Question My PC keeps giving random BSODs ?

Mar 1, 2024
2
0
10
so i went into the problem details and found this but idk
Source
Windows
Summary
Shut down unexpectedly
Date
‎3/‎1/‎2024 2:14 AM
Status
Not reported
Problem signature
Problem Event Name: BlueScreen
Code: 7e
Parameter 1: ffffffffc000001d
Parameter 2: fffff80559455a6d
Parameter 3: ffffb60288b9f168
Parameter 4: ffff928140de1900
OS version: 10_0_22631
Service Pack: 0_0
Product: 768_1
OS Version: 10.0.22631.2.0.0.768.101
Locale ID: 1033
 
Welcome to the forums, newcomer!

When posting a thread of troubleshooting nature, it's customary to include your full system's specs. Please list the specs to your build like so:
CPU:
CPU cooler:
Motherboard:
Ram:
SSD/HDD:
GPU:
PSU:
Chassis:
OS:
Monitor:
include the age of the PSU apart from it's make and model. BIOS version for your motherboard at this moment of time.
 
CPU:Intel(R) Core(TM) i9-9900K CPU @ 3.60GHz
CPU cooler:Enermax Aquafusion 240mm Argb CP
Motherboard:Asrock Z390 Pantom Gaming 4s-ib
Ram:ddr4 g.skill ripjaws v 16gb 3200 sin x4 = 64gb
SSD/HDD:Samsung SSD 970 Evo Plus 1tb
GPU:Asus RTX 2070 Super 8gb Dual Evo
PSU:EVGA 1200w p2 80 plus platinum fully modified
Chassis:IBUYPower Snowblind S Mid-Tower
OS:Win 11 Home
Monitor:LG 34UC79G-B 34 inch 21:9 UltraGear Full HD IPS Curved 1080p
 
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true

EnableRedirectToV8JsProvider : false

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff800`63000000 PsLoadedModuleList = 0xfffff800`63c2a770
Debug session time: Wed Mar 13 07:20:34.816 2024 (UTC - 5:00)
System Uptime: 0 days 9:20:01.443
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols

Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`633fd5b0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8002`fcb02550=0000000000000050
13: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe7, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffdf7e9ae2fd63, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0xd94f, File: 0x72fd - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll

KEY_VALUES_STRING: 1

Key : AV.Type
Value: Read

Key : Analysis.CPU.mSec
Value: 3718

Key : Analysis.Elapsed.mSec
Value: 5789

Key : Analysis.IO.Other.Mb
Value: 1

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 1

Key : Analysis.Init.CPU.mSec
Value: 781

Key : Analysis.Init.Elapsed.mSec
Value: 127330

Key : Analysis.Memory.CommitPeak.Mb
Value: 95

Key : Bugcheck.Code.KiBugCheckData
Value: 0x50

Key : Bugcheck.Code.LegacyAPI
Value: 0x50

Key : Bugcheck.Code.TargetModel
Value: 0x50

Key : Failure.Bucket
Value: AV_R_(null)_win32kbase!SURFACE::bDeleteSurface

Key : Failure.Hash
Value: {b6eca5ca-792f-4c4c-1643-864ab524a65b}

Key : Hypervisor.Enlightenments.Value
Value: 0

Key : Hypervisor.Enlightenments.ValueHex
Value: 0

Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0

Key : Hypervisor.Flags.ApicEnlightened
Value: 0

Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1

Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0

Key : Hypervisor.Flags.CpuManager
Value: 0

Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0

Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0

Key : Hypervisor.Flags.Epf
Value: 0

Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0

Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1

Key : Hypervisor.Flags.MaxBankNumber
Value: 0

Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0

Key : Hypervisor.Flags.Phase0InitDone
Value: 0

Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key : Hypervisor.Flags.RootScheduler
Value: 0

