PC BSOD randomly Windows 10

Jake Dobson 0 Reputation points
2024-01-07T06:24:20.11+00:00

My computer randomly crashes and I dont know how to interpreate the dmp file, can someone help me understand what I should do? Thank you for any help

************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.125 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\cwinn\Desktop\MEMORY 1 - Copy.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff804`3dc00000 PsLoadedModuleList = 0xfffff804`3e82a770
Debug session time: Thu Jan  4 22:48:29.620 2024 (UTC - 8:00)
System Uptime: 0 days 1:52:38.240
Loading Kernel Symbols
...............................................................
......Page 8095e2 not present in the dump file. Type ".hh dbgerr004" for details
..........................................................
..............................................................Page 18856d not present in the dump file. Type ".hh dbgerr004" for details
..
.............................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000002c`cd930018).  Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`3dffd6f0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffc89`d2f4e260=0000000000000050
2: kd> !analyze -v
Page 810dd8 not present in the dump file. Type ".hh dbgerr004" for details
ERROR: FindPlugIns 8007007b
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff804e6f5f5f0, memory referenced.
Arg2: 0000000000000010, X64: bit 0 set if the fault was due to a not-present PTE.
	bit 1 is set if the fault was due to a write, clear if a read.
	bit 3 is set if the processor decided the fault was due to a corrupted PTE.
	bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
	- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
	bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff804e6f5f5f0, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

Page 810dd8 not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Execute

    Key  : Analysis.CPU.mSec
    Value: 3421

    Key  : Analysis.Elapsed.mSec
    Value: 3420

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7327

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x50

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_X_(null)_BAD_IP_bindflt!BfCombinedMappingLookup

    Key  : Failure.Hash
    Value: {963e3010-0d18-2b2b-984a-0bc0125a8755}

    Key  : Hypervisor.Enlightenments.Value
    Value: 0

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 0

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 0

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 0

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 1

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 0

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 0

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 0

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 0

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 0

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 0

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 0

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 16908288

    Key  : Hypervisor.Flags.ValueHex
    Value: 1020000

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 0

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 0

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 0

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 0

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 0

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 0

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 0

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 0

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 0

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 0

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 0

    Key  : Hypervisor.RootFlags.Value
    Value: 0

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 0

    Key  : SecureKernel.HalpHvciEnabled
    Value: 0

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: fffff804e6f5f5f0

BUGCHECK_P2: 10

BUGCHECK_P3: fffff804e6f5f5f0

BUGCHECK_P4: 0

FILE_IN_CAB:  MEMORY 1 - Copy.DMP

READ_ADDRESS:  fffff804e6f5f5f0 

MM_INTERNAL_CODE:  0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  Lethal Company.exe

TRAP_FRAME:  fffffc89d2f4e500 -- (.trap 0xfffffc89d2f4e500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffc886bd242e20
rdx=ffffc886b9beb4b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804e6f5f5f0 rsp=fffffc89d2f4e698 rbp=0000000000000000
 r8=ffffd90330e36d60  r9=0000000000000000 r10=fffff8043bf09d80
r11=fffffc89d2f4e630 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffff804`e6f5f5f0 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS: 
+0
fffff804`e6f5f5f0 ??              ???

STACK_TEXT:  
fffffc89`d2f4e258 fffff804`3e03be2d     : 00000000`00000050 fffff804`e6f5f5f0 00000000`00000010 fffffc89`d2f4e500 : nt!KeBugCheckEx
fffffc89`d2f4e260 fffff804`3de24660     : 00000000`00000000 00000000`00000010 fffffc89`d2f4e580 00000000`00000000 : nt!MiSystemFault+0x1d88cd
fffffc89`d2f4e360 fffff804`3e00d458     : ffffc886`b2feda20 ffffc886`a74cc2a8 fffff804`3bf08060 fffff804`3bee3b18 : nt!MmAccessFault+0x400
fffffc89`d2f4e500 fffff804`e6f5f5f0     : fffff804`a6f5138a fffffc89`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
fffffc89`d2f4e698 fffff804`a6f5138a     : fffffc89`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff804`e6f5f5f0
fffffc89`d2f4e6a0 fffff804`a6f687b2     : fffffc89`d2f4e820 ffffc886`c4e1eb08 00000000`00000001 00000000`00000004 : bindflt!BfCombinedMappingLookup+0x9a
fffffc89`d2f4e720 fffff804`3bee64cb     : 00000000`00000000 00000000`00000000 ffffc886`c4e1ea20 ffffc886`b9bebce0 : bindflt!BfPreCreate+0x4e2
fffffc89`d2f4eac0 fffff804`3bee4603     : fffffc89`d2f4ec00 ffffc886`a7353df2 fffffc89`d2f4ee00 fffff804`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x36b
fffffc89`d2f4ebe0 fffff804`3bf19941     : fffffc89`d2f50000 fffffc89`d2f49000 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0xc3
fffffc89`d2f4ec60 fffff804`3e2ecd2f     : 00000000`000000f8 fffff804`3e5b7074 00000000`00000003 ffffc886`c48a8a20 : FLTMGR!FltpFastIoQueryOpen+0x131
fffffc89`d2f4ed00 fffff804`3e255bfe     : ffffc886`00000000 ffffc886`a73168f0 ffffc886`c48a8e50 fffffc89`00000000 : nt!IopQueryInformation+0x14f
fffffc89`d2f4ed60 fffff804`3e24a4c7     : ffffc886`a73168f0 ffffc886`a7316800 ffffc886`bb308010 ffffd903`13591301 : nt!IopParseDevice+0xfae
fffffc89`d2f4eed0 fffff804`3e252c6a     : ffffc886`bb308001 fffffc89`d2f4f138 fffffc89`00000040 ffffc886`a05f7560 : nt!ObpLookupObjectName+0x1117
fffffc89`d2f4f0a0 fffff804`3e2eb9b5     : 00000000`00000000 0000002c`cdad4f10 00007ffb`35523098 0000002c`cdad4ee0 : nt!ObOpenObjectByNameEx+0x1fa
fffffc89`d2f4f1d0 fffff804`3e011238     : ffffc886`b1b21080 00000000`00000078 ffffc886`b1b21080 00000219`b7513db0 : nt!NtQueryAttributesFile+0x1c5
fffffc89`d2f4f480 00007ffb`8a54d784     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000002c`cdad4ea8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8a54d784


SYMBOL_NAME:  bindflt!BfCombinedMappingLookup+9a

MODULE_NAME: bindflt

IMAGE_NAME:  bindflt.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  9a

FAILURE_BUCKET_ID:  AV_X_(null)_BAD_IP_bindflt!BfCombinedMappingLookup

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {963e3010-0d18-2b2b-984a-0bc0125a8755}

Followup:     MachineOwner
---------

Windows 10
Windows 10
A Microsoft operating system that runs on personal computers and tablets.
11,488 questions
0 comments No comments
{count} votes

7 answers

Sort by: Most helpful
  1. Docs 15,511 Reputation points
    2024-01-16T09:18:21.82+00:00

    The tests results indicated malfunctioning RAM and two drives with bad blocks.

    Replacing the RAM and drives is highly likely to fix the BSOD problems.

    Routine use without unexpected shutdowns and restarts will be confirmation.

    --please don't forget to upvote and Accept as answer if the reply is helpful--

    0 comments No comments

  2. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.