I need some help working out what the issue is with these BSOD issues. I have run a memtest86 (just one pass) and it was fine. I could run more if ram seems to be the issue.
This all started after I reset the cmos cause I changed my memory speed by a tiny bit and it bricked the bios. I then downloaded the drivers on the motherboard website.
After this I added 2 sticks of ram.
I also installed windows on a different boot drive.
I know I shouldn't have made all these changes at once cause it makes it hard to diagnose.
b450 tomohawk max, r5 3600, 1060 6gb, corsair vengeance 4x8.
I have a bunch of dump files but I'm not sure how to attach them. I see the insert options but not one for a file.
I recently did a disk cleanup or windows install cleanup in powershell and it said it found issues and resolved them but I'm skeptical that the issue is really resolved cause I was having it on the other windows install.
Link to dump files: https://drive.google.com/file/d/1i-U_jmfIjxqgvqrFn7Q-QWR2FRU77RNs/view?usp=sharing
This all started after I reset the cmos cause I changed my memory speed by a tiny bit and it bricked the bios. I then downloaded the drivers on the motherboard website.
After this I added 2 sticks of ram.
I also installed windows on a different boot drive.
I know I shouldn't have made all these changes at once cause it makes it hard to diagnose.
b450 tomohawk max, r5 3600, 1060 6gb, corsair vengeance 4x8.
I have a bunch of dump files but I'm not sure how to attach them. I see the insert options but not one for a file.
I recently did a disk cleanup or windows install cleanup in powershell and it said it found issues and resolved them but I'm skeptical that the issue is really resolved cause I was having it on the other windows install.
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030823-5296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802
Debug session time: Wed Mar 8 03:10:43.253 2023 (UTC - 5:00)
System Uptime: 0 days 0:23:56.889
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802
2: kd> !analyze -v
***
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8027c63228b, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*
*
*
*
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3406
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4016
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 5047
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.DumpHeader
Value: 0x1e
Key : Bugcheck.Code.Register
Value: 0x1e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 030823-5296-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8027c63228b
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: fffff8027cf1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Descenders.exe
STACK_TEXT:
ffffe581
ffffe581
ffffe581
ffffe581
ffffe581
ffffe581
ffffc109
ffffc109
ffffc109
ffffc109
ffffc109
SYMBOL_NAME: nt!SwapContext+cb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1265
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: cb
FAILURE_BUCKET_ID: AV_R_nt!SwapContext
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73940a07-e238-0cb7-73a8-c9e01fdee4d3}
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030823-5296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802
7c200000 PsLoadedModuleList = 0xfffff802
7ce13450Debug session time: Wed Mar 8 03:10:43.253 2023 (UTC - 5:00)
System Uptime: 0 days 0:23:56.889
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802
7c628c50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe581
cf4fa0f0=000000000000001e2: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8027c63228b, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
*
-
- *
- *
- Either you specified an unqualified symbol, or your debugger *
- doesn't have full symbol information. Unqualified symbol *
- resolution is turned off by default. Please either specify a *
- fully qualified symbol module!symbolname, or enable resolution *
- of unqualified symbols by typing ".symopt- 100". Note that *
- enabling unqualified symbol resolution with network symbol *
- server shares in the symbol path may cause the debugger to *
- appear to hang for long periods of time when an incorrect *
- symbol name is typed or the network symbol server is down. *
- *
- For some commands to work properly, your symbol path *
- must point to .pdb files that have full type information. *
- *
- Certain .pdb files (such as the public OS symbols) do not *
- contain the required information. Contact the group that *
- provided you with these symbols if you need this command to *
- work. *
- *
- Type referenced: ExceptionRecord *
- *
*
-
- *
- *
- Either you specified an unqualified symbol, or your debugger *
- doesn't have full symbol information. Unqualified symbol *
- resolution is turned off by default. Please either specify a *
- fully qualified symbol module!symbolname, or enable resolution *
- of unqualified symbols by typing ".symopt- 100". Note that *
- enabling unqualified symbol resolution with network symbol *
