CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffa304c4c63180, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6249
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 42791
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffa304c4c63180
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: system32.exe
CRITICAL_PROCESS: system32.exe
ERROR_CODE: (NTSTATUS) 0xc9455080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffff583`867b1938 fffff802`692c9a49 : 00000000`000000ef ffffa304`c4c63180 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff583`867b1940 fffff802`691da501 : ffffa304`c4c63180 fffff802`68b20d35 ffffa304`c4c63180 fffff802`68ae9438 : nt!PspCatchCriticalBreak+0x115
fffff583`867b19e0 fffff802`69072898 : ffffa304`00000000 00000000`00000000 ffffa304`c4c63180 ffffa304`c4c63180 : nt!PspTerminateAllThreads+0x165a35
fffff583`867b1a50 fffff802`690d6db9 : ffffffff`ffffffff fffff583`867b1b80 ffffa304`c4c63180 fffff802`6904c601 : nt!PspTerminateProcess+0xe0
fffff583`867b1a90 fffff802`68bd5358 : ffffa304`00000abc ffffa304`c9455080 ffffa304`c4c63180 00000000`77012840 : nt!NtTerminateProcess+0xa9
fffff583`867b1b00 00000000`76f61cbc : 00000000`76f61c7b 00000000`76fe74f9 00000000`00000023 00000000`00000282 : nt!KiSystemServiceCopyEnd+0x28
00000000`0341f038 00000000`76f61c7b : 00000000`76fe74f9 00000000`00000023 00000000`00000282 00000000`0783e294 : 0x76f61cbc
00000000`0341f040 00000000`76fe74f9 : 00000000`00000023 00000000`00000282 00000000`0783e294 00000000`0000002b : 0x76f61c7b
00000000`0341f048 00000000`00000023 : 00000000`00000282 00000000`0783e294 00000000`0000002b 00000000`07e85ad8 : 0x76fe74f9
00000000`0341f050 00000000`00000282 : 00000000`0783e294 00000000`0000002b 00000000`07e85ad8 00000000`0000002c : 0x23
00000000`0341f058 00000000`0783e294 : 00000000`0000002b 00000000`07e85ad8 00000000`0000002c 00000000`00000000 : 0x282
00000000`0341f060 00000000`0000002b : 00000000`07e85ad8 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x783e294
00000000`0341f068 00000000`07e85ad8 : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`0341f070 00000000`0000002c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0x7e85ad8
00000000`0341f078 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0783cb20 : 0x2c
SYMBOL_NAME: nt!PspCatchCriticalBreak+115
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1198
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 115
FAILURE_BUCKET_ID: 0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_c9455080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dadbeb56-a635-5ee0-131b-a3c4bc8b6bd6}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8016412a07b, The address that the exception occurred at
Arg3: ffffb601812e6488, Exception Record Address
Arg4: ffffb601812e5cd0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6656
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 76390
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8016412a07b
BUGCHECK_P3: ffffb601812e6488
BUGCHECK_P4: ffffb601812e5cd0
EXCEPTION_RECORD: ffffb601812e6488 -- (.exr 0xffffb601812e6488)
ExceptionAddress: fffff8016412a07b (dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x000000000000006b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffb601812e5cd0 -- (.cxr 0xffffb601812e5cd0)
rax=0000000000002000 rbx=ffff82857ba3bec8 rcx=8ffe6c368e320000
rdx=ffdf82857d068c18 rsi=ffff82857ba3bdb0 rdi=ffdf82857d068c48
rip=fffff8016412a07b rsp=ffffb601812e66c0 rbp=ffffbe831d9c4000
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffffbe8313148ba0 r12=ffff82857e083f38 r13=ffff828598558870
r14=ffff82857ba3bec8 r15=ffff82857d068c48
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x6b:
fffff801`6412a07b 488b3f mov rdi,qword ptr [rdi] ds:002b:ffdf8285`7d068c48=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8015bf713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8015be283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8015be283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffb601`812e66c0 fffff801`6412a313 : ffffbe83`1859d410 ffffbe83`1859d390 ffff8285`7e083f38 00000000`00000008 : dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x6b
ffffb601`812e6700 fffff801`64120cde : 00000000`00000002 00000000`c01e0101 00000000`00000000 ffff8285`8208ede0 : dxgmms1!VIDMM_SEGMENT::UnusedPass+0x14b
ffffb601`812e6760 fffff801`6411efeb : 00000000`00000000 ffff8285`8a625610 00000000`00000000 ffffbe83`245fb320 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x50e
ffffb601`812e68a0 fffff801`641347d5 : ffffbe83`271369a0 ffffbe83`00000000 ffffbe83`189a1500 ffffbe83`00000c40 : dxgmms1!VidSchiSubmitRenderCommand+0x1fb
ffffb601`812e6b80 fffff801`64134713 : ffffbe83`1be31000 00000000`00000080 fffff801`64134660 ffffbe83`1be31000 : dxgmms1!VidSchiRun_PriorityTable+0xb5
ffffb601`812e6bd0 fffff801`5bb33585 : ffffbe83`1bf9b0c0 fffff801`64134660 ffffbe83`1be31000 00000405`b59bbfff : dxgmms1!VidSchiWorkerThread+0xb3
ffffb601`812e6c10 fffff801`5bbcb128 : fffff801`5995e180 ffffbe83`1bf9b0c0 fffff801`5bb33530 41d3af0f`4101568d : nt!PspSystemThreadStartup+0x55
ffffb601`812e6c60 00000000`00000000 : ffffb601`812e7000 ffffb601`812e1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::EvictAllocation+6b
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .cxr 0xffffb601812e5cd0 ; kb
BUCKET_ID_FUNC_OFFSET: 6b
FAILURE_BUCKET_ID: AV_dxgmms1!VIDMM_GLOBAL::EvictAllocation
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {992228a6-30aa-b12b-b436-05de95e4ea8d}
Followup: MachineOwner
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffb28a647460c0, The address of the thread.
Arg2: ffffa28088bc8748, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11640
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 192
BUGCHECK_P1: ffffb28a647460c0
BUGCHECK_P2: ffffa28088bc8748
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff8006`d10ae1b8 fffff804`7843f077 : 00000000`00000192 ffffb28a`647460c0 ffffa280`88bc8748 00000000`00000000 : nt!KeBugCheckEx
ffff8006`d10ae1c0 fffff804`7843e3c6 : ffffa280`88bc8700 ffff9080`00000000 00000000`00000010 ffffb28a`5ab6b5a0 : nt!ExAcquirePushLockSharedEx+0x147
ffff8006`d10ae200 fffff804`79737ccc : ffffb28a`666143c0 ffff8006`d10ae400 ffffb28a`5ab6b5a0 00000000`00000010 : nt!FsRtlLookupPerStreamContextInternal+0x46
ffff8006`d10ae230 fffff804`79737b39 : ffffb28a`5ab6b5a0 ffffb28a`5a227320 00000000`00000010 ffffb28a`5a9dd8a0 : FLTMGR!FltpGetStreamListCtrl+0x6c
ffff8006`d10ae2a0 fffff804`73f9604c : 00000000`00000000 ffffb28a`727b90f8 ffff8006`d10ae370 00000000`00000010 : FLTMGR!FltGetStreamHandleContext+0x29
ffff8006`d10ae2e0 fffff804`73f961b3 : ffffb28a`727b90f8 00000000`00000000 ffff8006`d10ae419 ffffb28a`727b9010 : bindflt!BfCheckAndSwitchTarget+0x44
ffff8006`d10ae340 fffff804`79734a8c : ffffb28a`727b9010 ffffb28a`727b9198 ffff8006`d10ae419 ffffb28a`727b9010 : bindflt!BfPreReadWrite+0x43
ffff8006`d10ae370 fffff804`797345d0 : ffff8006`d10ae550 00000000`00000000 ffffb28a`727b4904 00000000`00060a00 : FLTMGR!FltpPerformPreCallbacks+0x2fc
ffff8006`d10ae480 fffff804`79734142 : 00000000`00000000 ffff8006`d10ae550 ffffb28a`727b49a0 ffff8006`d10ae560 : FLTMGR!FltpPassThroughInternal+0x90
ffff8006`d10ae4b0 fffff804`79733f2e : ffffb28a`647460c0 fffff804`7843fa5d 00000000`00000000 ffffb28a`66614440 : FLTMGR!FltpPassThrough+0x162
ffff8006`d10ae530 fffff804`78437159 : ffffb28a`727b49a0 00000000`00000001 00000000`00000001 ffffb28a`666143c0 : FLTMGR!FltpDispatch+0x9e
ffff8006`d10ae590 fffff804`789f2a95 : 00000000`00000001 ffffb28a`666143c0 ffffb28a`727b4e18 ffffb28a`666143c0 : nt!IofCallDriver+0x59
ffff8006`d10ae5d0 fffff804`78a297d6 : ffffb28a`00000000 ffffb28a`5a9668d0 ffffb28a`666143c0 ffff8006`d10ae860 : nt!IopSynchronousServiceTail+0x1a5
ffff8006`d10ae670 fffff804`785d5358 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x676
ffff8006`d10ae770 fffff804`785c7940 : fffff804`78aba096 00000000`00000000 ffff8006`d10aea21 ffffb28a`647460c0 : nt!KiSystemServiceCopyEnd+0x28
ffff8006`d10ae978 fffff804`78aba096 : 00000000`00000000 ffff8006`d10aea21 ffffb28a`647460c0 fffff804`78440025 : nt!KiServiceLinkage
ffff8006`d10ae980 fffff804`78a2fd5a : ffffb28a`6468aa00 00000000`00000000 00000000`c0000001 00000000`c0000001 : nt!EtwpFlushBufferToLogfile+0xa6
ffff8006`d10ae9f0 fffff804`789c525a : 00000000`00000000 00000000`00000000 ffffb28a`6468aa00 ffffb28a`64df0000 : nt!EtwpFlushBuffer+0x9a
ffff8006`d10aea20 fffff804`78ab7869 : ffffb28a`6468aa00 ffffb28a`6468aa00 00000000`00000000 ffffffff`fffffffd : nt!EtwpFlushActiveBuffers+0x242
ffff8006`d10aeb90 fffff804`78533585 : ffffffff`fffffffd ffffb28a`647460c0 00000000`00000080 fffff804`78ab76b0 : nt!EtwpLogger+0x1b9
ffff8006`d10aec10 fffff804`785cb128 : ffff9080`c5781180 ffffb28a`647460c0 fffff804`78533530 00000000`00000007 : nt!PspSystemThreadStartup+0x55
ffff8006`d10aec60 00000000`00000000 : ffff8006`d10af000 ffff8006`d10a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8047843e9fe - nt!ExReleaseCacheAwarePushLockSharedEx+6e
[ fe:de ]
1 error : !nt (fffff8047843e9fe)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc508104dc080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9437
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 53528
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffc508104dc080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: system32.exe
CRITICAL_PROCESS: system32.exe
ERROR_CODE: (NTSTATUS) 0x1b3e50c0 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffffd8f`9bb3a938 fffff807`66ac9a59 : 00000000`000000ef ffffc508`104dc080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd8f`9bb3a940 fffff807`669a380f : ffffc508`104dc080 fffff807`66208599 ffffc508`104dc080 fffff807`662086b4 : nt!PspCatchCriticalBreak+0x115
fffffd8f`9bb3a9e0 fffff807`667bd144 : ffffc508`00000000 00000000`00000000 ffffc508`104dc080 ffffc508`104dc080 : nt!PspTerminateAllThreads+0x1e4773
fffffd8f`9bb3aa50 fffff807`667bbe69 : ffffffff`ffffffff fffffd8f`9bb3ab80 ffffc508`104dc080 fffff807`6686ad01 : nt!PspTerminateProcess+0xe0
fffffd8f`9bb3aa90 fffff807`663d4558 : ffffc508`00000b20 ffffc508`1b3e50c0 ffffc508`104dc080 00000000`77c729d4 : nt!NtTerminateProcess+0xa9
fffffd8f`9bb3ab00 00000000`77bc1cbc : 00000000`77bc1c7b 00000000`77c46409 00000000`00000023 00000000`00000206 : nt!KiSystemServiceCopyEnd+0x28
00000000`0340f068 00000000`77bc1c7b : 00000000`77c46409 00000000`00000023 00000000`00000206 00000000`0708e6d4 : 0x77bc1cbc
00000000`0340f070 00000000`77c46409 : 00000000`00000023 00000000`00000206 00000000`0708e6d4 00000000`0000002b : 0x77bc1c7b
00000000`0340f078 00000000`00000023 : 00000000`00000206 00000000`0708e6d4 00000000`0000002b 00000000`032bdbf8 : 0x77c46409
00000000`0340f080 00000000`00000206 : 00000000`0708e6d4 00000000`0000002b 00000000`032bdbf8 00000000`0000002c : 0x23
00000000`0340f088 00000000`0708e6d4 : 00000000`0000002b 00000000`032bdbf8 00000000`0000002c 00000000`00000000 : 0x206
00000000`0340f090 00000000`0000002b : 00000000`032bdbf8 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x708e6d4
00000000`0340f098 00000000`032bdbf8 : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`0340f0a0 00000000`0000002c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0x32bdbf8
00000000`0340f0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0708cf60 : 0x2c
SYMBOL_NAME: nt!PspCatchCriticalBreak+115
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 115
FAILURE_BUCKET_ID: 0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_1b3e50c0_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1cb67859-e205-484b-ac0b-36ae7908dab8}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80131a5cab9, Address of the instruction which caused the bugcheck
Arg3: ffffeb02e24f8e80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11998
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80131a5cab9
BUGCHECK_P3: ffffeb02e24f8e80
BUGCHECK_P4: 0
CONTEXT: ffffeb02e24f8e80 -- (.cxr 0xffffeb02e24f8e80)
rax=000000be2517f9a0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000001 rdi=ffff9989b2eb9ed0
rip=fffff80131a5cab9 rsp=ffffeb02e24f9870 rbp=ffffeb02e24f9b80
r8=0000000000000000 r9=0000000000000000 r10=fffff80131a335b0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000008
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!KeSetEvent+0x9:
fffff801`31a5cab9 f6017f test byte ptr [rcx],7Fh ds:002b:00000000`00000000=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
STACK_TEXT:
ffffeb02`e24f9870 fffff801`31fd145c : 00000000`00000000 fffff801`2f93a350 ffff9989`b2eb9ed0 00000000`00000000 : nt!KeSetEvent+0x9
ffffeb02`e24f9900 fffff801`31fd0c36 : ffff9989`b28dffe0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x80c
ffffeb02`e24f9a20 fffff801`31bd4558 : 00000000`00000000 ffffeb02`e24f9b80 ffff9989`b1af02e0 fffff801`320a9bfd : nt!NtDeviceIoControlFile+0x56
ffffeb02`e24f9a90 00007ffa`f899c1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000be`2517f948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`f899c1a4
SYMBOL_NAME: nt!KeSetEvent+9
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .cxr 0xffffeb02e24f8e80 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KeSetEvent
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e21bfbf7-638e-bdcd-11e1-157958eb9932}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.