Merhaba arkadaşlar, sürekli mavi ekran hatası alıyorum. Problemin ne olduğunu söylerseniz sevinirim.
Minidump dosyası.
Minidump dosyası.
hata kodları.rar
drive.google.com
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.22350\102620-7750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`1d800000 PsLoadedModuleList = 0xfffff807`1e42a310
Debug session time: Mon Oct 26 21:03:00.410 2020 (UTC + 3:00)
System Uptime: 0 days 19:49:23.832
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`1dbf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad07`687df840=00000000000000ef
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff9c0256f54080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4936
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8053
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff9c0256f54080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x39faa080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {c6459651-82b2-4317-8b01-9e01130e27b0}
IMAGE_NAME: unknown
MODULE_NAME: unknown
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffad07`687df838 fffff807`1e106fe2 : 00000000`000000ef ffff9c02`56f54080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffad07`687df840 fffff807`1dfd7d83 : 00000000`00000000 fffff807`1da60ea5 00000000`00000002 fffff807`1da60dcf : nt!PspCatchCriticalBreak+0x10e
ffffad07`687df8e0 fffff807`1de4a9b0 : ffff9c02`00000000 00000000`00000000 ffff9c02`56f54080 ffff9c02`56f544b8 : nt!PspTerminateAllThreads+0x1ee377
ffffad07`687df950 fffff807`1de4a7ac : ffff9c02`56e16080 00000000`00000000 00007ffd`4a0afd08 00000000`00001764 : nt!PspTerminateProcess+0xe0
ffffad07`687df990 fffff807`1dc05fb5 : ffff9c02`56f54080 ffff9c02`39faa080 ffffad07`687dfa80 ffff9c02`00000000 : nt!NtTerminateProcess+0x9c
ffffad07`687dfa00 00007ffd`5856c314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000011`4d57f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5856c314
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_39faa080_unknown!_IMAGE_unknown
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a8d9167c-8ee7-8e66-77dc-3f4e8cfbd536}
Followup: MachineOwner
---------
[*]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.19252\102620-10234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`41200000 PsLoadedModuleList = 0xfffff800`41e2a310
Debug session time: Mon Oct 26 01:13:07.129 2020 (UTC + 3:00)
System Uptime: 2 days 8:15:58.105
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
..........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`415f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa04`952a0620=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8004569965f, Address of the instruction which caused the bugcheck
Arg3: ffffaa04952a0f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5983
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14420
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8004569965f
BUGCHECK_P3: ffffaa04952a0f20
BUGCHECK_P4: 0
CONTEXT: ffffaa04952a0f20 -- (.cxr 0xffffaa04952a0f20)
rax=ffffaa04952a1920 rbx=0000000000000000 rcx=00000000000001f9
rdx=0000000000000008 rsi=0000000000000000 rdi=ffffab00d4fc6990
rip=fffff8004569965f rsp=ffffaa04952a1920 rbp=ffffaa04952a19e9
r8=ffffab00dcbf40b2 r9=0000000000000002 r10=00000000ffffffff
r11=000000000000005a r12=ffffce07be26cd80 r13=ffffce07c0df9570
r14=ffffab00d4fe2950 r15=ffffce07c0df94a0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
mountmgr!MountMgrQueryDosVolumePath+0x48f:
fffff800`4569965f 48d1e8 shr rax,1
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
STACK_TEXT:
ffffaa04`952a1920 fffff800`456990c3 : ffffce07`a17241f0 ffffce07`c0df94a0 00000000`00000000 ffffab00`d4fc6990 : mountmgr!MountMgrQueryDosVolumePath+0x48f
ffffaa04`952a1a50 fffff800`414cd805 : ffffaa04`952a1bf0 ffffab00`e536a0f0 ffffab00`dcbf4b50 ffffaa04`952a1b48 : mountmgr!MountMgrDeviceControl+0xb3
ffffaa04`952a1ab0 fffff800`418a99f2 : 00000000`00000010 ffffaa04`952a1bf0 ffffab00`e536a0f0 00000000`00000000 : nt!IofCallDriver+0x55
ffffaa04`952a1af0 fffff800`418a9217 : ce07c2d1`c310fffe 00000000`000000c0 ffffab00`e536a0f0 ffffab00`e536a0f0 : nt!IoVolumeDeviceToDosName+0x232
ffffaa04`952a1dc0 fffff800`418a912e : ffffce07`c44b3190 ffffce07`00000000 ffffaa04`952a1f01 ffffab00`e536a0f0 : nt!IopQueryNameInternal+0xa3
ffffaa04`952a1e70 fffff800`418aa608 : ffffce07`c44b3190 ffffaa04`952a2a80 00000000`000000d0 00000280`d6a61110 : nt!IoQueryFileDosDeviceName+0x5e
