Hi c: Recently I decided to get a new computer as my old one was quite out of date however this exception has been plaguing me ever since I got the computer around Christmas. I've tried countless solutions to try and alleviate the error. I've flashed the most recent version of the BIOS onto the motherboard, I've ran memtests, I've swapped out the ram with different ram and the issue persists. I've tried disabling XMP and keeping the ram at a lower rate. I've managed my temps while playing games in HW monitor, the CPU will stay at a average of about 45C~ and wont really vary aside from the occasional 1 second spikes to 70C~ . I've tried messing with the VCORE and I still get the crashes regardless. I don't think anything in particular really causes the crash to happen aside from the PC seeming to not like WoW in particular. The crash isn't exactly a BSOD but the monitors go black and the PC hangs and is unusable unless I restart the PC VIA the power button. I'm starting to believe that it might be a hardware issue but i'm hoping for the best. Any help is really appreciated c: Specs:
Intel® Core™ Processor i9-10900KF
ASUS PRIME Z490-V
1,000 Watts - Standard 80 Plus Gold Power Supply
GeForce RTX™ 3080 10GB
Cooler Master MASTERLIQUID ML240L V2 240mm
Intel® Core™ Processor i9-10900KF
ASUS PRIME Z490-V
1,000 Watts - Standard 80 Plus Gold Power Supply
GeForce RTX™ 3080 10GB
Cooler Master MASTERLIQUID ML240L V2 240mm
Microsoft ® Windows Debugger Version 10.0.21306.1007 AMD64
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805
Debug session time: Wed Apr 7 20:20:48.150 2021 (UTC - 7:00)
System Uptime: 0 days 0:01:47.791
Loading Kernel Symbols
...............................................................
...Page 16977a not present in the dump file. Type ".hh dbgerr004" for details
.............................................................
................................................................
..........
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000fa
SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c3
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805
29800000 PsLoadedModuleList = 0xfffff805
2a42a490Debug session time: Wed Apr 7 20:20:48.150 2021 (UTC - 7:00)
System Uptime: 0 days 0:01:47.791
Loading Kernel Symbols
...............................................................
...Page 16977a not present in the dump file. Type ".hh dbgerr004" for details
.............................................................
................................................................
..........
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000fa
3b040018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805
29bf5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb380cbce7d30=000000000000007f
3: kd> !analyze -v
*******************************************************************************
[LIST]
[*]*
[*]Bugcheck Analysis *
[*]*
[/LIST]
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffb380cbce7e70
Arg3: ffffb380cbce1f70
Arg4: fffff80529c07b8f
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1436
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1462
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 38272
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffffb380cbce7e70
BUGCHECK_P3: ffffb380cbce1f70
BUGCHECK_P4: fffff80529c07b8f
TRAP_FRAME: ffffb380cbce22e0 -- (.trap 0xffffb380cbce22e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=d06d8b4cffea024e rbx=0000000000000000 rcx=e9c933ffea0205e9
rdx=0000e5bbffea020e rsi=0000000000000000 rdi=0000000000000000
rip=023dc88bffbf31a4 rsp=450fc00000e5bbc9 rbp=02202444c7c68b48
r8=f883ffea0234e9c0 r9=0f00c7f741137530 r10=0002b9bb0a750000
r11=da8bffea011ce9c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=3 ov up ei ng zr ac po cy
0000:31a4 ?? ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: EpicGamesLauncher.exe
BAD_STACK_POINTER: ffffb380cbce1f70
UNALIGNED_STACK_POINTER: 450fc00000e5bbc9
STACK_TEXT:
ffffb380
cbce7d28 fffff80529c07b69 : 00000000
0000007f 0000000000000008 ffffb380
cbce7e70 ffffb380cbce1f70 : nt!KeBugCheckEx
ffffb380
cbce7d30 fffff80529c02983 : e8000000
908d8d48 989d3948ff9f53d4 568d4817
74000000 908d8d4801b04128 : nt!KiBugCheckDispatch+0x69
ffffb380
cbce7e70 fffff80529c07b8f : 00000000
00000000 0000000000000000 00000000
00000000 0000000000000000 : nt!KiDoubleFaultAbort+0x2c3
ffffb380
cbce1f70 fffff80529c039e0 : 8bffe9fa
7fe9c000 680e058d4c402444 e9482454
8b48fffb b5e9c933ffe9faac : nt!KiExceptionDispatch+0xf
ffffb380
cbce2150 fffff80529c03a00 : 00000000
00000002 fffff80529c07c04 00000000
00000010 0000000000050086 : nt!KiGeneralProtectionFault+0x320
ffffb380
cbce22e0 fffff80529c07c04 : e9c933ff
ea0205e9 0000e5bbffea020e f883ffea
0234e9c0 0f00c7f741137530 : nt!KiPageFault
ffffb380
cbce2318 0000000000000000 : 00000000
00000000 00000000cbce2500 00000000
00000000 00000000`00000000 : nt!KiExceptionDispatch+0x84SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c3
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}