BSOD and games crashing to desktop.

L

lilYahyeet

I recently built my pc and it was constantly blue screening(usually memory management error)

and files were corrupting. I took it into geek squad to see what the issue was and it turned out to be my ram slots were damaged. I bought a new mobo and got it replaced but yet again I'm running into blue screens and games ctd. This time though dism and sfc found no issues. I cant launch the blue screen troubleshooter due to it saying windows online troubleshooting service is disabled. I'm really not sure what to do here, I'll place my most recent dump file from the crash below. Any help would be greatly appreciated.






************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`12800000 PsLoadedModuleList = 0xfffff801`1342a3b0
Debug session time: Sun Nov 29 17:06:52.585 2020 (UTC - 10:00)
System Uptime: 0 days 0:00:30.207
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000b8`53fb5018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff801`12bf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa289`953001f0=000000000000001a
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the bugcheck.
Arg2: ffffca0f979c8010
Arg3: ffff928177a48000
Arg4: ffffb80cc927a973

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2390

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-L1V699Q

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 2422

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 31

BUGCHECK_P2: ffffca0f979c8010

BUGCHECK_P3: ffff928177a48000

BUGCHECK_P4: ffffb80cc927a973

BLACKBOXBSD: 1 (
!blackboxbsd)


BLACKBOXNTFS: 1 (
!blackboxntfs)


BLACKBOXWINLOGON: 1

PROCESS_NAME: msedge.exe

STACK_TEXT:
ffffa289`953001e8 fffff801`1303fd1b : 00000000`0000001a 00000000`00000031 ffffca0f`979c8010 ffff9281`77a48000 : nt!KeBugCheckEx
ffffa289`953001f0 fffff801`12efff7c : ffff9281`77a48000 ffffb80c`c927a8e8 00000000`00008488 00000000`00000000 : nt!MiApplyCompressedFixups+0x13ff5b
ffffa289`95300250 fffff801`12f0059d : ffffca0f`97fe2080 ffffca0f`979c8010 00007ffa`8bc80000 00000000`00008488 : nt!MiPerformFixups+0x88
ffffa289`953002f0 fffff801`12b32620 : 00000000`00000000 00000000`0000000c 00000000`00000000 00000000`00000350 : nt!MiRelocateImagePfn+0x18d
ffffa289`95300360 fffff801`12b199a4 : ffffca0f`00000000 ffffa289`00000000 00000000`00000000 ffffca0f`98ab4080 : nt!MiValidateInPage+0x260
ffffa289`95300410 fffff801`12a287bf : ffffa289`000f5000 ffffa289`95300b00 ffffa289`95300530 ffffca0f`00000000 : nt!MiWaitForInPageComplete+0x314
ffffa289`95300500 fffff801`12a2886d : ffffa289`95300678 ffffca0f`98ab4700 ffffa289`95300678 00000000`00000000 : nt!MiPfCompleteInPageSupport+0x83
ffffa289`953005f0 fffff801`12b5124c : 00000000`0004402d ffffca0f`97fe2080 ffffca0f`90ae7cc0 00007ffc`52b6d400 : nt!MiPfCompletePrefetchIos+0x51
ffffa289`95300620 fffff801`12e0cb7c : 00000000`00000000 ffffca0f`97fe2080 00000000`00000000 00000007`00000000 : nt!MiPrefetchVirtualMemory+0x36c
ffffa289`95300720 fffff801`12c06bb8 : 00000000`00000000 ffffca0f`97fe2080 00000000`00000000 00000000`00000000 : nt!NtSetInformationVirtualMemory+0x64c
ffffa289`95300a90 00007ffc`5530f154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b8`547ff668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`5530f154


SYMBOL_NAME: nt!MiApplyCompressedFixups+13ff5b

MODULE_NAME:
nt

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 13ff5b

FAILURE_BUCKET_ID: 0x1a_31_nt!MiApplyCompressedFixups

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c331f2d1-f573-4955-bed6-0e48314e3a31}

Followup: MachineOwner
---------

2: kd> lmvm nt
Browse full module list
start end module name
fffff801`12800000 fffff801`13846000
nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\15B12C74F0E177581B6B27DD4C5022C21\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\64EBCC571046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 64EBCC57 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5A624
ImageSize: 01046000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:


Continue reading...
 
Back
Top Bottom