Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\Downloads\110520-22562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`11a00000 PsLoadedModuleList = 0xfffff806`1262a310
Debug session time: Thu Nov 5 13:26:20.245 2020 (UTC + 3:00)
System Uptime: 0 days 0:33:56.866
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`11df45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffee03`ab7c5770=000000000000003b
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80611cc059f, Address of the instruction which caused the bugcheck
Arg3: ffffee03ab7c6070, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10710
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80611cc059f
BUGCHECK_P3: ffffee03ab7c6070
BUGCHECK_P4: 0
CONTEXT: ffffee03ab7c6070 -- (.cxr 0xffffee03ab7c6070)
rax=0000000000000000 rbx=ffffc98bfdf17f00 rcx=ffffa18150d58180
rdx=0000000000000000 rsi=0000000000000000 rdi=fffbc98bfdecd370
rip=fffff80611cc059f rsp=ffffee03ab7c6a70 rbp=ffffee03ab7c6ae8
r8=ffffde06ec7fd001 r9=fffff80611a00000 r10=0000000000000000
r11=ffffde06d49c79c0 r12=0000000000000000 r13=0000000000000002
r14=ffffffffffffffff r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!NtReleaseWorkerFactoryWorker+0x1af:
fffff806`11cc059f 4c897f18 mov qword ptr [rdi+18h],r15 ds:002b:fffbc98b`fdecd388=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffee03`ab7c6a70 fffff806`11e05fb8 : ffffc98b`f2daa080 0000003b`27b7d720 ffffc98b`fdf07d10 00000000`00002101 : nt!NtReleaseWorkerFactoryWorker+0x1af
ffffee03`ab7c6b00 00007ffa`281ceb64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003b`27b7d5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`281ceb64
SYMBOL_NAME: nt!NtReleaseWorkerFactoryWorker+1af
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffee03ab7c6070 ; kb
BUCKET_ID_FUNC_OFFSET: 1af
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!NtReleaseWorkerFactoryWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0631be0b-f72e-4604-46fe-0ac805842532}
Followup: MachineOwner
---------
Kod:Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64. Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\CsHay\Downloads\110520-22562-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available. ************* Path validation summary ************** Response Time (ms) Location. Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (12 procs) Free x64. Product: WinNt, suite: TerminalServer SingleUserTS. Edition build lab: 19041.1.amd64fre.vb_release.191206-1406. Machine Name: Kernel base = 0xfffff806`11a00000 PsLoadedModuleList = 0xfffff806`1262a310. Debug session time: Thu Nov 5 13:26:20.245 2020 (UTC + 3:00) System Uptime: 0 days 0:33:56.866. Loading Kernel Symbols. ............................................................... ................................................................ ................................................................ .... Loading User Symbols. Loading unloaded module list. ........................... For analysis of this file, run !analyze -v. nt!KeBugCheckEx: fffff806`11df45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffee03`ab7c5770=000000000000003b. 5: kd> !analyze -v. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff80611cc059f, Address of the instruction which caused the bugcheck. Arg3: ffffee03ab7c6070, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 5468. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-IPC9T25. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 10710. Key : Analysis.Memory.CommitPeak.Mb. Value: 77. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff80611cc059f. BUGCHECK_P3: ffffee03ab7c6070. BUGCHECK_P4: 0. CONTEXT: ffffee03ab7c6070 -- (.cxr 0xffffee03ab7c6070) rax=0000000000000000 rbx=ffffc98bfdf17f00 rcx=ffffa18150d58180. rdx=0000000000000000 rsi=0000000000000000 rdi=fffbc98bfdecd370. rip=fffff80611cc059f rsp=ffffee03ab7c6a70 rbp=ffffee03ab7c6ae8. r8=ffffde06ec7fd001 r9=fffff80611a00000 r10=0000000000000000. r11=ffffde06d49c79c0 r12=0000000000000000 r13=0000000000000002. r14=ffffffffffffffff r15=0000000000000000. iopl=0 nv up ei ng nz na pe nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282. nt!NtReleaseWorkerFactoryWorker+0x1af: fffff806`11cc059f 4c897f18 mov qword ptr [rdi+18h],r15 ds:002b:fffbc98b`fdecd388=???????????????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: svchost.exe. STACK_TEXT: ffffee03`ab7c6a70 fffff806`11e05fb8 : ffffc98b`f2daa080 0000003b`27b7d720 ffffc98b`fdf07d10 00000000`00002101 : nt!NtReleaseWorkerFactoryWorker+0x1af. ffffee03`ab7c6b00 00007ffa`281ceb64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28. 0000003b`27b7d5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`281ceb64. SYMBOL_NAME: nt!NtReleaseWorkerFactoryWorker+1af. MODULE_NAME: nt. IMAGE_NAME: ntkrnlmp.exe. IMAGE_VERSION: 10.0.19041.572. STACK_COMMAND: .cxr 0xffffee03ab7c6070 ; kb. BUCKET_ID_FUNC_OFFSET: 1af. FAILURE_BUCKET_ID: 0x3B_c0000005_nt!NtReleaseWorkerFactoryWorker. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {0631be0b-f72e-4604-46fe-0ac805842532} Followup: MachineOwner. ---------
- Sisteminizde bulunan Gamepad yazılımını kaldırın. Vigem'e ait bir yazılım kullanıyorsunuz.
- Veıkk'e ait tablet yazılımı da kaldırın.
- Anakartınızın sitesinden chipset sürücüsü güncel değilse güncelleyin.
B450 TOMAHAWK MAX | Motherboard | MSI Global
Best AMD AM4 B450 ATX motherboard, Turbo M.2, Extended heatsink, USB 3.2 Gen 2, Mystic Light, MSI MAGwww.msi.com- Ek olarak kontrol amaçlı Riot Vanguard'ı da kaldırabilirsiniz. Zorunlu değilsiniz ancak tedbir amaçlı.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.