ffffaa04`952a1ec0 fffff800`41605fb5 : 00000000`00000001 00000000`00000002 00000000`00000000 00000280`d6d61c4c : nt!NtQueryInformationProcess+0x968
ffffaa04`952a2990 00007ffc`8950c0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f8`847ff1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`8950c0b4
SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+48f
MODULE_NAME: mountmgr
IMAGE_NAME: mountmgr.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr 0xffffaa04952a0f20 ; kb
BUCKET_ID_FUNC_OFFSET: 48f
FAILURE_BUCKET_ID: 0x3B_c0000005_mountmgr!MountMgrQueryDosVolumePath
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {80080096-09f3-1592-4db4-e3e98f2b9ae8}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.22350\102620-7750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`1d800000 PsLoadedModuleList = 0xfffff807`1e42a310
Debug session time: Mon Oct 26 21:03:00.410 2020 (UTC + 3:00)
System Uptime: 0 days 19:49:23.832
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`1dbf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad07`687df840=00000000000000ef
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff9c0256f54080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4936
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8053
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff9c0256f54080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x39faa080 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {c6459651-82b2-4317-8b01-9e01130e27b0}
IMAGE_NAME: unknown
MODULE_NAME: unknown
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffad07`687df838 fffff807`1e106fe2 : 00000000`000000ef ffff9c02`56f54080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffad07`687df840 fffff807`1dfd7d83 : 00000000`00000000 fffff807`1da60ea5 00000000`00000002 fffff807`1da60dcf : nt!PspCatchCriticalBreak+0x10e
ffffad07`687df8e0 fffff807`1de4a9b0 : ffff9c02`00000000 00000000`00000000 ffff9c02`56f54080 ffff9c02`56f544b8 : nt!PspTerminateAllThreads+0x1ee377
ffffad07`687df950 fffff807`1de4a7ac : ffff9c02`56e16080 00000000`00000000 00007ffd`4a0afd08 00000000`00001764 : nt!PspTerminateProcess+0xe0
ffffad07`687df990 fffff807`1dc05fb5 : ffff9c02`56f54080 ffff9c02`39faa080 ffffad07`687dfa80 ffff9c02`00000000 : nt!NtTerminateProcess+0x9c
ffffad07`687dfa00 00007ffd`5856c314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000011`4d57f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5856c314
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_39faa080_unknown!_IMAGE_unknown
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a8d9167c-8ee7-8e66-77dc-3f4e8cfbd536}
Followup: MachineOwner
---------
[*]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.19252\102620-10234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`41200000 PsLoadedModuleList = 0xfffff800`41e2a310
Debug session time: Mon Oct 26 01:13:07.129 2020 (UTC + 3:00)
System Uptime: 2 days 8:15:58.105
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
..........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`415f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa04`952a0620=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8004569965f, Address of the instruction which caused the bugcheck
Arg3: ffffaa04952a0f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5983
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14420
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8004569965f
BUGCHECK_P3: ffffaa04952a0f20
BUGCHECK_P4: 0
CONTEXT: ffffaa04952a0f20 -- (.cxr 0xffffaa04952a0f20)
rax=ffffaa04952a1920 rbx=0000000000000000 rcx=00000000000001f9
rdx=0000000000000008 rsi=0000000000000000 rdi=ffffab00d4fc6990
rip=fffff8004569965f rsp=ffffaa04952a1920 rbp=ffffaa04952a19e9
r8=ffffab00dcbf40b2 r9=0000000000000002 r10=00000000ffffffff
r11=000000000000005a r12=ffffce07be26cd80 r13=ffffce07c0df9570
r14=ffffab00d4fe2950 r15=ffffce07c0df94a0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
mountmgr!MountMgrQueryDosVolumePath+0x48f:
fffff800`4569965f 48d1e8 shr rax,1
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
STACK_TEXT:
ffffaa04`952a1920 fffff800`456990c3 : ffffce07`a17241f0 ffffce07`c0df94a0 00000000`00000000 ffffab00`d4fc6990 : mountmgr!MountMgrQueryDosVolumePath+0x48f
