Revenger
Hectopat
Daha fazla
- Cinsiyet
- Erkek
Sistem:
Windows 10 20H2
A8-7410
M430
8 GB 1600MHz DDR3 RAM
WD Green 120GB SSD
Linkler:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8031827ed35, Address of the instruction which caused the bugcheck
Arg3: ffffb78287860610, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 13031
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on KAANCK-PC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13968
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8031827ed35
BUGCHECK_P3: ffffb78287860610
BUGCHECK_P4: 0
CONTEXT: ffffb78287860610 -- (.cxr 0xffffb78287860610)
rax=ffffe406ec48c6d0 rbx=ffffcf45c4bedae0 rcx=ffffe406ec48c080
rdx=0000000000000000 rsi=ffffe406ec48c080 rdi=0000000000000000
rip=fffff8031827ed35 rsp=ffffb78287861010 rbp=ffffb782878610b9
r8=ffffb78287861028 r9=0000000000000000 r10=fffff8031827ed00
r11=ffffa8fc00600000 r12=0000000080000012 r13=0000000077050c87
r14=000000000cddba5e r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x35:
fffff803`1827ed35 f00fba3700 lock btr dword ptr [rdi],0 ds:002b:00000000`00000000=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Sabotaj.exe
STACK_TEXT:
ffffb782`87861010 ffffcf1f`004671c3 : ffffcf45`c4bedae0 00000000`00000000 ffffcf45`c4eb7000 fffff803`182759aa : nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0x35
ffffb782`87861040 ffffcf1f`004675f2 : ffffcf45`c4bedae0 ffffcf45`c2fb0000 fffff803`18275990 ffffcf1e`fee00cc0 : cdd!CddBitmap::RemoveFromCddBitmapList+0x27
ffffb782`87861070 ffffcf1f`0046f84d : 00000000`77050c87 ffffcf45`c4bedae0 00000000`00000003 00000000`00000003 : cdd!CddBitmapHw::Release+0x72
ffffb782`87861120 ffffcf1e`fedeea58 : ffffcf45`c0911000 ffffcf45`c4eb7000 00000000`00000001 ffffcf45`00000c87 : cdd!DrvDeleteDeviceBitmapEx+0x7d
ffffb782`87861150 ffffcf1e`fedeccbc : ffffb782`00000000 00000000`00000003 00000000`00000000 ffffb782`00000001 : win32kbase!SURFACE::bDeleteSurface+0x738
ffffb782`87861320 ffffcf1e`fee8426d : 00000000`77050c87 ffffb782`878613e0 00000000`00000002 ffffcf1e`00000000 : win32kbase!SURFREF::bDeleteSurface+0x14
ffffb782`87861350 ffffcf1e`fee3d0ff : 00000000`00000000 ffffcf45`c4eb7000 00000000`00000000 ffffcf45`c0a12ca8 : win32kbase!vGarbageCollectObject<SURFREF>+0x9d
ffffb782`878613b0 ffffcf1e`fee3cbad : 00000000`00002768 ffffe406`eb20d305 00000000`77050c87 ffffcf1e`fee38042 : win32kbase!NtGdiCloseProcess+0x1d3
ffffb782`87861420 ffffcf1f`000c9637 : ffffcf45`c2e6f010 ffffcf1f`001854a1 ffffcf45`c2e6f010 7fffe406`e6a4af50 : win32kbase!GdiProcessCallout+0x6d
ffffb782`878614a0 ffffcf1e`fee2c148 : 00000000`00000000 00000000`c000001c ffffb782`87861808 fffff803`182db4db : win32kfull!W32pProcessCallout+0x107
ffffb782`878614e0 ffffcf1e`fea110d0 : 00000000`c000001c ffffb782`878617a0 00000000`00000000 ffffb782`87861808 : win32kbase!W32CalloutDispatch+0x488
ffffb782`878616f0 fffff803`187056e5 : 00000000`00000000 fffff803`18c1df08 ffffe406`e6b77b50 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffffb782`87861730 fffff803`185e6f38 : ffffe406`e6a4adf0 ffffb782`87861920 ffffb782`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffffb782`87861760 fffff803`1867a978 : ffffe406`c0000005 ffffb782`87861801 fffff803`1820f420 ffffe406`ed947080 : nt!PspExitThread+0x598
ffffb782`87861860 fffff803`182e2707 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38
ffffb782`878618a0 fffff803`183f8b40 : 00000000`000008dc ffffb782`87861950 ffff5222`9c1ef6f0 ffffe406`00000000 : nt!KiDeliverApc+0x487
ffffb782`87861950 fffff803`1840605f : 00000000`e8f49ee9 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb782`87861a90 00007ffd`7c0ebe54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000004e`7733f7a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`7c0ebe54
SYMBOL_NAME: cdd!CddBitmap::RemoveFromCddBitmapList+27
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .cxr 0xffffb78287860610 ; kb
BUCKET_ID_FUNC_OFFSET: 27
FAILURE_BUCKET_ID: 0x3B_c0000005_cdd!CddBitmap::RemoveFromCddBitmapList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {be0d3f21-7992-c2f7-1933-482ab464111e}
Followup: MachineOwner
Son düzenleme: