Windows10 OS, random BSoDs with different error codes. Issues have been ongoing for over 18 months.
Troubleshooting done so far:
OS and Drivers kept up to date on a weekly basis
Video card replaced - no change
Power supply replaced - no change
Motherboard, RAM, CPU replaced - no change
Hard drives were replaced and whole system reimaged to a fresh Windows 10 install, as per MS support -- no change.
At this point the whole machine has been replaced with the exception of the case and apparently like the Ship of Thesus it's the same ship with the same problems.
minidump below:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\admin\OneDrive\Desktop\051022-8375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff8027b400000 PsLoadedModuleList = 0xfffff802
7c02a290
Debug session time: Tue May 10 23:49:45.081 2022 (UTC - 7:00)
System Uptime: 0 days 12:56:34.772
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff8027b7f7d50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff88d
b7d3a320=000000000000003b
1: kd> !analyze -v
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffffc59b18eaa48, Address of the instruction which caused the BugCheck
Arg3: fffff88db7d3ac20, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3093
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10756
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 15202
Key : Analysis.Memory.CommitPeak.Mb
Value: 105
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051022-8375-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffffc59b18eaa48
BUGCHECK_P3: fffff88db7d3ac20
BUGCHECK_P4: 0
CONTEXT: fffff88db7d3ac20 -- (.cxr 0xfffff88db7d3ac20)
rax=00000000000000de rbx=fffffc24c433d3c0 rcx=fffffc24c5fc1010
rdx=0000000000000064 rsi=fffffc24c433c0a8 rdi=0000000000000200
rip=fffffc59b18eaa48 rsp=fffff88db7d3b620 rbp=fffffc24c433d408
r8=0000000000000000 r9=ffffc50b1efecdc8 r10=ffffc50b1efece44
r11=fffffc24c5f2dd20 r12=00000000000000de r13=000000000000000a
r14=fffffc24c433d3f4 r15=fffffc24c433d3f0
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!TimersProc+0x1e8:
fffffc59b18eaa48 8b8a10040000 mov ecx,dword ptr [rdx+410h] ds:002b:00000000
00000474=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
fffff88db7d3b620 fffffc59
b18ea546 : 000000000000000f 00000000
02c6facd 0000000000000001 00000000
00000004 : win32kfull!TimersProc+0x1e8
fffff88db7d3b6b0 fffffc59
b167fc14 : ffffc50b201e0080 ffffc50b
201e0080 0000000000000000 00000000
00000005 : win32kfull!RawInputThread+0x7f6
fffff88db7d3b870 fffffc59
b1974a21 : ffffc50b201e0080 00000000
00000000 0000000000000005 00000000
00000005 : win32kbase!xxxCreateSystemThreads+0xc4
fffff88db7d3b9a0 fffffc59
b1f7474e : ffffc50b201e0080 ffffc50b
201e0080 0000000000000000 00000000
00000000 : win32kfull!NtUserCallNoParam+0x71
fffff88db7d3b9d0 fffff802
7b8096b5 : ffffc50b00000005 00000000
00000005 000001ef63004fe0 00000000
00000480 : win32k!NtUserCallNoParam+0x16
fffff88db7d3ba00 00007ffd
17da10e4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x25
00000005cd03f9d8 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ffd`17da10e4
SYMBOL_NAME: win32kfull!TimersProc+1e8
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.1645
STACK_COMMAND: .cxr 0xfffff88db7d3ac20 ; kb
BUCKET_ID_FUNC_OFFSET: 1e8
FAILURE_BUCKET_ID: AV_win32kfull!TimersProc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4204da86-0e34-a6fb-28f3-793ac186b089}
Followup: MachineOwner
1: kd> .cxr 0xfffff88db7d3ac20
rax=00000000000000de rbx=fffffc24c433d3c0 rcx=fffffc24c5fc1010
rdx=0000000000000064 rsi=fffffc24c433c0a8 rdi=0000000000000200
rip=fffffc59b18eaa48 rsp=fffff88db7d3b620 rbp=fffffc24c433d408
r8=0000000000000000 r9=ffffc50b1efecdc8 r10=ffffc50b1efece44
r11=fffffc24c5f2dd20 r12=00000000000000de r13=000000000000000a
r14=fffffc24c433d3f4 r15=fffffc24c433d3f0
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!TimersProc+0x1e8:
fffffc59b18eaa48 8b8a10040000 mov ecx,dword ptr [rdx+410h] ds:002b:00000000
00000474=????????
1: kd> dx
@$debuggerRootNamespace
Debugger
Sessions
Settings
State
Utility
1: kd> dx KiBugCheckDriver
Unimplemented error for KiBugCheckDriver
Error: Unable to bind name 'KiBugCheckDriver'
1: kd> !error 00000000c0000005
Error code: (NTSTATUS) 0xc0000005 (3221225477) - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
1: kd> kb
*** Stack trace for last set context - .thread/.cxr resets it
RetAddr : Args to Child : Call Site
00 fffffc59b18ea546 : 00000000
0000000f 0000000002c6facd 00000000
00000001 0000000000000004 : win32kfull!TimersProc+0x1e8 01 fffffc59
b167fc14 : ffffc50b201e0080 ffffc50b
201e0080 0000000000000000 00000000
00000005 : win32kfull!RawInputThread+0x7f6
02 fffffc59b1974a21 : ffffc50b
201e0080 0000000000000000 00000000
00000005 0000000000000005 : win32kbase!xxxCreateSystemThreads+0xc4 03 fffffc59
b1f7474e : ffffc50b201e0080 ffffc50b
201e0080 0000000000000000 00000000
00000000 : win32kfull!NtUserCallNoParam+0x71
04 fffff8027b8096b5 : ffffc50b
00000005 0000000000000005 000001ef
63004fe0 0000000000000480 : win32k!NtUserCallNoParam+0x16 05 00007ffd
17da10e4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x25
06 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : 0x00007ffd
17da10e4