Hello, since this morning I've been having issues with my computer randomly blue screening. I've done research, updated some drivers, and listened to some online advice to get the most info possible. At this point it feels like I've exhausted every avenue for someone who isn't really great with computers and doesn't really understand the information I've been given. I would really appreciate some help and a big thank you to everyone who responds to this thread!!!
Here's some information:
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`2181c000 PsLoadedModuleList = 0xfffff807`22446230
Debug session time: Fri Jul 2 16:48:44.386 2021 (UTC - 4:00)
System Uptime: 0 days 0:10:48.206
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`21c12c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdc88`cef36490=000000000000007e
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff80721c1ab08, The address that the exception occurred at
Arg3: ffffdc88cef37488, Exception Record Address
Arg4: ffffdc88cef36cc0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6121
Key : Analysis.Init.CPU.mSec
Value: 655
Key : Analysis.Init.Elapsed.mSec
Value: 37789
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff80721c1ab08
BUGCHECK_P3: ffffdc88cef37488
BUGCHECK_P4: ffffdc88cef36cc0
EXCEPTION_RECORD: ffffdc88cef37488 -- (.exr 0xffffdc88cef37488)
ExceptionAddress: fffff80721c1ab08 (nt!DebugPrompt+0x0000000000000018)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000002
CONTEXT: ffffdc88cef36cc0 -- (.cxr 0xffffdc88cef36cc0)
rax=0000000000000002 rbx=000000000000005a rcx=fffff80721782d18
rdx=ffffdc88cef3001f rsi=fffff8072178afc0 rdi=000000000000002f
rip=fffff80721c1ab07 rsp=ffffdc88cef376c8 rbp=ffffdc88cef37820
r8=ffffdc88cef37750 r9=0000000000000002 r10=0000000000000000
r11=0000000000000010 r12=0000000000000408 r13=000000000000012c
r14=000000000000012c r15=ffffdc88cf9d4710
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246
nt!DebugPrompt+0x17:
fffff807`21c1ab07 cc int 3
Resetting default scope
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
EXCEPTION_CODE_STR: 80000003
EXCEPTION_PARAMETER1: 0000000000000002
EXCEPTION_STR: 0x80000003
STACK_TEXT:
ffffdc88`cef376c8 fffff807`21d9c3c4 : 00000000`0000005a fffff807`2178afc0 00000000`0000002f fffff807`2177a8a2 : nt!DebugPrompt+0x17
ffffdc88`cef376d0 fffff807`217bc9ac : 00000000`0000005a fffff807`2178afc0 fffff807`21782d14 00000000`00000007 : nt!DbgPrompt+0x44
ffffdc88`cef37720 fffff807`217bc36f : 00000000`0000002d ffffdf8c`7fc80b90 ffffdf8c`7fcbaff0 00000000`00000000 : FLTMGR!FltpvPrintErrors+0x188
ffffdc88`cef379a0 fffff807`21b5d225 : ffffdf8c`20498240 ffffdf8c`20498240 ffffdf8c`16cae8c0 ffffdc88`cf9d4720 : FLTMGR!FltpvDoLostObjectCheck+0x1ef
ffffdc88`cef37a70 fffff807`21b113b5 : ffffdf8c`20498240 00000000`00000080 ffffdf8c`16d02080 000fa4ef`bd9bbfff : nt!ExpWorkerThread+0x105
ffffdc88`cef37b10 fffff807`21c1a278 : ffffc180`4248b180 ffffdf8c`20498240 fffff807`21b11360 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffdc88`cef37b60 00000000`00000000 : ffffdc88`cef38000 ffffdc88`cef31000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!DebugPrompt+18
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr 0xffffdc88cef36cc0 ; kb
BUCKET_ID_FUNC_OFFSET: 18
FAILURE_BUCKET_ID: AV_VRF_nt!DebugPrompt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f47fc276-52c8-da5f-1a32-8baabfc97af2}
Followup: MachineOwner
---------
15: kd> .exr 0xffffdc88cef37488
ExceptionAddress: fffff80721c1ab08 (nt!DebugPrompt+0x0000000000000018)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000002
15: kd> .cxr 0xffffdc88cef36cc0
rax=0000000000000002 rbx=000000000000005a rcx=fffff80721782d18
rdx=ffffdc88cef3001f rsi=fffff8072178afc0 rdi=000000000000002f
rip=fffff80721c1ab07 rsp=ffffdc88cef376c8 rbp=ffffdc88cef37820
r8=ffffdc88cef37750 r9=0000000000000002 r10=0000000000000000
r11=0000000000000010 r12=0000000000000408 r13=000000000000012c
r14=000000000000012c r15=ffffdc88cf9d4710
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246
nt!DebugPrompt+0x17:
fffff807`21c1ab07 cc int 3
15: kd> lmvm nt
Browse full module list
start end module name
fffff807`2181c000 fffff807`22862000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\FC57F1C841C2C3F793D57AC134DC0EFA1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\05C0E3E01046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 05C0E3E0 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5C86C