ffffaa04`952a1a50 fffff800`414cd805 : ffffaa04`952a1bf0 ffffab00`e536a0f0 ffffab00`dcbf4b50 ffffaa04`952a1b48 : mountmgr!MountMgrDeviceControl+0xb3
ffffaa04`952a1ab0 fffff800`418a99f2 : 00000000`00000010 ffffaa04`952a1bf0 ffffab00`e536a0f0 00000000`00000000 : nt!IofCallDriver+0x55
ffffaa04`952a1af0 fffff800`418a9217 : ce07c2d1`c310fffe 00000000`000000c0 ffffab00`e536a0f0 ffffab00`e536a0f0 : nt!IoVolumeDeviceToDosName+0x232
ffffaa04`952a1dc0 fffff800`418a912e : ffffce07`c44b3190 ffffce07`00000000 ffffaa04`952a1f01 ffffab00`e536a0f0 : nt!IopQueryNameInternal+0xa3
ffffaa04`952a1e70 fffff800`418aa608 : ffffce07`c44b3190 ffffaa04`952a2a80 00000000`000000d0 00000280`d6a61110 : nt!IoQueryFileDosDeviceName+0x5e
ffffaa04`952a1ec0 fffff800`41605fb5 : 00000000`00000001 00000000`00000002 00000000`00000000 00000280`d6d61c4c : nt!NtQueryInformationProcess+0x968
ffffaa04`952a2990 00007ffc`8950c0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f8`847ff1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`8950c0b4
SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+48f
MODULE_NAME: mountmgr
IMAGE_NAME: mountmgr.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr 0xffffaa04952a0f20 ; kb
BUCKET_ID_FUNC_OFFSET: 48f
FAILURE_BUCKET_ID: 0x3B_c0000005_mountmgr!MountMgrQueryDosVolumePath
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {80080096-09f3-1592-4db4-e3e98f2b9ae8}
Followup: MachineOwner
---------
- BlueStacks uygulamasını kaldırın.
- Riot Vanguard'ı kaldırın.
- Z390 D | Anakart | GIGABYTE anakartınızı doğrulayıp attığım ürün olduğuna emin olduktan sonra F3C sürümünden F3G sürümüne yükseltin.
- Chiptset sürücünüzü indirip güncelleyin.
- Intel Serial I/O driver'ı indirip kurun.
- Intel Management Engine Firmware'ı kurun.
[*]Kod:Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64. Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.22350\102620-7750-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available. ************* Path validation summary ************** Response Time (ms) Location. Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64. Product: WinNt, suite: TerminalServer SingleUserTS. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406. Machine Name: Kernel base = 0xfffff807`1d800000 PsLoadedModuleList = 0xfffff807`1e42a310. Debug session time: Mon Oct 26 21:03:00.410 2020 (UTC + 3:00) System Uptime: 0 days 19:49:23.832. Loading Kernel Symbols. ............................................................... ................................................................ ................................................................ . Loading User Symbols. Loading unloaded module list. .......... For analysis of this file, run !analyze -v. nt!KeBugCheckEx: fffff807`1dbf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffad07`687df840=00000000000000ef. 0: kd> !analyze -v. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* CRITICAL_PROCESS_DIED (ef) A critical system process died. Arguments: Arg1: ffff9c0256f54080, Process object or thread object. Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died. Arg3: 0000000000000000. Arg4: 0000000000000000. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 4936. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-IPC9T25. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 8053. Key : Analysis.Memory.CommitPeak.Mb. Value: 78. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: ef. BUGCHECK_P1: ffff9c0256f54080. BUGCHECK_P2: 0. BUGCHECK_P3: 0. BUGCHECK_P4: 0. PROCESS_NAME: svchost.exe. CRITICAL_PROCESS: svchost.exe. ERROR_CODE: (NTSTATUS) 0x39faa080 - <Unable to get error code text> CRITICAL_PROCESS_REPORTGUID: {c6459651-82b2-4317-8b01-9e01130e27b0} IMAGE_NAME: unknown. MODULE_NAME: unknown. FAULTING_MODULE: 0000000000000000. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. STACK_TEXT: ffffad07`687df838 fffff807`1e106fe2 : 00000000`000000ef ffff9c02`56f54080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx. ffffad07`687df840 fffff807`1dfd7d83 : 00000000`00000000 fffff807`1da60ea5 00000000`00000002 fffff807`1da60dcf : nt!PspCatchCriticalBreak+0x10e. ffffad07`687df8e0 fffff807`1de4a9b0 : ffff9c02`00000000 00000000`00000000 ffff9c02`56f54080 ffff9c02`56f544b8 : nt!PspTerminateAllThreads+0x1ee377. ffffad07`687df950 fffff807`1de4a7ac : ffff9c02`56e16080 00000000`00000000 00007ffd`4a0afd08 00000000`00001764 : nt!PspTerminateProcess+0xe0. ffffad07`687df990 fffff807`1dc05fb5 : ffff9c02`56f54080 ffff9c02`39faa080 ffffad07`687dfa80 ffff9c02`00000000 : nt!NtTerminateProcess+0x9c. ffffad07`687dfa00 00007ffd`5856c314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 00000011`4d57f108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`5856c314. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_39faa080_unknown!_IMAGE_unknown. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {a8d9167c-8ee7-8e66-77dc-3f4e8cfbd536} Followup: MachineOwner. --------- [*] Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64. Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa14524.19252\102620-10234-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available. ************* Path validation summary ************** Response Time (ms) Location. Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64. Product: WinNt, suite: TerminalServer SingleUserTS. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406. Machine Name: Kernel base = 0xfffff800`41200000 PsLoadedModuleList = 0xfffff800`41e2a310. Debug session time: Mon Oct 26 01:13:07.129 2020 (UTC + 3:00) System Uptime: 2 days 8:15:58.105. Loading Kernel Symbols. ............................................................... ................................................................ ................................................................ . Loading User Symbols. Loading unloaded module list. .......................... For analysis of this file, run !analyze -v. nt!KeBugCheckEx: fffff800`415f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa04`952a0620=000000000000003b. 1: kd> !analyze -v. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff8004569965f, Address of the instruction which caused the bugcheck. Arg3: ffffaa04952a0f20, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 5983. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-IPC9T25. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 14420. Key : Analysis.Memory.CommitPeak.Mb. Value: 77. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff8004569965f. BUGCHECK_P3: ffffaa04952a0f20. BUGCHECK_P4: 0. CONTEXT: ffffaa04952a0f20 -- (.cxr 0xffffaa04952a0f20) rax=ffffaa04952a1920 rbx=0000000000000000 rcx=00000000000001f9. rdx=0000000000000008 rsi=0000000000000000 rdi=ffffab00d4fc6990. rip=fffff8004569965f rsp=ffffaa04952a1920 rbp=ffffaa04952a19e9. r8=ffffab00dcbf40b2 r9=0000000000000002 r10=00000000ffffffff. r11=000000000000005a r12=ffffce07be26cd80 r13=ffffce07c0df9570. r14=ffffab00d4fe2950 r15=ffffce07c0df94a0. iopl=0 nv up ei ng nz na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286. mountmgr!MountMgrQueryDosVolumePath+0x48f: fffff800`4569965f 48d1e8 shr rax,1. Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: nvcontainer.exe. STACK_TEXT: ffffaa04`952a1920 fffff800`456990c3 : ffffce07`a17241f0 ffffce07`c0df94a0 00000000`00000000 ffffab00`d4fc6990 : mountmgr!MountMgrQueryDosVolumePath+0x48f. ffffaa04`952a1a50 fffff800`414cd805 : ffffaa04`952a1bf0 ffffab00`e536a0f0 ffffab00`dcbf4b50 ffffaa04`952a1b48 : mountmgr!MountMgrDeviceControl+0xb3. ffffaa04`952a1ab0 fffff800`418a99f2 : 00000000`00000010 ffffaa04`952a1bf0 ffffab00`e536a0f0 00000000`00000000 : nt!IofCallDriver+0x55. ffffaa04`952a1af0 fffff800`418a9217 : ce07c2d1`c310fffe 00000000`000000c0 ffffab00`e536a0f0 ffffab00`e536a0f0 : nt!IoVolumeDeviceToDosName+0x232. ffffaa04`952a1dc0 fffff800`418a912e : ffffce07`c44b3190 ffffce07`00000000 ffffaa04`952a1f01 ffffab00`e536a0f0 : nt!IopQueryNameInternal+0xa3. ffffaa04`952a1e70 fffff800`418aa608 : ffffce07`c44b3190 ffffaa04`952a2a80 00000000`000000d0 00000280`d6a61110 : nt!IoQueryFileDosDeviceName+0x5e. ffffaa04`952a1ec0 fffff800`41605fb5 : 00000000`00000001 00000000`00000002 00000000`00000000 00000280`d6d61c4c : nt!NtQueryInformationProcess+0x968. ffffaa04`952a2990 00007ffc`8950c0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 000000f8`847ff1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`8950c0b4. SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+48f. MODULE_NAME: mountmgr. IMAGE_NAME: mountmgr.sys. IMAGE_VERSION: 10.0.19041.1030. STACK_COMMAND: .cxr 0xffffaa04952a0f20 ; kb. BUCKET_ID_FUNC_OFFSET: 48f. FAILURE_BUCKET_ID: 0x3B_c0000005_mountmgr!MountMgrQueryDosVolumePath. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {80080096-09f3-1592-4db4-e3e98f2b9ae8} Followup: MachineOwner. ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.