BSODy Win10 pomocy

Siema pomoże ktoś męczą mnie blue screeny podsyłam analizę plików .dmp

Spec sprzętu: AMD Ryzen 5 2600 / Nvidia Palit RTX 2060 6GB / MSI B450 - A PRO/ G.skill 16GB 3000Mhz 2x8 / SilentiumPC Vero L2 500W 80 Plus Bronze / SSD: Adata SU 650 / HDD: TOSHIBA HDWD110
Win 10, 64bity, wersja 21H1
Nie mam zainstalowanego konkretnego oprogramowania antywirusowego, korzystam z Windows Defender.
Od razu mówię, że nic nigdy podkręcane nie było. Zdarzały się również wcześniej różne blue screeny. To jest tak, że czasami może nawet być z 3 dziennie, a potem spokój na miesiąc i wraca (czysta instalacja Win10 na nowo już była próbowana). Problem z BSODAMI występuję najczęściej podczas oglądania filmów (takie mam wrażenie), czasem jak np. przeglądam neta, rzadko zdarza się to w grach, nie mam pojęcia dlaczego. Sterowniki do chipsetu, karty graficznej, karty sieciowej są aktualne.

Jak coś to Memtest robiłem w niedzielę widząc „memory_corruption”, pokazał 0 błędów.
Wynik testu: Zapodaj.Net - Darmowy hosting zdjęć i obrazków bez rejestracji! - fe4d205ba06c6.jpg

Od razu podsyłam zrzuty z CrystalDiskInfo:
https://zapodaj.net/d5d2487886b31.png.html
https://zapodaj.net/e0aa70e20ad72.png.html

Plik 1:

Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\081321-8687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff80628600000 PsLoadedModuleList = 0xfffff8062922a1b0
Debug session time: Fri Aug 13 21:58:30.338 2021 (UTC + 2:00)
System Uptime: 0 days 1:08:54.994
Loading Kernel Symbols



Loading User Symbols
Loading unloaded module list

For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806289f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff8062ea82160=000000000000001e
0: kd> !analyze -v


  •                                                                         *
    
  •                    Bugcheck Analysis                                    *
    
  •                                                                         *
    

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff806327e491f, The address that the exception occurred at
Arg3: fffff80629326a00, Parameter 0 of the exception
Arg4: fffff8062883a390, Parameter 1 of the exception

Debugging Details:

*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 3531

Key  : Analysis.DebugAnalysisManager
Value: Create

Key  : Analysis.Elapsed.mSec
Value: 3599

Key  : Analysis.Init.CPU.mSec
Value: 406

Key  : Analysis.Init.Elapsed.mSec
Value: 5879

Key  : Analysis.Memory.CommitPeak.Mb
Value: 80

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff806327e491f

BUGCHECK_P3: fffff80629326a00

BUGCHECK_P4: fffff8062883a390

EXCEPTION_PARAMETER1: fffff80629326a00

EXCEPTION_PARAMETER2: fffff8062883a390

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

FAILED_INSTRUCTION_ADDRESS:
dxgmms2!VidSchiReferenceDisplayingAllocationsForThisEntry+9f
fffff806`327e491f 48 ???

STACK_TEXT:
fffff8062ea82158 fffff80628af5c6e : 000000000000001e ffffffffc000001d fffff806327e491f fffff80629326a00 : nt!KeBugCheckEx
fffff8062ea82160 fffff806289ffbb2 : fffff80628af5c4c 0000000000000000 0000000000000000 0000000000000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff8062ea821a0 fffff80628887547 : fffff8062ea82710 0000000000000000 fffff8062ea6dc60 fffff806289fa85e : nt!RtlpExecuteHandlerForException+0x12
fffff8062ea821d0 fffff80628886136 : fffff8062ea6cf68 fffff8062ea82e20 fffff8062ea6cf68 0000000000000001 : nt!RtlDispatchException+0x297
fffff8062ea828f0 fffff806289f7b82 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiDispatchException+0x186
fffff8062ea82fb0 fffff806289f7b50 : fffff80628a08da5 0000000000000000 fffff80626aca180 ffff275570bc600d : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff8062ea6ce28 fffff80628a08da5 : 0000000000000000 fffff80626aca180 ffff275570bc600d 0000000000000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff8062ea6ce30 fffff80628a032e9 : 0000000000000000 ffffc20635f23668 0000000000000000 0000000000000002 : nt!KiExceptionDispatch+0x125
fffff8062ea6d010 fffff806327e491f : 0000000000000000 ffffc20635f23d58 fffff8062ea6d378 ffffc20635f33000 : nt!KiInvalidOpcodeFault+0x329
fffff8062ea6d1a0 fffff806327e3a51 : fffff8062ea6d378 0000000000000001 ffffc20600000001 fffff806327ec101 : dxgmms2!VidSchiReferenceDisplayingAllocationsForThisEntry+0x9f
fffff8062ea6d250 fffff806327e565a : fffff8062ea6d378 ffffc2060000003e fffff8062ea6d490 fffff8062ea6d360 : dxgmms2!VidSchiProcessVsyncCompletedFlipEntry+0x141
fffff8062ea6d2f0 fffff806327e6674 : ffffc20635efa000 ffffc20635f23000 ffffd700eedb2e70 0000000000000000 : dxgmms2!VidSchiProcessDpcVSyncCookie+0x5ba
fffff8062ea6d520 fffff8062ece4071 : fffff8062ea6d619 0000000000000000 fffff8062ea6db20 00000cd795cb6434 : dxgmms2!VidSchDdiNotifyDpc+0x344
fffff8062ea6d5d0 fffff806330289fb : ffffc2063459d030 0000000000000000 ffffc2063459d030 ffffc20634566000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff8062ea6d680 ffffc2063459d030 : 0000000000000000 ffffc2063459d030 ffffc20634566000 fffff8063302898e : nvlddmkm+0x589fb
fffff8062ea6d688 0000000000000000 : ffffc2063459d030 ffffc20634566000 fffff8063302898e ffffc20634566000 : 0xffffc206`3459d030

CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgmms2
8 errors : !dxgmms2 (fffff806327e4900-fffff806327e4938)
fffff806327e4900 *af 0f be d1 89 54 24 50 *e5 c0 75 25 45 85 c9 75 …T$P…u%E…u
fffff806327e4910 *e0 0f b7 83 48 04 00 00 *36 89 86 8a 81 00 00 48 …H…6…H
fffff806327e4920 *43 c4 68 41 5f 41 5e 41 *8d 41 5c 5f 5e 5d 5b c3 C.hA_A^A.A_^][.
fffff806327e4930 *dc 3b fa 0f 83 dc 01 00 *70 33 ed 39 ab 48 04 00 .;…p3.9.H…

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: STRIDE

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup: memory_corruption

Plik2

Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\080221-8000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff80049600000 PsLoadedModuleList = 0xfffff8004a22a1b0
Debug session time: Mon Aug 2 22:26:09.661 2021 (UTC + 2:00)
System Uptime: 0 days 1:17:38.317
Loading Kernel Symbols



Loading User Symbols
Loading unloaded module list

For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800499f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa00a81c3dd90=00000000000000ef
0: kd> !analyze -v


  •                                                                         *
    
  •                    Bugcheck Analysis                                    *
    
  •                                                                         *
    

CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffe2827a57b080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 3827

Key  : Analysis.DebugAnalysisManager
Value: Create

Key  : Analysis.Elapsed.mSec
Value: 3827

Key  : Analysis.Init.CPU.mSec
Value: 452

Key  : Analysis.Init.Elapsed.mSec
Value: 7568

Key  : Analysis.Memory.CommitPeak.Mb
Value: 77

Key  : CriticalProcessDied.ExceptionCode
Value: 7a585080

Key  : CriticalProcessDied.Process
Value: svchost.exe

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: ef

BUGCHECK_P1: ffffe2827a57b080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME: svchost.exe

CRITICAL_PROCESS: svchost.exe

EXCEPTION_RECORD: ffffe2827a57b7c0 – (.exr 0xffffe2827a57b7c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x7a585080 -