ImageSize: 01046000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Here's some information:
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`2181c000 PsLoadedModuleList = 0xfffff807`22446230
Debug session time: Fri Jul 2 16:48:44.386 2021 (UTC - 4:00)
System Uptime: 0 days 0:10:48.206
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`21c12c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdc88`cef36490=000000000000007e
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff80721c1ab08, The address that the exception occurred at
Arg3: ffffdc88cef37488, Exception Record Address
Arg4: ffffdc88cef36cc0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6121
Key : Analysis.Init.CPU.mSec
Value: 655
Key : Analysis.Init.Elapsed.mSec
Value: 37789
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffff80000003
BUGCHECK_P2: fffff80721c1ab08
BUGCHECK_P3: ffffdc88cef37488
BUGCHECK_P4: ffffdc88cef36cc0
EXCEPTION_RECORD: ffffdc88cef37488 -- (.exr 0xffffdc88cef37488)
ExceptionAddress: fffff80721c1ab08 (nt!DebugPrompt+0x0000000000000018)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000002
CONTEXT: ffffdc88cef36cc0 -- (.cxr 0xffffdc88cef36cc0)
rax=0000000000000002 rbx=000000000000005a rcx=fffff80721782d18
rdx=ffffdc88cef3001f rsi=fffff8072178afc0 rdi=000000000000002f
rip=fffff80721c1ab07 rsp=ffffdc88cef376c8 rbp=ffffdc88cef37820
r8=ffffdc88cef37750 r9=0000000000000002 r10=0000000000000000
r11=0000000000000010 r12=0000000000000408 r13=000000000000012c
r14=000000000000012c r15=ffffdc88cf9d4710
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246
nt!DebugPrompt+0x17:
fffff807`21c1ab07 cc int 3
Resetting default scope
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0x80000003 - {EXCEPTION} Breakpoint A breakpoint has been reached.
EXCEPTION_CODE_STR: 80000003
EXCEPTION_PARAMETER1: 0000000000000002
EXCEPTION_STR: 0x80000003
STACK_TEXT:
ffffdc88`cef376c8 fffff807`21d9c3c4 : 00000000`0000005a fffff807`2178afc0 00000000`0000002f fffff807`2177a8a2 : nt!DebugPrompt+0x17
ffffdc88`cef376d0 fffff807`217bc9ac : 00000000`0000005a fffff807`2178afc0 fffff807`21782d14 00000000`00000007 : nt!DbgPrompt+0x44
ffffdc88`cef37720 fffff807`217bc36f : 00000000`0000002d ffffdf8c`7fc80b90 ffffdf8c`7fcbaff0 00000000`00000000 : FLTMGR!FltpvPrintErrors+0x188
ffffdc88`cef379a0 fffff807`21b5d225 : ffffdf8c`20498240 ffffdf8c`20498240 ffffdf8c`16cae8c0 ffffdc88`cf9d4720 : FLTMGR!FltpvDoLostObjectCheck+0x1ef
ffffdc88`cef37a70 fffff807`21b113b5 : ffffdf8c`20498240 00000000`00000080 ffffdf8c`16d02080 000fa4ef`bd9bbfff : nt!ExpWorkerThread+0x105
ffffdc88`cef37b10 fffff807`21c1a278 : ffffc180`4248b180 ffffdf8c`20498240 fffff807`21b11360 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffdc88`cef37b60 00000000`00000000 : ffffdc88`cef38000 ffffdc88`cef31000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!DebugPrompt+18
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr 0xffffdc88cef36cc0 ; kb
BUCKET_ID_FUNC_OFFSET: 18
FAILURE_BUCKET_ID: AV_VRF_nt!DebugPrompt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f47fc276-52c8-da5f-1a32-8baabfc97af2}
Followup: MachineOwner
---------
15: kd> .exr 0xffffdc88cef37488
ExceptionAddress: fffff80721c1ab08 (nt!DebugPrompt+0x0000000000000018)
ExceptionCode: 80000003 (Break instruction exception)
ExceptionFlags: 00000000
NumberParameters: 1
Parameter[0]: 0000000000000002
15: kd> .cxr 0xffffdc88cef36cc0
rax=0000000000000002 rbx=000000000000005a rcx=fffff80721782d18
rdx=ffffdc88cef3001f rsi=fffff8072178afc0 rdi=000000000000002f
rip=fffff80721c1ab07 rsp=ffffdc88cef376c8 rbp=ffffdc88cef37820
r8=ffffdc88cef37750 r9=0000000000000002 r10=0000000000000000
r11=0000000000000010 r12=0000000000000408 r13=000000000000012c
r14=000000000000012c r15=ffffdc88cf9d4710
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246
nt!DebugPrompt+0x17:
fffff807`21c1ab07 cc int 3
15: kd> lmvm nt
Browse full module list
start end module name
fffff807`2181c000 fffff807`22862000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\FC57F1C841C2C3F793D57AC134DC0EFA1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\05C0E3E01046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 05C0E3E0 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5C86C
ImageSize: 01046000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: