so i built this computer for my brother a while ago and it gets blue screen error fault page the most. sometimes it runs fine but all the steam games gets event id 1000 after running for awhile. I've swap out all parts so far except the CPU.
I also have dump files. This is the latest one.
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\080820-4468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806
Debug session time: Sat Aug 8 17:36:13.773 2020 (UTC - 5:00)
System Uptime: 0 days 0:01:27.383
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806
10: kd> !analyze -v
***
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffac87dbf57068, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80653bf9171, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SOFF5B2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13675
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffac87dbf57068
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80653bf9171
BUGCHECK_P4: 2
READ_ADDRESS: fffff806542fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8065420f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8065420f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffac87dbf57068
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
TRAP_FRAME: ffff8c812267d590 -- (.trap 0xffff8c812267d590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffac87dbf570 rbx=0000000000000000 rcx=00000000001fffff
rdx=ffffac86cbaa16c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80653bf9171 rsp=ffff8c812267d720 rbp=00000000001fffff
r8=ffffd70b6e33f001 r9=fffff80653600000 r10=0000fffff80653c0
r11=ffff8af9f6c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!ObpReferenceObjectByHandleWithTag+0x191:
fffff806
Resetting default scope
STACK_TEXT:
ffff8c81
ffff8c81
ffff8c81
ffff8c81
ffff8c81
ffff8c81
ffff8c81
ffff8c81
00000000
I also have dump files. This is the latest one.
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\080820-4468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806
53600000 PsLoadedModuleList = 0xfffff806
5422a310Debug session time: Sat Aug 8 17:36:13.773 2020 (UTC - 5:00)
System Uptime: 0 days 0:01:27.383
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806
539ddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8c81
2267d2f0=000000000000005010: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffac87dbf57068, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80653bf9171, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SOFF5B2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13675
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffac87dbf57068
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80653bf9171
BUGCHECK_P4: 2
READ_ADDRESS: fffff806542fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8065420f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8065420f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffac87dbf57068
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
TRAP_FRAME: ffff8c812267d590 -- (.trap 0xffff8c812267d590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffac87dbf570 rbx=0000000000000000 rcx=00000000001fffff
rdx=ffffac86cbaa16c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80653bf9171 rsp=ffff8c812267d720 rbp=00000000001fffff
r8=ffffd70b6e33f001 r9=fffff80653600000 r10=0000fffff80653c0
r11=ffff8af9f6c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!ObpReferenceObjectByHandleWithTag+0x191:
fffff806
53bf9171 324318 xor al,byte ptr [rbx+18h] ds:00000000
00000018=??Resetting default scope
STACK_TEXT:
ffff8c81
2267d2e8 fffff806
53a35d15 : 0000000000000050 ffffac87
dbf57068 0000000000000000 ffff8c81
2267d590 : nt!KeBugCheckExffff8c81
2267d2f0 fffff806
53812d00 : 0000000000000000 00000000
00000000 ffff8c812267d610 00000000
00000000 : nt!MiSystemFault+0x1ad5c5ffff8c81
2267d3f0 fffff806
539ebc1e : ffffbf0ac5f0b010 ffffbf0a
c5d73bd0 0000000000000000 00003dff
00000003 : nt!MmAccessFault+0x400ffff8c81
2267d590 fffff806
53bf9171 : 0000000000000001 ffffac86
dbf85040 0000000000000000 00000000
00000000 : nt!KiPageFault+0x35effff8c81
2267d720 fffff806
53bf8f91 : ffffac86daef4080 00000000
00000800 ffffac86cbaa16c0 ffffbf34
56e5e201 : nt!ObpReferenceObjectByHandleWithTag+0x191ffff8c81
2267d7b0 fffff806
53c084d7 : fffff80653951a20 fffff806
538e73ef 0000000000000000 fffff806
00000000 : nt!ObReferenceObjectByHandleWithTag+0x31ffff8c81
2267d800 fffff806
539ef478 : 00000000012fe048 00000000
0001070c ffff8c812267db80 00000000
0001070c : nt!NtQueryInformationThread+0x407ffff8c81
2267da90 00007ff9
dc68b234 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x2800000000
00fee0f8 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ff9dc68b234
SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+191
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 191
FAILURE_BUCKET_ID: AV_R_INVALID_nt!ObpReferenceObjectByHandleWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f4aa4813-859f-bca9-f895-c515f8dded21}
Followup: MachineOwner
---------
10: kd> .trap 0xffff8c812267d590
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffac87dbf570 rbx=0000000000000000 rcx=00000000001fffff
rdx=ffffac86cbaa16c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80653bf9171 rsp=ffff8c812267d720 rbp=00000000001fffff
r8=ffffd70b6e33f001 r9=fffff80653600000 r10=0000fffff80653c0
r11=ffff8af9f6c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!ObpReferenceObjectByHandleWithTag+0x191:
fffff806
53bf9171 324318 xor al,byte ptr [rbx+18h] ds:00000000`00000018=??