Share via

Constant System Instability and BSOD Boot Loop Asus Z690 Nvidia 3090 i9 13900k 64GB Trident GSkill RAM Samsung 990 Pro NVMe SSD 2TB

Anonymous
2024-05-30T04:50:14+00:00

I built this system over 2 years ago and it was my dream build. Now I can’t even get on it. Constant BSOD crashes. Chrome crashes. Discord crashes. I’ve tried everything.

Memtest indicates no errors. I even did 1 stick at a time.

I got a replacement CPU from Intel.

I manually updated my drivers.

I’m on the latest BIOS version.

Windows is updated.

Graphics driver is updated.

BIOS at default settings.

I’m considering throwing this entire pc away for a new one. I don’t know what else to do.

Please help me

Windows for home | Windows 10 | Performance and system failures

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question.

0 comments No comments

2 answers

Sort by: Most helpful
  1. Anonymous
    2024-05-30T04:58:45+00:00

    DMP File #2

    ************* Preparing the environment for Debugger Extensions Gallery repositories **************
       ExtensionRepository : Implicit
       UseExperimentalFeatureForNugetShare : true
       AllowNugetExeUpdate : true
       NonInteractiveNuget : true
       AllowNugetMSCredentialProviderInstall : true
       AllowParallelInitializationOfLocalRepositories : true
    
       EnableRedirectToV8JsProvider : false
    
       -- Configuring repositories
          ----> Repository : LocalInstalled, Enabled: true
          ----> Repository : UserExtensions, Enabled: true
    
    >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
    
    ************* Waiting for Debugger Extensions Gallery to Initialize **************
    
    >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
       ----> Repository : UserExtensions, Enabled: true, Packages count: 0
       ----> Repository : LocalInstalled, Enabled: true, Packages count: 41
    
    Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    Loading Dump File [C:\Windows\Minidump\053024-6812-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       srv*
    Symbol search path is: srv*
    Executable search path is: 
    Windows 10 Kernel Version 19041 MP (32 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Kernel base = 0xfffff802`65e00000 PsLoadedModuleList = 0xfffff802`66a2a7c0
    Debug session time: Thu May 30 00:40:23.608 2024 (UTC - 4:00)
    System Uptime: 0 days 0:00:45.227
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 00000037`3a7cc018).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    ......
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff802`661fdaf0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff10a`75f156a0=000000000000013a
    10: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_HEAP_CORRUPTION (13a)
    The kernel mode heap manager has detected corruption in a heap.
    Arguments:
    Arg1: 0000000000000012, Type of corruption detected
    Arg2: ffffa58d27c00100, Address of the heap that reported the corruption
    Arg3: ffffa58d36674000, Address at which the corruption was detected
    Arg4: 0000000000000000
    
    Debugging Details:
    ------------------
    
    KEY_VALUES_STRING: 1
    
        Key  : Analysis.CPU.mSec
        Value: 1250
    
        Key  : Analysis.Elapsed.mSec
        Value: 2090
    
        Key  : Analysis.IO.Other.Mb
        Value: 0
    
        Key  : Analysis.IO.Read.Mb
        Value: 0
    
        Key  : Analysis.IO.Write.Mb
        Value: 0
    
        Key  : Analysis.Init.CPU.mSec
        Value: 217
    
        Key  : Analysis.Init.Elapsed.mSec
        Value: 2741
    
        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 92
    
        Key  : Bugcheck.Code.LegacyAPI
        Value: 0x13a
    
        Key  : Bugcheck.Code.TargetModel
        Value: 0x13a
    
        Key  : Failure.Bucket
        Value: 0x13a_12_nvlddmkm!unknown_function
    
        Key  : Failure.Hash
        Value: {a796bf4c-66c5-2334-6cf1-fb1d4a426bad}
    
        Key  : WER.OS.Branch
        Value: vb_release
    
        Key  : WER.OS.Version
        Value: 10.0.19041.1
    
    BUGCHECK_CODE:  13a
    
    BUGCHECK_P1: 12
    
    BUGCHECK_P2: ffffa58d27c00100
    
    BUGCHECK_P3: ffffa58d36674000
    
    BUGCHECK_P4: 0
    
    FILE_IN_CAB:  053024-6812-01.dmp
    
    CORRUPTING_POOL_ADDRESS: fffff80266afb390: Unable to get MiVisibleState
    Unable to get NonPagedPoolStart
    Unable to get NonPagedPoolEnd
    Unable to get PagedPoolStart
    Unable to get PagedPoolEnd
     ffffa58d36674000 
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  OAWrapper.exe
    
    STACK_TEXT:  
    fffff10a`75f15698 fffff802`66394a3c     : 00000000`0000013a 00000000`00000012 ffffa58d`27c00100 ffffa58d`36674000 : nt!KeBugCheckEx
    fffff10a`75f156a0 fffff802`66394a9c     : 00000000`00000012 ffffa58d`27c00280 ffffa58d`27c00100 ffffa58d`27c00290 : nt!RtlpHeapHandleError+0x40
    fffff10a`75f156e0 fffff802`663946c9     : ffffa58d`366deac8 fffff10a`75f15804 ffffb901`00000000 fffff10a`75f15804 : nt!RtlpHpHeapHandleError+0x58
    fffff10a`75f15710 fffff802`6622bdc8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000060 : nt!RtlpLogHeapFailure+0x45
    fffff10a`75f15740 fffff802`6602edb8     : 00000000`00000002 ffffa58d`00000500 fffff10a`75f15881 00000000`00000500 : nt!RtlpHpVsContextAllocateInternal+0x1fb138
    fffff10a`75f157a0 fffff802`6602e4ff     : ffffa58d`00000002 ffff940b`ebbba000 00010000`464c764e 00000000`00000002 : nt!ExAllocateHeapPool+0x888
    fffff10a`75f158e0 fffff802`667b7323     : 00000000`464c764e ffff940b`eb157000 00000000`00000000 fffff802`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
    fffff10a`75f15930 fffff802`8ed1341f     : 00000000`000004d0 00000000`00000000 00000000`00000100 ffff940b`00000000 : nt!ExAllocatePool2+0xa3
    fffff10a`75f15980 00000000`000004d0     : 00000000`00000000 00000000`00000100 ffff940b`00000000 00000000`00001001 : nvlddmkm+0xbc341f
    fffff10a`75f15988 00000000`00000000     : 00000000`00000100 ffff940b`00000000 00000000`00001001 00000000`00000fff : 0x4d0
    
    SYMBOL_NAME:  nvlddmkm+bc341f
    
    MODULE_NAME: nvlddmkm
    
    IMAGE_NAME:  nvlddmkm.sys
    
    STACK_COMMAND:  .cxr; .ecxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  bc341f
    
    FAILURE_BUCKET_ID:  0x13a_12_nvlddmkm!unknown_function
    
    OS_VERSION:  10.0.19041.1
    
    BUILDLAB_STR:  vb_release
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    FAILURE_ID_HASH:  {a796bf4c-66c5-2334-6cf1-fb1d4a426bad}
    
    Followup:     MachineOwner
    ---------
    

    Was this answer helpful?

    0 comments No comments
  2. Anonymous
    2024-05-30T04:56:50+00:00

    DMP File #1

    ************* Preparing the environment for Debugger Extensions Gallery repositories **************
       ExtensionRepository : Implicit
       UseExperimentalFeatureForNugetShare : true
       AllowNugetExeUpdate : true
       NonInteractiveNuget : true
       AllowNugetMSCredentialProviderInstall : true
       AllowParallelInitializationOfLocalRepositories : true
    
       EnableRedirectToV8JsProvider : false
    
       -- Configuring repositories
          ----> Repository : LocalInstalled, Enabled: true
          ----> Repository : UserExtensions, Enabled: true
    
    >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
    
    ************* Waiting for Debugger Extensions Gallery to Initialize **************
    
    >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
       ----> Repository : UserExtensions, Enabled: true, Packages count: 0
       ----> Repository : LocalInstalled, Enabled: true, Packages count: 41
    
    Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    Loading Dump File [C:\Windows\Minidump\053024-7234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       srv*
    Symbol search path is: srv*
    Executable search path is: 
    Windows 10 Kernel Version 19041 MP (32 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Kernel base = 0xfffff800`0f600000 PsLoadedModuleList = 0xfffff800`1022a7c0
    Debug session time: Thu May 30 00:42:08.294 2024 (UTC - 4:00)
    System Uptime: 0 days 0:00:35.912
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 000000dc`153a8018).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    ...........
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff800`0f9fdaf0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff808a`a7c9bf70=000000000000003b
    10: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the BugCheck
    Arg2: fffff800375bebc7, Address of the instruction which caused the BugCheck
    Arg3: ffff808aa7c9c870, Address of the context record for the exception that caused the BugCheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    KEY_VALUES_STRING: 1
    
        Key  : Analysis.CPU.mSec
        Value: 1609
    
        Key  : Analysis.Elapsed.mSec
        Value: 2889
    
        Key  : Analysis.IO.Other.Mb
        Value: 0
    
        Key  : Analysis.IO.Read.Mb
        Value: 0
    
        Key  : Analysis.IO.Write.Mb
        Value: 0
    
        Key  : Analysis.Init.CPU.mSec
        Value: 249
    
        Key  : Analysis.Init.Elapsed.mSec
        Value: 2234
    
        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 87
    
        Key  : Bugcheck.Code.LegacyAPI
        Value: 0x3b
    
        Key  : Bugcheck.Code.TargetModel
        Value: 0x3b
    
        Key  : Failure.Bucket
        Value: AV_nvlddmkm!unknown_function
    
        Key  : Failure.Hash
        Value: {7eea5677-f68d-2154-717e-887e07e55cd3}
    
        Key  : WER.OS.Branch
        Value: vb_release
    
        Key  : WER.OS.Version
        Value: 10.0.19041.1
    
    BUGCHECK_CODE:  3b
    
    BUGCHECK_P1: c0000005
    
    BUGCHECK_P2: fffff800375bebc7
    
    BUGCHECK_P3: ffff808aa7c9c870
    
    BUGCHECK_P4: 0
    
    FILE_IN_CAB:  053024-7234-01.dmp
    
    CONTEXT:  ffff808aa7c9c870 -- (.cxr 0xffff808aa7c9c870)
    rax=0000087000000f00 rbx=ffffbe0de49df420 rcx=00000000ffffffb7
    rdx=0000000000000020 rsi=ffff808aa7c9d570 rdi=000000000000000b
    rip=fffff800375bebc7 rsp=ffff808aa7c9d270 rbp=ffff808aa7c9d329
     r8=0000000000000006  r9=0000000000000aab r10=0000000000000054
    r11=0000000000000006 r12=0000000000000000 r13=47ae147ae147ae15
    r14=ffff808aa7c9d490 r15=ffff808aa7c9d4c0
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
    nvlddmkm+0x2ebc7:
    fffff800`375bebc7 48634808        movsxd  rcx,dword ptr [rax+8] ds:002b:00000870`00000f08=????????
    Resetting default scope
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  csrss.exe
    
    STACK_TEXT:  
    ffff808a`a7c9d270 00000000`00000aaa     : 00000000`0000000b 00000003`00000003 00000004`00000001 00000005`00000005 : nvlddmkm+0x2ebc7
    ffff808a`a7c9d278 00000000`0000000b     : 00000003`00000003 00000004`00000001 00000005`00000005 00000006`00000006 : 0xaaa
    ffff808a`a7c9d280 00000003`00000003     : 00000004`00000001 00000005`00000005 00000006`00000006 fffff800`381e2800 : 0xb
    ffff808a`a7c9d288 00000004`00000001     : 00000005`00000005 00000006`00000006 fffff800`381e2800 fffff800`381e27f0 : 0x00000003`00000003
    ffff808a`a7c9d290 00000005`00000005     : 00000006`00000006 fffff800`381e2800 fffff800`381e27f0 00000006`00000000 : 0x00000004`00000001
    ffff808a`a7c9d298 00000006`00000006     : fffff800`381e2800 fffff800`381e27f0 00000006`00000000 fffff800`381e27d0 : 0x00000005`00000005
    ffff808a`a7c9d2a0 fffff800`381e2800     : fffff800`381e27f0 00000006`00000000 fffff800`381e27d0 00000000`00000000 : 0x00000006`00000006
    ffff808a`a7c9d2a8 fffff800`381e27f0     : 00000006`00000000 fffff800`381e27d0 00000000`00000000 fffff800`381e27a0 : nvlddmkm+0xc52800
    ffff808a`a7c9d2b0 00000006`00000000     : fffff800`381e27d0 00000000`00000000 fffff800`381e27a0 00000000`fffffff8 : nvlddmkm+0xc527f0
    ffff808a`a7c9d2b8 fffff800`381e27d0     : 00000000`00000000 fffff800`381e27a0 00000000`fffffff8 fffff800`381e27a8 : 0x00000006`00000000
    ffff808a`a7c9d2c0 00000000`00000000     : fffff800`381e27a0 00000000`fffffff8 fffff800`381e27a8 fffff800`381e27e0 : nvlddmkm+0xc527d0
    
    SYMBOL_NAME:  nvlddmkm+2ebc7
    
    MODULE_NAME: nvlddmkm
    
    IMAGE_NAME:  nvlddmkm.sys
    
    STACK_COMMAND:  .cxr 0xffff808aa7c9c870 ; kb
    
    BUCKET_ID_FUNC_OFFSET:  2ebc7
    
    FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function
    
    OS_VERSION:  10.0.19041.1
    
    BUILDLAB_STR:  vb_release
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}
    
    Followup:     MachineOwner
    ---------
    

    Was this answer helpful?

    0 comments No comments