DMP]Kernel Bitmap Dump File: Full address space is availableSymbol search path is: srv*Executable search path is: Windows 10 Kernel Version 14393 MP (8 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 14393.1198.amd64fre.rs1_release_sec.170427-1353Machine Name:Kernel base = 0xfffff803`c441a000 PsLoadedModuleList = 0xfffff803`c4719000Debug session time: Tue May 30 12:52:41.315 2017 (UTC - 4:00)System Uptime: 0 days 0:49:45.154Loading Kernel Symbols..................................................................................................................................................................................Loading User SymbolsLoading unloaded module list.......******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 139, {3, ffffe480ba13e3d0, ffffe480ba13e328, 0}Probably caused by : Pool_Corruption ( nt!ExFreePool+ce1 )Followup: Pool_corruption---------2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************KERNEL_SECURITY_CHECK_FAILURE (139)A kernel component has corrupted a critical data structure. The corruptioncould potentially allow a malicious user to gain control of this machine.Arguments:Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).Arg2: ffffe480ba13e3d0, Address of the trap frame for the exception that caused the bugcheckArg3: ffffe480ba13e328, Address of the exception record for the exception that caused the bugcheckArg4: 0000000000000000, ReservedDebugging Details:------------------DUMP_CLASS: 1DUMP_QUALIFIER: 402BUILD_VERSION_STRING: 14393.1198.amd64fre.rs1_release_sec.170427-1353SYSTEM_MANUFACTURER: ASUSSYSTEM_PRODUCT_NAME: All SeriesSYSTEM_SKU: AllSYSTEM_VERSION: System VersionBIOS_VENDOR: American Megatrends Inc.BIOS_VERSION: 0310BIOS_DATE: 05/29/2014BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.BASEBOARD_PRODUCT: Z97-PBASEBOARD_VERSION: Rev X.0xDUMP_TYPE: 0BUGCHECK_P1: 3BUGCHECK_P2: ffffe480ba13e3d0BUGCHECK_P3: ffffe480ba13e328BUGCHECK_P4: 0TRAP_FRAME: ffffe480ba13e3d0 -- (.trap 0xffffe480ba13e3d0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=ffff948fa78a3f50 rbx=0000000000000000 rcx=0000000000000003rdx=ffff948fa0d29010 rsi=0000000000000000 rdi=0000000000000000rip=fffff803c4664801 rsp=ffffe480ba13e560 rbp=0000000000000000 r8=ffff948fa78a3e80 r9=ffff948fa12c4e50 r10=0000000000000001r11=ffff948fa7d12e50 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei ng nz na po cynt!ExFreePool+0xce1:fffff803`c4664801 cd29 int 29hResetting default scopeEXCEPTION_RECORD: ffffe480ba13e328 -- (.exr 0xffffe480ba13e328)ExceptionAddress: fffff803c4664801 (nt!ExFreePool+0x0000000000000ce1) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001NumberParameters: 1 Parameter[0]: 0000000000000003Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRYCPU_COUNT: 8CPU_MHZ: f9eCPU_VENDOR: GenuineIntelCPU_FAMILY: 6CPU_MODEL: 3cCPU_STEPPING: 3CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1E'00000000 (cache) 1E'00000000 (init)BUGCHECK_STR: 0x139PROCESS_NAME: SystemCURRENT_IRQL: 2ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.EXCEPTION_CODE_STR: c0000409EXCEPTION_PARAMETER1: 0000000000000003DEFAULT_BUCKET_ID: FAIL_FAST_LIST_ENTRY_CORRUPTANALYSIS_SESSION_HOST: ADMINRG-SH5FH9TANALYSIS_SESSION_TIME: 05-30-2017 13:53:00.0033ANALYSIS_VERSION: 10.0.15063.137 amd64freLAST_CONTROL_TRANSFER: from fffff803c4573d29 to fffff803c4568c00STACK_TEXT: ffffe480`ba13e0a8 fffff803`c4573d29 : 00000000`00000139 00000000`00000003 ffffe480`ba13e3d0 ffffe480`ba13e328 : nt!KeBugCheckExffffe480`ba13e0b0 fffff803`c4574090 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbe69`062a5e48 : nt!KiBugCheckDispatch+0x69ffffe480`ba13e1f0 