Key : Hypervisor.Flags.SynicAvailable
Value: 0

Key : Hypervisor.Flags.UseQpcBias
Value: 0

Key : Hypervisor.Flags.Value
Value: 16908288

Key : Hypervisor.Flags.ValueHex
Value: 1020000

Key : Hypervisor.Flags.VpAssistPage
Value: 0

Key : Hypervisor.Flags.VsmAvailable
Value: 0

Key : Hypervisor.RootFlags.AccessStats
Value: 0

Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0

Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0

Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0

Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0

Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0

Key : Hypervisor.RootFlags.IsHyperV
Value: 0

Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0

Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0

Key : Hypervisor.RootFlags.MceEnlightened
Value: 0

Key : Hypervisor.RootFlags.Nested
Value: 0

Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0

Key : Hypervisor.RootFlags.Value
Value: 0

Key : Hypervisor.RootFlags.ValueHex
Value: 0

Key : SecureKernel.HalpHvciEnabled
Value: 0

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 50

BUGCHECK_P1: ffffffffffffffe7

BUGCHECK_P2: 0

BUGCHECK_P3: ffffdf7e9ae2fd63

BUGCHECK_P4: 2

FILE_IN_CAB: MEMORY.DMP

READ_ADDRESS: unable to get nt!PspSessionIdBitmap
ffffffffffffffe7

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

TRAP_FRAME: ffff8002fcb027f0 -- (.trap 0xffff8002fcb027f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdf7e9ae2fd63 rsp=ffff8002fcb02980 rbp=0000000000000080
r8=0000000000000020 r9=0000000000000001 r10=0000000000000000
r11=fffff80063000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
Page 7be293 not present in the dump file. Type ".hh dbgerr004" for details
Page 7be293 not present in the dump file. Type ".hh dbgerr004" for details
ffffdf7e`9ae2fd63 ?? ???
Resetting default scope

STACK_TEXT:
ffff8002`fcb02548 fffff800`6343ba7d : 00000000`00000050 ffffffff`ffffffe7 00000000`00000000 ffff8002`fcb027f0 : nt!KeBugCheckEx
ffff8002`fcb02550 fffff800`63224660 : 00000000`00000000 00000000`00000000 ffff8002`fcb02870 00000000`00000000 : nt!MiSystemFault+0x1d851d
ffff8002`fcb02650 fffff800`6340d358 : 00000000`00000000 fffff800`5fa74ae0 fffff800`5fa70ac0 00000000`00000000 : nt!MmAccessFault+0x400
ffff8002`fcb027f0 ffffdf7e`9ae2fd63 : 00000000`00000090 ffffb90f`000000f0 ffffb90f`32cd6000 ffffb90f`00000002 : nt!KiPageFault+0x358
ffff8002`fcb02980 00000000`00000090 : ffffb90f`000000f0 ffffb90f`32cd6000 ffffb90f`00000002 ffff8002`00000001 : 0xffffdf7e`9ae2fd63
ffff8002`fcb02988 ffffb90f`000000f0 : ffffb90f`32cd6000 ffffb90f`00000002 ffff8002`00000001 ffff8cdd`d8a0b935 : 0x90
ffff8002`fcb02990 ffffb90f`32cd6000 : ffffb90f`00000002 ffff8002`00000001 ffff8cdd`d8a0b935 01000101`80910018 : 0xffffb90f`000000f0
ffff8002`fcb02998 ffffb90f`00000002 : ffff8002`00000001 ffff8cdd`d8a0b935 01000101`80910018 ffffb90f`3cfac160 : 0xffffb90f`32cd6000
ffff8002`fcb029a0 ffff8002`00000001 : ffff8cdd`d8a0b935 01000101`80910018 ffffb90f`3cfac160 0002b6c0`8091000e : 0xffffb90f`00000002
ffff8002`fcb029a8 ffff8cdd`d8a0b935 : 01000101`80910018 ffffb90f`3cfac160 0002b6c0`8091000e ffffb90f`203b7000 : 0xffff8002`00000001
ffff8002`fcb029b0 ffffdf7e`99e00000 : 00000002`a6cea000 00000002`a6cea000 00000000`00000000 00000000`00e62000 : win32kbase!SURFACE::bDeleteSurface+0x785
ffff8002`fcb02b70 00000002`a6cea000 : 00000002`a6cea000 00000000`00000000 00000000`00e62000 ffffb90f`2038bf80 : 0xffffdf7e`99e00000
ffff8002`fcb02b78 00000002`a6cea000 : 00000000`00000000 00000000`00e62000 ffffb90f`2038bf80 00000000`0002b6c0 : 0x00000002`a6cea000
ffff8002`fcb02b80 00000000`00000000 : 00000000`00e62000 ffffb90f`2038bf80 00000000`0002b6c0 00000000`0002b6c0 : 0x00000002`a6cea000


SYMBOL_NAME: win32kbase!SURFACE::bDeleteSurface+785

MODULE_NAME: win32kbase

IMAGE_NAME: win32kbase.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 785

FAILURE_BUCKET_ID: AV_R_(null)_win32kbase!SURFACE::bDeleteSurface

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b6eca5ca-792f-4c4c-1643-864ab524a65b}

Followup: MachineOwner
---------