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

EXCEPTION_STR: 0x0

TRAP_FRAME: ffff800000000000 – (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffffa00a81c3dd88 fffff80049f084d2 : 00000000000000ef ffffe2827a57b080 0000000000000000 0000000000000000 : nt!KeBugCheckEx
ffffa00a81c3dd90 fffff80049dfa4ab : 0000000000000001 fffff8004989de5d 0000000000000002 fffff8004989d477 : nt!PspCatchCriticalBreak+0x10e
ffffa00a81c3de30 fffff80049c5ea14 : ffffe28200000000 0000000000000000 ffffe2827a57b080 ffffe2827a57b4b8 : nt!PspTerminateAllThreads+0x19c1cf
ffffa00a81c3dea0 fffff80049c5ed3c : ffffe2827a57b080 0000000000000001 ffffffffffffffff 0000000000000000 : nt!PspTerminateProcess+0xe0
ffffa00a81c3dee0 fffff80049a086b8 : ffffe2827a57b080 ffffe2827a585080 ffffa00a81c3dfd0 fffff80049d1fa22 : nt!NtTerminateProcess+0x9c
ffffa00a81c3df50 fffff800499fab50 : fffff80049a3b8c5 ffffa00a81c3ea58 ffffa00a81c3ea58 ffffffffffffffff : nt!KiSystemServiceCopyEnd+0x28
ffffa00a81c3e0e8 fffff80049a3b8c5 : ffffa00a81c3ea58 ffffa00a81c3ea58 ffffffffffffffff 0000000000000000 : nt!KiServiceLinkage
ffffa00a81c3e0f0 fffff80049a090a4 : ffffe2827a57b7c0 fffff8004992a576 ffff800000000000 0000000000000000 : nt!KiDispatchException+0x1b5915
ffffa00a81c3e920 fffff80049a07423 : 0000000000000001 ffffe2827a588ba0 ffffa00a81c3eb80 ffffe28200000e78 : nt!KiFastFailDispatch+0xe4
ffffa00a81c3eb00 00007ffefa354cf8 : 00000018ef37ec30 0000000000000000 00000018ef37eb88 00000018ef37ebc8 : nt!KiRaiseSecurityCheckFailure+0x323
00000018ef37eb10 00000018ef37ec30 : 0000000000000000 00000018ef37eb88 00000018ef37ebc8 00007ffefa2d48e3 : 0x00007ffefa354cf8 00000018ef37eb18 0000000000000000 : 00000018ef37eb88 00000018ef37ebc8 00007ffefa2d48e3 0000000000000001 : 0x00000018ef37ec30

SYMBOL_NAME: nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 10e

FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_7a585080_nt!PspCatchCriticalBreak

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ea87d7df-79d5-13ce-86d1-89803266d66d}

Followup: MachineOwner

Pobierz:
WhoCrashed Home Edition 6.65 - dobreprogramy
i zanalizuj pliki .dmp.

Pierwszy bsod jest powodowany przez sterownik nvidi wykonujacy niedozwoloną instrukcję.
Trzeci to awaria krytycznego pliku systemowego svchost.exe.
Drugi wynika z błędów tych dwóch pierwszych.
Wyskakuje w trzecim jeszcze powiazanie z ntkrnlmp.exe co nieraz wynika z błędów karty graficznej.
Można by zaktualizować sterownik a jesli najnowszy to wrócić do wcześniejszej wersji.
Przelecieć potem system SFC poleceniem w trybie administracyjnym sfc /scannow
I zobaczyć czy powtórki sa dalej.

Proszę @przekas
On Fri 13.08.2021 21:58:30 your computer crashed or a problem was reported
crash dump file: C:\Windows\Minidump\081321-8687-01.dmp
This was probably caused by the following module: dxgmms2.sys (0xFFFFF806327E491F)
Bugcheck code: 0x1E (0xFFFFFFFFC000001D, 0xFFFFF806327E491F, 0xFFFFF80629326A00, 0xFFFFF8062883A390)
Error: KMODE_EXCEPTION_NOT_HANDLED
file path: C:\Windows\system32\drivers\dxgmms2.sys
product: [Microsoft® Windows® Operating System](http://www.google.com/search?q=Microsoft® Windows® Operating System)
company: [Microsoft Corporation](http://www.google.com/search?q=Microsoft Corporation)
description: DirectX Graphics MMS
Bug check description: This indicates that a kernel-mode program generated an exception which the error handler did not catch.
This might be a case of memory corruption. This may be because of a hardware issue such as faulty RAM, overheating (thermal issue) or because of a buggy driver.
The crash took place in a Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system that cannot be identified at this time.

On Mon 02.08.2021 22:26:09 your computer crashed or a problem was reported
crash dump file: C:\Windows\Minidump\080221-8000-01.dmp
This was probably caused by the following module: ntoskrnl.exe
Bugcheck code: 0xEF (0xFFFFE2827A57B080, 0x0, 0x0, 0x0)
Error: CRITICAL_PROCESS_DIED
file path: C:\Windows\system32\ntoskrnl.exe
product: [Microsoft® Windows® Operating System]Windows® Operating System)
company: [Microsoft Corporation]
description: NT Kernel & System
Bug check description: This indicates that a critical system process died.
There is a possibility this problem was caused by a virus or other malware.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.
Można do wcześniejszej wersji cofnąć stery do grafy? Jak wyskoczy teraz (mam najnowsze) to mogę cofnąć i zobaczyć.

  1. Spróbuj obniżyć częstotliwość pamięci RAM
  2. Zaktualizuj BIOS płyty głównej, nowe wersje poprawiały stabilność płyt z podstawką AM4 w niektórych przypadkach.

Może to być też wirus.
There is a possibility this problem was caused by a virus or other malware

Przeskanowałem dwoma programami z pomocą @ThetaETX i nic nie pokazało konkretnie
Emsisoft | Emergency Kit: Portable Malware & Virus Scanner
Skaner online | mks_vir