fffff803`c4573073 : 00000000`00000000 00000000`00000001 00000000`00c54bc8 00000000`00c54bc9 : nt!KiFastFailDispatch+0xd0ffffe480`ba13e3d0 fffff803`c4664801 : ffffd20c`73634946 00000000`000000c0 00000000`00000000 ffff9bbe`00000019 : nt!KiRaiseSecurityCheckFailure+0xf3ffffe480`ba13e560 fffff803`c466286d : ffff948f`a62429d0 fffff803`c474d100 fffff803`c474d100 00000000`00000000 : nt!ExFreePool+0xce1ffffe480`ba13e5e0 fffff80f`cf402212 : ffff948f`a11ef2a0 ffff948f`a3989dc8 00000000`00000000 00000000`0000000c : nt!ExFreePoolWithTag+0x86dffffe480`ba13e6c0 fffff803`c48fbae6 : 00000000`00000000 ffffd20c`530ed570 ffffd20c`530ed830 fffff80f`cfe55961 : FLTMGR!ExFreeToNPagedLookasideList+0x46ffffe480`ba13e6f0 fffff80f`cff04fb0 : ffffd20c`530ed6b0 ffff948f`a11ef2a8 ffffe480`ba13e828 ffff948f`9fc4a180 : nt!FsRtlTeardownPerStreamContexts+0x5affffe480`ba13e740 fffff80f`cff04daf : ffffe400`01010000 00000028`a76c1d00 00000000`00000000 00000000`00000000 : NTFS!NtfsDeleteScb+0x130ffffe480`ba13e7d0 fffff80f`cfe55753 : ffff948f`a0867c90 ffffd20c`530ed6b0 00000000`00000001 00000000`00000000 : NTFS!NtfsRemoveScb+0x5fffffe480`ba13e820 fffff80f`cff04b30 : ffffd20c`530ed570 ffffe480`ba13ea80 ffff948f`a3989dc8 00000000`00000000 : NTFS!NtfsPrepareFcbForRemoval+0x63ffffe480`ba13e860 fffff80f`cfe6edc0 : ffff948f`a3989dc8 ffffe480`ba13e963 ffffd20c`530ed980 ffffd20c`530ed570 : NTFS!NtfsTeardownStructures+0x90ffffe480`ba13e8e0 fffff80f`cff4e6db : ffffe480`ba13eab8 ffffe480`ba13eab8 ffffe480`ba13ea80 ffffd20c`530ed570 : NTFS!NtfsDecrementCloseCounts+0xd0ffffe480`ba13e920 fffff80f`cff58b9e : ffff948f`a3989dc8 ffffd20c`530ed6b0 ffffd20c`530ed570 ffff948f`9fc4a180 : NTFS!NtfsCommonClose+0x40bffffe480`ba13e9f0 fffff803`c447fbd9 : fffff803`c47d0100 ffff948f`a3d6e800 fffff803`00000000 fffff803`c47d0280 : NTFS!NtfsFspCloseInternal+0x1a2ffffe480`ba13eb80 fffff803`c44d0695 : ff174461`ff174561 00000000`00000080 ffff948f`9fcb16c0 ffff948f`a3d6e800 : nt!ExpWorkerThread+0xe9ffffe480`ba13ec10 fffff803`c456e0c6 : fffff803`c4756180 ffff948f`a3d6e800 fffff803`c44d0654 ff1a4864`ff1a4864 : nt!PspSystemThreadStartup+0x41ffffe480`ba13ec60 00000000`00000000 : ffffe480`ba13f000 ffffe480`ba139000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16STACK_COMMAND: kbTHREAD_SHA1_HASH_MOD_FUNC: 4b331e732b05e86a011c410fede1e1e78e4d9336THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3f03ab25c9680130478169ff0553f026bd1e7e88THREAD_SHA1_HASH_MOD: a652ea35d44549839fbcb34b442a701b3bc34d3bFOLLOWUP_IP: nt!ExFreePool+ce1fffff803`c4664801 cd29 int 29hFAULT_INSTR_CODE: 3b929cdSYMBOL_STACK_INDEX: 4SYMBOL_NAME: nt!ExFreePool+ce1FOLLOWUP_NAME: Pool_corruptionIMAGE_NAME: Pool_CorruptionDEBUG_FLR_IMAGE_TIMESTAMP: 0MODULE_NAME: Pool_CorruptionBUCKET_ID_FUNC_OFFSET: ce1FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePoolBUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePoolPRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!ExFreePoolTARGET_TIME: 2017-05-30T16:52:41.000ZOSBUILD: 14393OSSERVICEPACK: 0SERVICEPACK_NUMBER: 0OS_REVISION: 0SUITE_MASK: 272PRODUCT_TYPE: 1OSPLATFORM_TYPE: x64OSNAME: Windows 10OSEDITION: Windows 10 WinNt TerminalServer SingleUserTSOS_LOCALE: USER_LCID: 0OSBUILD_TIMESTAMP: 2017-04-27 19:39:04BUILDDATESTAMP_STR: 170427-1353BUILDLAB_STR: rs1_release_secBUILDOSVER_STR: 10.0.14393.1198.amd64fre.rs1_release_sec.170427-1353ANALYSIS_SESSION_ELAPSED_TIME: 876ANALYSIS_SOURCE: KMFAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!exfreepoolFAILURE_ID_HASH: {909fba96-793b-fcdd-307f-f96f328d53ad}Followup: Pool_corruption---------2: kd> lmvm Pool_CorruptionBrowse full module liststart end module name