S
Simon ElfvingKristensen
Hello, so my pc just recently started crashing and I am really new to computers, so I do not understand what is happening. I read that I had to get a dump file.
Here is what it said when I analyzed the dump file:
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Simon\Desktop\030421-14750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff800`2b200000 PsLoadedModuleList = 0xfffff800`2b645e90
Debug session time: Thu Mar 4 10:58:05.678 2021 (UTC + 1:00)
System Uptime: 0 days 3:07:29.680
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8002b273cc0, Address of the instruction which caused the bugcheck
Arg3: fffff40ecc51c060, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-B0PJ3IL
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 38
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8002b273cc0
BUGCHECK_P3: fffff40ecc51c060
BUGCHECK_P4: 0
CONTEXT: fffff40ecc51c060 -- (.cxr 0xfffff40ecc51c060)
rax=308601020304040f rbx=0000000000000000 rcx=0000000000000069
rdx=ffffbd8442c03f68 rsi=00000000000000c8 rdi=0000000000000001
rip=fffff8002b273cc0 rsp=fffff40ecc51ca50 rbp=0000000000000000
r8=ff010103300504fc r9=ffffbd844556efe8 r10=ffffbd8441e00290
r11=0000000000000001 r12=ffffbd84453cecb0 r13=0000000000000000
r14=0000000000000000 r15=3333333333333333
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbInsertNodeEx+0x90:
fffff800`2b273cc0 498b08 mov rcx,qword ptr [r8] ds:002b:ff010103`300504fc=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
STACK_TEXT:
fffff40e`cc51ca50 fffff800`2b270d67 : 00000000`00000001 ffffbd84`41e00280 ffffbd84`4fef2fe0 ffffbd84`4feed000 : nt!RtlRbInsertNodeEx+0x90
fffff40e`cc51ca60 fffff800`2b2728c2 : ffffbd84`4feed000 ffffbd84`41e00280 ffffbd84`4fef2e10 ffffbd84`4feed000 : nt!RtlpHpVsFreeChunkInsert+0x1c7
fffff40e`cc51ca90 fffff800`2b2749bd : ffff8384`0000004a 00000000`00000000 ffff8384`1ae4e028 00000000`00000000 : nt!RtlpHpVsContextFree+0x302
fffff40e`cc51cb30 fffff800`2b56e0a9 : ffffbd84`66da28a0 ffff8384`00000210 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff40e`cc51cc50 fffff800`40b11767 : ffff8384`15494c10 fffff40e`00000000 fffff40e`00000003 00000000`00000000 : nt!ExFreePool+0x9
fffff40e`cc51cc80 fffff800`40b7d792 : ffffbd84`4bbb9660 00000000`00000000 00000000`00000003 00000000`00000000 : dxgmms2!operator delete+0x17
fffff40e`cc51ccb0 fffff800`40b7c8e8 : ffffbd84`530b5a30 00000000`00000001 00000000`00000000 fffff40e`cc51d020 : dxgmms2!VIDMM_GLOBAL:estroyOneAllocation+0x3b2
fffff40e`cc51cef0 fffff800`40b1278a : ffffbd84`530b5a30 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL:estroyAllocation+0xc
fffff40e`cc51cf20 fffff800`414e48fb : 00000000`00000000 fffff40e`cc51d050 00000000`00000000 00000000`00000000 : dxgmms2!VidMmDestroyAllocation+0x1a
fffff40e`cc51cf50 fffff800`414e20d6 : ffffbd84`66da28a0 fffff800`415219f9 ffffbd84`66da28a0 00000000`00000000 : dxgkrnl!DXGDEVICE:estroyAllocations+0x777
fffff40e`cc51d0f0 fffff800`4152175a : fffff40e`cc51d090 ffffbd84`66da28a0 00000000`00000000 ffffbd84`66da2a18 : dxgkrnl!DXGDEVICE:rainAllocations+0x4a
fffff40e`cc51d150 fffff800`41521c4c : ffffbd84`66da28a0 ffffbd84`66667130 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE:estroyAllDeviceState+0x156
fffff40e`cc51d190 fffff800`414f314e : 00000000`00000000 fffff40e`cc51d2c0 ffffbd84`66da28a0 ffffbd84`66da28a0 : dxgkrnl!ADAPTER_RENDER:estroyDevice+0xd8
fffff40e`cc51d1c0 fffff800`414f54d5 : ffffbd84`509f4490 ffff8384`1f78b080 ffffbd84`509f4490 00000000`00000000 : dxgkrnl!DXGPROCESS:estroy+0x44e
fffff40e`cc51d430 fffff800`41409034 : fffff40e`cc51d560 ffffbd84`509f4490 ffff8384`132ed9c0 ffff8384`1f78b080 : dxgkrnl!DXGPROCESS:estroyDxgProcess+0x105
fffff40e`cc51d570 fffff800`2b822a06 : 00000000`00000000 00000000`00000000 ffff8384`132edcc0 fffff800`00ab5000 : dxgkrnl!DxgkProcessNotify+0xa4
fffff40e`cc51d5b0 fffff800`2b864c3c : ffff8384`1f78b000 ffff8384`1f78b080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212
fffff40e`cc51d680 fffff800`2b84494f : ffff8384`1bb3a688 00000000`00000000 fffff40e`cc51d859 00000000`00000000 : nt!PspExitProcess+0x70
fffff40e`cc51d6b0 fffff800`2b8cb3d3 : 00000000`00000003 ffffad00`93690101 00000027`eb339000 00000000`00000000 : nt!PspExitThread+0x5c7
fffff40e`cc51d7c0 fffff800`2b252e31 : ffff8384`1bb3a080 00000000`00000000 00000000`00000000 fffff800`00000000 : nt!KiSchedulerApcTerminate+0x33
fffff40e`cc51d800 fffff800`2b3c7ff0 : 00000000`00000001 fffff40e`cc51d8c0 00000000`00000000 fffff800`00000000 : nt!KiDeliverApc+0x481
fffff40e`cc51d8c0 fffff800`2b3d53ff : ffff8384`1bb3a080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff40e`cc51da00 00007ff9`f85fce14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000027`eb49fb18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f85fce14
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.18362.1379
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff40ecc51c060 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
Continue reading...
Here is what it said when I analyzed the dump file:
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Simon\Desktop\030421-14750-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff800`2b200000 PsLoadedModuleList = 0xfffff800`2b645e90
Debug session time: Thu Mar 4 10:58:05.678 2021 (UTC + 1:00)
System Uptime: 0 days 3:07:29.680
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8002b273cc0, Address of the instruction which caused the bugcheck
Arg3: fffff40ecc51c060, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-B0PJ3IL
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 38
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8002b273cc0
BUGCHECK_P3: fffff40ecc51c060
BUGCHECK_P4: 0
CONTEXT: fffff40ecc51c060 -- (.cxr 0xfffff40ecc51c060)
rax=308601020304040f rbx=0000000000000000 rcx=0000000000000069
rdx=ffffbd8442c03f68 rsi=00000000000000c8 rdi=0000000000000001
rip=fffff8002b273cc0 rsp=fffff40ecc51ca50 rbp=0000000000000000
r8=ff010103300504fc r9=ffffbd844556efe8 r10=ffffbd8441e00290
r11=0000000000000001 r12=ffffbd84453cecb0 r13=0000000000000000
r14=0000000000000000 r15=3333333333333333
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbInsertNodeEx+0x90:
fffff800`2b273cc0 498b08 mov rcx,qword ptr [r8] ds:002b:ff010103`300504fc=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
STACK_TEXT:
fffff40e`cc51ca50 fffff800`2b270d67 : 00000000`00000001 ffffbd84`41e00280 ffffbd84`4fef2fe0 ffffbd84`4feed000 : nt!RtlRbInsertNodeEx+0x90
fffff40e`cc51ca60 fffff800`2b2728c2 : ffffbd84`4feed000 ffffbd84`41e00280 ffffbd84`4fef2e10 ffffbd84`4feed000 : nt!RtlpHpVsFreeChunkInsert+0x1c7
fffff40e`cc51ca90 fffff800`2b2749bd : ffff8384`0000004a 00000000`00000000 ffff8384`1ae4e028 00000000`00000000 : nt!RtlpHpVsContextFree+0x302
fffff40e`cc51cb30 fffff800`2b56e0a9 : ffffbd84`66da28a0 ffff8384`00000210 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff40e`cc51cc50 fffff800`40b11767 : ffff8384`15494c10 fffff40e`00000000 fffff40e`00000003 00000000`00000000 : nt!ExFreePool+0x9
fffff40e`cc51cc80 fffff800`40b7d792 : ffffbd84`4bbb9660 00000000`00000000 00000000`00000003 00000000`00000000 : dxgmms2!operator delete+0x17
fffff40e`cc51ccb0 fffff800`40b7c8e8 : ffffbd84`530b5a30 00000000`00000001 00000000`00000000 fffff40e`cc51d020 : dxgmms2!VIDMM_GLOBAL:estroyOneAllocation+0x3b2
fffff40e`cc51cef0 fffff800`40b1278a : ffffbd84`530b5a30 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL:estroyAllocation+0xc
fffff40e`cc51cf20 fffff800`414e48fb : 00000000`00000000 fffff40e`cc51d050 00000000`00000000 00000000`00000000 : dxgmms2!VidMmDestroyAllocation+0x1a
fffff40e`cc51cf50 fffff800`414e20d6 : ffffbd84`66da28a0 fffff800`415219f9 ffffbd84`66da28a0 00000000`00000000 : dxgkrnl!DXGDEVICE:estroyAllocations+0x777
fffff40e`cc51d0f0 fffff800`4152175a : fffff40e`cc51d090 ffffbd84`66da28a0 00000000`00000000 ffffbd84`66da2a18 : dxgkrnl!DXGDEVICE:rainAllocations+0x4a
fffff40e`cc51d150 fffff800`41521c4c : ffffbd84`66da28a0 ffffbd84`66667130 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE:estroyAllDeviceState+0x156
fffff40e`cc51d190 fffff800`414f314e : 00000000`00000000 fffff40e`cc51d2c0 ffffbd84`66da28a0 ffffbd84`66da28a0 : dxgkrnl!ADAPTER_RENDER:estroyDevice+0xd8
fffff40e`cc51d1c0 fffff800`414f54d5 : ffffbd84`509f4490 ffff8384`1f78b080 ffffbd84`509f4490 00000000`00000000 : dxgkrnl!DXGPROCESS:estroy+0x44e
fffff40e`cc51d430 fffff800`41409034 : fffff40e`cc51d560 ffffbd84`509f4490 ffff8384`132ed9c0 ffff8384`1f78b080 : dxgkrnl!DXGPROCESS:estroyDxgProcess+0x105
fffff40e`cc51d570 fffff800`2b822a06 : 00000000`00000000 00000000`00000000 ffff8384`132edcc0 fffff800`00ab5000 : dxgkrnl!DxgkProcessNotify+0xa4
fffff40e`cc51d5b0 fffff800`2b864c3c : ffff8384`1f78b000 ffff8384`1f78b080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212
fffff40e`cc51d680 fffff800`2b84494f : ffff8384`1bb3a688 00000000`00000000 fffff40e`cc51d859 00000000`00000000 : nt!PspExitProcess+0x70
fffff40e`cc51d6b0 fffff800`2b8cb3d3 : 00000000`00000003 ffffad00`93690101 00000027`eb339000 00000000`00000000 : nt!PspExitThread+0x5c7
fffff40e`cc51d7c0 fffff800`2b252e31 : ffff8384`1bb3a080 00000000`00000000 00000000`00000000 fffff800`00000000 : nt!KiSchedulerApcTerminate+0x33
fffff40e`cc51d800 fffff800`2b3c7ff0 : 00000000`00000001 fffff40e`cc51d8c0 00000000`00000000 fffff800`00000000 : nt!KiDeliverApc+0x481
fffff40e`cc51d8c0 fffff800`2b3d53ff : ffff8384`1bb3a080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff40e`cc51da00 00007ff9`f85fce14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000027`eb49fb18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f85fce14
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.18362.1379
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff40ecc51c060 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
Continue reading...