- server shares in the symbol path may cause the debugger to *
- appear to hang for long periods of time when an incorrect *
- symbol name is typed or the network symbol server is down. *
- *
- For some commands to work properly, your symbol path *
- must point to .pdb files that have full type information. *
- *
- Certain .pdb files (such as the public OS symbols) do not *
- contain the required information. Contact the group that *
- provided you with these symbols if you need this command to *
- work. *
- *
- Type referenced: ContextRecord *
- *
*
-
- *
- *
- Either you specified an unqualified symbol, or your debugger *
- doesn't have full symbol information. Unqualified symbol *
- resolution is turned off by default. Please either specify a *
- fully qualified symbol module!symbolname, or enable resolution *
- of unqualified symbols by typing ".symopt- 100". Note that *
- enabling unqualified symbol resolution with network symbol *
- server shares in the symbol path may cause the debugger to *
- appear to hang for long periods of time when an incorrect *
- symbol name is typed or the network symbol server is down. *
- *
- For some commands to work properly, your symbol path *
- must point to .pdb files that have full type information. *
- *
- Certain .pdb files (such as the public OS symbols) do not *
- contain the required information. Contact the group that *
- provided you with these symbols if you need this command to *
- work. *
- *
- Type referenced: ExceptionRecord *
- *
*
-
- *
- *
- Either you specified an unqualified symbol, or your debugger *
- doesn't have full symbol information. Unqualified symbol *
- resolution is turned off by default. Please either specify a *
- fully qualified symbol module!symbolname, or enable resolution *
- of unqualified symbols by typing ".symopt- 100". Note that *
- enabling unqualified symbol resolution with network symbol *
- server shares in the symbol path may cause the debugger to *
- appear to hang for long periods of time when an incorrect *
- symbol name is typed or the network symbol server is down. *
- *
- For some commands to work properly, your symbol path *
- must point to .pdb files that have full type information. *
- *
- Certain .pdb files (such as the public OS symbols) do not *
- contain the required information. Contact the group that *
- provided you with these symbols if you need this command to *
- work. *
- *
- Type referenced: ContextRecord *
- *
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3406
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4016
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 5047
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.DumpHeader
Value: 0x1e
Key : Bugcheck.Code.Register
Value: 0x1e
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 030823-5296-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8027c63228b
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: fffff8027cf1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Descenders.exe
STACK_TEXT:
ffffe581
cf4fa0e8 fffff802
7c7392aa : 000000000000001e ffffffff
c0000005 fffff8027c63228b 00000000
00000000 : nt!KeBugCheckExffffe581
cf4fa0f0 fffff802
7c633ec2 : ffffe581cf4fa900 ffffe581
cf4fa1c0 fffff8027c200000 fffff802
7c62db26 : nt!HvlpVtlCallExceptionHandler+0x22ffffe581
cf4fa130 fffff802
7c40fac3 : ffffc10955653c00 ffffc109
556539c8 fffff8027c62db26 fffff802
7c2e9ca8 : nt!RtlpExecuteHandlerForException+0x12ffffe581
cf4fa160 fffff802
7c413907 : ffffffffffffffff ffffc109
55653a70 ffffc10955653a70 ffffe581
cf4fa900 : nt!RtlDispatchException+0x2f3ffffe581
cf4fa8d0 fffff802
7c629e12 : 0000000000000000 00000000
00000000 000000006d4b634f 00000000
00000020 : nt!KiDispatchException+0x317ffffe581
cf4fafb0 fffff802
7c629de0 : fffff8027c63e3f5 00000000
00000000 ffffe581cf4d9180 00000000
00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12ffffc109
55653888 fffff802
7c63e3f5 : 0000000000000000 ffffe581
cf4d9180 0000000000000000 ffffc109
55653ac0 : nt!KiExceptionDispatchOnExceptionStackContinueffffc109
55653890 fffff802
7c639483 : fffff8027c624b70 fffff802
7c54c6ea 000000035874140d 00000000
00000000 : nt!KiExceptionDispatch+0x135ffffc109
55653a70 fffff802
7c63228b : ffffe581cf4d9180 00000000
00000000 ffff808d07c76080 fffff802
7c62da0a : nt!KiGeneralProtectionFault+0x343ffffc109
55653c00 fffff802
7c62db26 : 0000000000000000 ffff808c
f88b9040 ffff808d07c76080 ffff808d
06b99080 : nt!SwapContext+0xcbffffc109
55653c40 00000000
00000000 : ffffc10955654000 ffffc109
5564e000 0000000000000000 00000000
00000000 : nt!KiIdleLoop+0x176SYMBOL_NAME: nt!SwapContext+cb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1265
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: cb
FAILURE_BUCKET_ID: AV_R_nt!SwapContext
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73940a07-e238-0cb7-73a8-c9e01fdee4d3}
Followup: MachineOwner
---------
Link to dump files: https://drive.google.com/file/d/1i-U_jmfIjxqgvqrFn7Q-QWR2FRU77RNs/view?usp=sharing
Last edited: