Hello! I'm just here seeking help, after finally exhausting the extent of my ability to research my own bugcheck code. I've done /sfc scannow, I've done DISM, I've done MemTest with no errors and good ram stats. Attached is the minidump of the unknown error, aside from today I also got this BSOD 3 days ago on the 15th.
If anyone can offer their knowledge, I'd greatly appreciate it!
If anyone can offer their knowledge, I'd greatly appreciate it!
**note, this bugcheck says MSIafterburner, the other bugcheck doesn't and cites a totally different process011822-7890-01.dmp
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\011822-7890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
* Path validation summary **
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff8044c400000 PsLoadedModuleList = 0xfffff804
4d02a2b0
Debug session time: Tue Jan 18 02:25:55.364 2022 (UTC - 5:00)
System Uptime: 1 days 23:36:10.938
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff8044c7f72e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffde8c
8278ce20=000000005000000c
0: kd> !analyze -v
***
***
- *
- Bugcheck Analysis *
- *
Unknown bugcheck code (5000000c)
Unknown bugcheck description
Arguments:
Arg1: 000000023bab66e0
Arg2: 0000000000000001
Arg3: fffff8044caadd63
Arg4: ffffde8c8278cf70
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1938
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 16115
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
FILE_IN_CAB: 011822-7890-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 5000000c
BUGCHECK_P1: 23bab66e0
BUGCHECK_P2: 1
BUGCHECK_P3: fffff8044caadd63
BUGCHECK_P4: ffffde8c8278cf70
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MSIAfterburner
STACK_TEXT:
ffffde8c8278ce18 ffff9d80
daa11ee7 : 000000005000000c 00000002
3bab66e0 0000000000000001 fffff804
4caadd63 : nt!KeBugCheckEx
ffffde8c8278ce20 00000000
5000000c : 000000023bab66e0 00000000
00000001 fffff8044caadd63 ffffde8c
8278cf70 : 0xffff9d80daa11ee7 ffffde8c
8278ce28 000000023bab66e0 : 00000000
00000001 fffff8044caadd63 ffffde8c
8278cf70 0000000000000002 : 0x5000000c ffffde8c
8278ce30 0000000000000001 : fffff804
4caadd63 ffffde8c8278cf70 00000000
00000002 ffffde8c8278cec0 : 0x00000002
3bab66e0
ffffde8c8278ce38 fffff804
4caadd63 : ffffde8c8278cf70 00000000
00000002 ffffde8c8278cec0 ffff9d80
daa14984 : 0x1
ffffde8c8278ce40 ffffde8c
8278cf70 : 0000000000000002 ffffde8c
8278cec0 ffff9d80daa14984 00000000
0010000f : nt!RtlpReadExtendedContext+0x3
ffffde8c8278ce48 00000000
00000002 : ffffde8c8278cec0 ffff9d80
daa14984 000000000010000f fffff38b
163a7c10 : 0xffffde8c8278cf70 ffffde8c
8278ce50 ffffde8c8278cec0 : ffff9d80
daa14984 000000000010000f fffff38b
163a7c10 fffff780000003d8 : 0x2 ffffde8c
8278ce58 ffff9d80daa14984 : 00000000
0010000f fffff38b163a7c10 fffff780
000003d8 0000000000000001 : 0xffffde8c
8278cec0
ffffde8c8278ce60 00000000
0010000f : fffff38b163a7c10 fffff780
000003d8 0000000000000001 00000000
00000000 : 0xffff9d80daa14984 ffffde8c
8278ce68 fffff38b163a7c10 : fffff780
000003d8 0000000000000001 00000000
00000000 0000000000000000 : 0x10000f ffffde8c
8278ce70 fffff780000003d8 : 00000000
00000001 0000000000000000 00000000
00000000 fffff38b163a7710 : 0xfffff38b
163a7c10
ffffde8c8278ce78 00000000
00000001 : 0000000000000000 00000000
00000000 fffff38b163a7710 ffff9d80
daa135f3 : 0xfffff780000003d8 ffffde8c
8278ce80 0000000000000000 : 00000000
00000000 fffff38b163a7710 ffff9d80
daa135f3 00000000`0010000f : 0x1
SYMBOL_NAME: nt!RtlpReadExtendedContext+3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 3
FAILURE_BUCKET_ID: 0x5000000C_nt!RtlpReadExtendedContext
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {655d267d-ed97-b686-7a29-33d72ed83766}
Followup: MachineOwner
---------
Last edited: