- Minidump Rapor Linki
- https://paste2.org/p3ZUBDtO
- RAM
- Corsair DDR4 Vengeance RGB Pro 2x8GB 3200 CL16
- Ekran kartı
- RX 5700 XT GAMING X
- Anakart
- B450M
- İşlemci
- Ryzen 5 3600X
Selamlar. Ara ara mavi ekran hatası ile karşılaşıyorum. Canlı yayındayken bir anda tüm her şey gidiyor yayın da bunlara dahil ama hatayı hala çözemedim. Yardımcı olabilir misiniz?
DMP dosyası aşağıda gönderilmiştir. Bu hata Discord'dan mı kaynaklı yoksa farklı şey mi bilmiyorum. Şimdiden teşekkürler.
Günceldir.
DMP dosyası aşağıda gönderilmiştir. Bu hata Discord'dan mı kaynaklı yoksa farklı şey mi bilmiyorum. Şimdiden teşekkürler.
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\062524-6875-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff802`64c00000 PsLoadedModuleList = 0xfffff802`6582a360
Debug session time: Tue Jun 25 01:02:04.092 2024 (UTC + 2:00)
System Uptime: 0 days 0:54:22.737
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000096`8873a018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`64ffdb50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff60c`a92d7380=000000000000003b
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8026502a61e, Address of the instruction which caused the BugCheck
Arg3: fffff60ca92d7c80, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2499
Key : Analysis.Elapsed.mSec
Value: 3949
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 2412
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Failure.Bucket
Value: AV_nt!MiUnlockWorkingSetExclusive
Key : Failure.Hash
Value: {7ee8fd8f-9d86-9976-87b7-738c59fe5d1b}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8026502a61e
BUGCHECK_P3: fffff60ca92d7c80
BUGCHECK_P4: 0
FILE_IN_CAB: 062524-6875-01.dmp
CONTEXT: fffff60ca92d7c80 -- (.cxr 0xfffff60ca92d7c80)
rax=0000000000000000 rbx=ffffdc8cfd76d7c0 rcx=fffff802605c3180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffdc8cfd76d700
rip=fffff8026502a61e rsp=fffff60ca92d8680 rbp=0000000000000000
r8=fffff60ca92d8770 r9=0000000000000000 r10=0000000000000001
r11=00000232bb270000 r12=0000000000000000 r13=0000000000000001
r14=0000000001000000 r15=00000000ffffffde
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!MiUnlockWorkingSetExclusive+0x1fed9e:
fffff802`6502a61e 498b1e mov rbx,qword ptr [r14] ds:002b:00000000`01000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
fffff60c`a92d8680 fffff802`64e62884 : ffffdc8c`fd76d080 00000000`00000000 ffffdc8c`fd76d7c0 fffff802`605c3180 : nt!MiUnlockWorkingSetExclusive+0x1fed9e
fffff60c`a92d86c0 fffff802`65231e29 : ffffdc8d`02b8b8c0 ffffdc8d`02ac6258 ffffdc8c`fd76d080 00000000`00000000 : nt!MiGetVadWakeList+0x94
fffff60c`a92d8700 fffff802`65231d4f : ffffdc8d`02b8b8c0 ffffdc8c`fde8b080 ffffdc8c`fd76d080 fffff802`64e62c05 : nt!MiReleaseVadEventBlocks+0x39
fffff60c`a92d8750 fffff802`64e6169e : ffffdc8d`02ac6258 ffffdc8d`02b8b8c0 00000000`00000000 ffffdc8c`fd76d080 : nt!MiRemoveVadCharges+0xff
fffff60c`a92d87d0 fffff802`64e2b7a1 : 00000000`00000002 ffffb688`00000001 ffffdc8c`fde8b080 ffffdc8d`00000000 : nt!MiFinishVadDeletion+0x10e
fffff60c`a92d8870 fffff802`6528fbf9 : 00000000`00000000 00000000`00000000 00000096`00000000 ffffdc8c`fd76d080 : nt!MiDeleteVad+0xa11
fffff60c`a92d8970 fffff802`6528f9d2 : ffffdc8d`02b8b8c0 00000000`00000000 ffffdc8c`fd76d080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff60c`a92d89a0 fffff802`6528f849 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff60c`a92d8a80 fffff802`6528d08c : ffffdc8c`fde8b080 00000000`00000000 00000000`00000000 ffffdc8c`fd76d080 : nt!NtUnmapViewOfSectionEx+0x99
fffff60c`a92d8ad0 fffff802`65011b08 : ffffdc8c`fde8b080 00000000`0000ffff fffff60c`a92d8b80 ffffdc8c`fbcb1a80 : nt!NtUnmapViewOfSection+0xc
fffff60c`a92d8b00 00007ffe`1672daa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`97ffe438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1672daa4
SYMBOL_NAME: nt!MiUnlockWorkingSetExclusive+1fed9e
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.4522
STACK_COMMAND: .cxr 0xfffff60ca92d7c80 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1fed9e
FAILURE_BUCKET_ID: AV_nt!MiUnlockWorkingSetExclusive
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7ee8fd8f-9d86-9976-87b7-738c59fe5d1b}
Followup: MachineOwner
---------
Günceldir.
Son düzenleme: