S
SimonCabradilla
Hello, This is a newly built pc. After using it for atleast 3-4 months, I kept getting these errors bsod
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\092820-7453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`33400000 PsLoadedModuleList = 0xfffff804`3402a310
Debug session time: Mon Sep 28 06:42:56.818 2020 (UTC - 7:00)
System Uptime: 0 days 0:15:47.499
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffaed8476f985d, Address of the instruction which caused the bugcheck
Arg3: ffff930823e6ec20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0ABACKB
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffaed8476f985d
BUGCHECK_P3: ffff930823e6ec20
BUGCHECK_P4: 0
CONTEXT: ffff930823e6ec20 -- (.cxr 0xffff930823e6ec20)
rax=0000000000000138 rbx=ffffaeac82875060 rcx=0000000000000000
rdx=ffffaeac8281fb20 rsi=ffffaeac82875288 rdi=0000000000000200
rip=ffffaed8476f985d rsp=ffff930823e6f620 rbp=ffffaeac828750a8
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff930823e6f690 r12=0000000000000138 r13=0000000000000138
r14=ffffaeac82875094 r15=ffffaeac82875090
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!TimersProc+0x1fd:
ffffaed8`476f985d 448be0 mov r12d,eax
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffff9308`23e6f620 ffffaed8`476f9346 : 00000000`00000000 00000000`000e751c 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1fd
ffff9308`23e6f6b0 ffffaed8`46481eb4 : ffff830d`5f73d0c0 ffff830d`5f73d0c0 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffff9308`23e6f870 ffffaed8`47698961 : ffff830d`5f73d0c0 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc4
ffff9308`23e6f9a0 ffffaed8`46a4474e : ffff830d`5f73d0c0 ffff830d`5f73d0c0 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x71
ffff9308`23e6f9d0 fffff804`338058b5 : ffff830d`00000005 00000000`00000005 00000247`100051a0 00000000`000003dc : win32k!NtUserCallNoParam+0x16
ffff9308`23e6fa00 00007ffa`1a1710e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000bd`7d27fce8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1a1710e4
SYMBOL_NAME: win32kfull!TimersProc+1fd
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xffff930823e6ec20 ; kb
BUCKET_ID_FUNC_OFFSET: 1fd
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}
Followup: MachineOwner
Continue reading...
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\092820-7453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`33400000 PsLoadedModuleList = 0xfffff804`3402a310
Debug session time: Mon Sep 28 06:42:56.818 2020 (UTC - 7:00)
System Uptime: 0 days 0:15:47.499
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffaed8476f985d, Address of the instruction which caused the bugcheck
Arg3: ffff930823e6ec20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0ABACKB
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 4
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffaed8476f985d
BUGCHECK_P3: ffff930823e6ec20
BUGCHECK_P4: 0
CONTEXT: ffff930823e6ec20 -- (.cxr 0xffff930823e6ec20)
rax=0000000000000138 rbx=ffffaeac82875060 rcx=0000000000000000
rdx=ffffaeac8281fb20 rsi=ffffaeac82875288 rdi=0000000000000200
rip=ffffaed8476f985d rsp=ffff930823e6f620 rbp=ffffaeac828750a8
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff930823e6f690 r12=0000000000000138 r13=0000000000000138
r14=ffffaeac82875094 r15=ffffaeac82875090
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!TimersProc+0x1fd:
ffffaed8`476f985d 448be0 mov r12d,eax
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffff9308`23e6f620 ffffaed8`476f9346 : 00000000`00000000 00000000`000e751c 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1fd
ffff9308`23e6f6b0 ffffaed8`46481eb4 : ffff830d`5f73d0c0 ffff830d`5f73d0c0 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffff9308`23e6f870 ffffaed8`47698961 : ffff830d`5f73d0c0 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc4
ffff9308`23e6f9a0 ffffaed8`46a4474e : ffff830d`5f73d0c0 ffff830d`5f73d0c0 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x71
ffff9308`23e6f9d0 fffff804`338058b5 : ffff830d`00000005 00000000`00000005 00000247`100051a0 00000000`000003dc : win32k!NtUserCallNoParam+0x16
ffff9308`23e6fa00 00007ffa`1a1710e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000bd`7d27fce8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1a1710e4
SYMBOL_NAME: win32kfull!TimersProc+1fd
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xffff930823e6ec20 ; kb
BUCKET_ID_FUNC_OFFSET: 1fd
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}
Followup: MachineOwner
Continue reading...