Can anyone help me analyse this dump file?

Wakitipu

New member
Apr 12, 2022
1
0
0
Visit site
I have no idea what any of this means, brand new laptop, occasionally crashing. Really like the laptop so would like to not have to replace it!

Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Dump completed successfully, progress percentage: 100

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff801`4c800000 PsLoadedModuleList = 0xfffff801`4d429c70
Debug session time: Tue Apr 12 12:55:53.015 2022 (UTC + 1:00)
System Uptime: 0 days 2:30:08.653
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000d5`acf27018). Type ".hh dbgerr001" for details
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`4cc16990 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff8c04`ef0ae6b0=0000000000000139
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff8c04ef0ae9d0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff8c04ef0ae928, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2483

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6049

Key : Analysis.Init.CPU.mSec
Value: 1702

Key : Analysis.Init.Elapsed.mSec
Value: 63292

Key : Analysis.Memory.CommitPeak.Mb
Value: 99

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: co_release

Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z

Key : WER.OS.Version
Value: 10.0.22000.1

FILE_IN_CAB: MEMORY.DMP

DUMP_FILE_ATTRIBUTES: 0x1000

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff8c04ef0ae9d0

BUGCHECK_P3: ffff8c04ef0ae928

BUGCHECK_P4: 0

TRAP_FRAME: ffff8c04ef0ae9d0 -- (.trap 0xffff8c04ef0ae9d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc28f3a31da88 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014ca465d9 rsp=ffff8c04ef0aeb60 rbp=ffffc28f2f1821b0
r8=0000000000000000 r9=0000000000000002 r10=000000000000000e
r11=fffff80145103d80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiProcessThreadWaitList+0x99:
fffff801`4ca465d9 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffff8c04ef0ae928 -- (.exr 0xffff8c04ef0ae928)
ExceptionAddress: fffff8014ca465d9 (nt!KiProcessThreadWaitList+0x0000000000000099)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: OUTLOOK.EXE

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

DPC_STACK_BASE: FFFF8C04EF0AEFB0

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff8c04`ef0ae6a8 fffff801`4cc295a9 : 00000000`00000139 00000000`00000003 ffff8c04`ef0ae9d0 ffff8c04`ef0ae928 : nt!KeBugCheckEx
ffff8c04`ef0ae6b0 fffff801`4cc299f2 : 00000000`00000000 00000000`0000000f ffffc28f`19a21e38 fffff801`4ca51a56 : nt!KiBugCheckDispatch+0x69
ffff8c04`ef0ae7f0 fffff801`4cc27cd2 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xb2
ffff8c04`ef0ae9d0 fffff801`4ca465d9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x312
ffff8c04`ef0aeb60 fffff801`4ca457d6 : 00000000`00000000 ffff8d01`00000001 ffff8c04`00000000 ffff8d01`00000002 : nt!KiProcessThreadWaitList+0x99
ffff8c04`ef0aebd0 fffff801`4ca43c54 : ffff8d01`837e0180 ff48ce8b`00000000 00000014`f98e93bc fffff801`45106f08 : nt!KiProcessExpiredTimerList+0x376
ffff8c04`ef0aed00 fffff801`4cc1e725 : ed324000`000001b9 ffff8d01`837e0180 ffffc28f`1392a500 00007ffb`8a7cace0 : nt!KiRetireDpcList+0x714
ffff8c04`ef0aefb0 fffff801`4cc1e500 : fffff801`4cc12950 fffff801`4caaf3fa ffffc28f`26cd4080 00000000`00000004 : nt!KxRetireDpcList+0x5
ffff8c04`f35f7aa0 fffff801`4cc1dd45 : 00007ffb`8a7cace0 fffff801`4cc18be1 00000000`00000000 ffff8c04`f35f7b60 : nt!KiDispatchInterruptContinue
ffff8c04`f35f7ad0 fffff801`4cc18be1 : 00000000`00000000 ffff8c04`f35f7b60 0000020a`b12cef90 ffffc28f`00000000 : nt!KiDpcInterruptBypass+0x25
ffff8c04`f35f7ae0 00007ffb`89e11688 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
000000d5`acd7ef70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`89e11688

SYMBOL_NAME: nt!KiProcessExpiredTimerList+376

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 376

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {9db7945b-255d-24a1-9f2c-82344e883ab8}

Followup: MachineOwner
---------
 

HelloNNNewman

Administrator
Moderator
Oct 30, 2012
2,777
97
48
Visit site
Hi Wakitipu,

You may not get a lot of assistance with analyzing dump files here, but I would point you over to the Microsoft forums themselves for this as there are members there who help with these all the time. To give you a direction - here is a similar post with directions on how to verify memory and drivers as the first two steps (not the same as yours, but takes you to that forum to post).

Good luck if no one here can help analyze your files!
 

Members online

Forum statistics

Threads
323,308
Messages
2,243,612
Members
428,056
Latest member
Carnes