PC CRASH [I need help]

  • Thread starter Simon ElfvingKristensen
  • Start date
S

Simon ElfvingKristensen

Hello, so my pc just recently started crashing and I am really new to computers, so I do not understand what is happening. I read that I had to get a dump file.
Here is what it said when I analyzed the dump file:


Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Users\Simon\Desktop\030421-14750-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available



Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 18362 MP (8 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 18362.1.amd64fre.19h1_release.190318-1202

Machine Name:

Kernel base = 0xfffff800`2b200000 PsLoadedModuleList = 0xfffff800`2b645e90

Debug session time: Thu Mar 4 10:58:05.678 2021 (UTC + 1:00)

System Uptime: 0 days 3:07:29.680

Loading Kernel Symbols

...............................................................

................................................................

................................................................

..............

Loading User Symbols

Loading unloaded module list

....................

For analysis of this file, run !analyze -v

4: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the bugcheck

Arg2: fffff8002b273cc0, Address of the instruction which caused the bugcheck

Arg3: fffff40ecc51c060, Address of the context record for the exception that caused the bugcheck

Arg4: 0000000000000000, zero.



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 3



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-B0PJ3IL



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 38



Key : Analysis.Memory.CommitPeak.Mb

Value: 84



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: 3b



BUGCHECK_P1: c0000005



BUGCHECK_P2: fffff8002b273cc0



BUGCHECK_P3: fffff40ecc51c060



BUGCHECK_P4: 0



CONTEXT: fffff40ecc51c060 -- (.cxr 0xfffff40ecc51c060)

rax=308601020304040f rbx=0000000000000000 rcx=0000000000000069

rdx=ffffbd8442c03f68 rsi=00000000000000c8 rdi=0000000000000001

rip=fffff8002b273cc0 rsp=fffff40ecc51ca50 rbp=0000000000000000

r8=ff010103300504fc r9=ffffbd844556efe8 r10=ffffbd8441e00290

r11=0000000000000001 r12=ffffbd84453cecb0 r13=0000000000000000

r14=0000000000000000 r15=3333333333333333

iopl=0 nv up ei pl zr na po nc

cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246

nt!RtlRbInsertNodeEx+0x90:

fffff800`2b273cc0 498b08 mov rcx,qword ptr [r8] ds:002b:ff010103`300504fc=????????????????

Resetting default scope



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: VALORANT-Win64-Shipping.exe



STACK_TEXT:

fffff40e`cc51ca50 fffff800`2b270d67 : 00000000`00000001 ffffbd84`41e00280 ffffbd84`4fef2fe0 ffffbd84`4feed000 : nt!RtlRbInsertNodeEx+0x90

fffff40e`cc51ca60 fffff800`2b2728c2 : ffffbd84`4feed000 ffffbd84`41e00280 ffffbd84`4fef2e10 ffffbd84`4feed000 : nt!RtlpHpVsFreeChunkInsert+0x1c7

fffff40e`cc51ca90 fffff800`2b2749bd : ffff8384`0000004a 00000000`00000000 ffff8384`1ae4e028 00000000`00000000 : nt!RtlpHpVsContextFree+0x302

fffff40e`cc51cb30 fffff800`2b56e0a9 : ffffbd84`66da28a0 ffff8384`00000210 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d

fffff40e`cc51cc50 fffff800`40b11767 : ffff8384`15494c10 fffff40e`00000000 fffff40e`00000003 00000000`00000000 : nt!ExFreePool+0x9

fffff40e`cc51cc80 fffff800`40b7d792 : ffffbd84`4bbb9660 00000000`00000000 00000000`00000003 00000000`00000000 : dxgmms2!operator delete+0x17

fffff40e`cc51ccb0 fffff800`40b7c8e8 : ffffbd84`530b5a30 00000000`00000001 00000000`00000000 fffff40e`cc51d020 : dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x3b2

fffff40e`cc51cef0 fffff800`40b1278a : ffffbd84`530b5a30 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::DestroyAllocation+0xc

fffff40e`cc51cf20 fffff800`414e48fb : 00000000`00000000 fffff40e`cc51d050 00000000`00000000 00000000`00000000 : dxgmms2!VidMmDestroyAllocation+0x1a

fffff40e`cc51cf50 fffff800`414e20d6 : ffffbd84`66da28a0 fffff800`415219f9 ffffbd84`66da28a0 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x777

fffff40e`cc51d0f0 fffff800`4152175a : fffff40e`cc51d090 ffffbd84`66da28a0 00000000`00000000 ffffbd84`66da2a18 : dxgkrnl!DXGDEVICE::DrainAllocations+0x4a

fffff40e`cc51d150 fffff800`41521c4c : ffffbd84`66da28a0 ffffbd84`66667130 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x156

fffff40e`cc51d190 fffff800`414f314e : 00000000`00000000 fffff40e`cc51d2c0 ffffbd84`66da28a0 ffffbd84`66da28a0 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8

fffff40e`cc51d1c0 fffff800`414f54d5 : ffffbd84`509f4490 ffff8384`1f78b080 ffffbd84`509f4490 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x44e

fffff40e`cc51d430 fffff800`41409034 : fffff40e`cc51d560 ffffbd84`509f4490 ffff8384`132ed9c0 ffff8384`1f78b080 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105

fffff40e`cc51d570 fffff800`2b822a06 : 00000000`00000000 00000000`00000000 ffff8384`132edcc0 fffff800`00ab5000 : dxgkrnl!DxgkProcessNotify+0xa4

fffff40e`cc51d5b0 fffff800`2b864c3c : ffff8384`1f78b000 ffff8384`1f78b080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212

fffff40e`cc51d680 fffff800`2b84494f : ffff8384`1bb3a688 00000000`00000000 fffff40e`cc51d859 00000000`00000000 : nt!PspExitProcess+0x70

fffff40e`cc51d6b0 fffff800`2b8cb3d3 : 00000000`00000003 ffffad00`93690101 00000027`eb339000 00000000`00000000 : nt!PspExitThread+0x5c7

fffff40e`cc51d7c0 fffff800`2b252e31 : ffff8384`1bb3a080 00000000`00000000 00000000`00000000 fffff800`00000000 : nt!KiSchedulerApcTerminate+0x33

fffff40e`cc51d800 fffff800`2b3c7ff0 : 00000000`00000001 fffff40e`cc51d8c0 00000000`00000000 fffff800`00000000 : nt!KiDeliverApc+0x481

fffff40e`cc51d8c0 fffff800`2b3d53ff : ffff8384`1bb3a080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70

fffff40e`cc51da00 00007ff9`f85fce14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f

00000027`eb49fb18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f85fce14





SYMBOL_NAME: nt!ExFreePool+9



IMAGE_NAME: Pool_Corruption



IMAGE_VERSION: 10.0.18362.1379



MODULE_NAME: Pool_Corruption



STACK_COMMAND: .cxr 0xfffff40ecc51c060 ; kb



BUCKET_ID_FUNC_OFFSET: 9



FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool



OS_VERSION: 10.0.18362.1



BUILDLAB_STR: 19h1_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}



Followup: Pool_corruption

---------

Continue reading...
 

Similar threads

Back
Top Bottom