CRITICAL_PROCESS_DIED Mavi Ekran Hatası

İşletim sistemi
Windows 10

KaganBro

Femtopat
Katılım
23 Kasım 2020
Mesajlar
1
Daha fazla  
Cinsiyet
Erkek
Arkadaşlari mavi ekran hatasını uzun zamandır yaşıyorum. Bana yardım edebilecek birileri var mı? Mavi ekran hatasının neden olduğunuda bilmiyorum.

DMP dosyalarım:

 
Son düzenleyen: Moderatör:
Öncelikle belleklere test yapın. Anakartınızın rev sürümü nedir?
Yapılmamış Windows güncellemelerini de yapın.

Ekran kartınızın sürücülerini DDU ile kaldırıp güncelleyin. Ağ sürücülerinizi de güncelleyin, Wi-Fi adaptörü kullanıyorsanız belirtin.

Kod:
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffa304c4c63180, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 42791

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffa304c4c63180

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  system32.exe

CRITICAL_PROCESS:  system32.exe

ERROR_CODE: (NTSTATUS) 0xc9455080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffff583`867b1938 fffff802`692c9a49     : 00000000`000000ef ffffa304`c4c63180 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff583`867b1940 fffff802`691da501     : ffffa304`c4c63180 fffff802`68b20d35 ffffa304`c4c63180 fffff802`68ae9438 : nt!PspCatchCriticalBreak+0x115
fffff583`867b19e0 fffff802`69072898     : ffffa304`00000000 00000000`00000000 ffffa304`c4c63180 ffffa304`c4c63180 : nt!PspTerminateAllThreads+0x165a35
fffff583`867b1a50 fffff802`690d6db9     : ffffffff`ffffffff fffff583`867b1b80 ffffa304`c4c63180 fffff802`6904c601 : nt!PspTerminateProcess+0xe0
fffff583`867b1a90 fffff802`68bd5358     : ffffa304`00000abc ffffa304`c9455080 ffffa304`c4c63180 00000000`77012840 : nt!NtTerminateProcess+0xa9
fffff583`867b1b00 00000000`76f61cbc     : 00000000`76f61c7b 00000000`76fe74f9 00000000`00000023 00000000`00000282 : nt!KiSystemServiceCopyEnd+0x28
00000000`0341f038 00000000`76f61c7b     : 00000000`76fe74f9 00000000`00000023 00000000`00000282 00000000`0783e294 : 0x76f61cbc
00000000`0341f040 00000000`76fe74f9     : 00000000`00000023 00000000`00000282 00000000`0783e294 00000000`0000002b : 0x76f61c7b
00000000`0341f048 00000000`00000023     : 00000000`00000282 00000000`0783e294 00000000`0000002b 00000000`07e85ad8 : 0x76fe74f9
00000000`0341f050 00000000`00000282     : 00000000`0783e294 00000000`0000002b 00000000`07e85ad8 00000000`0000002c : 0x23
00000000`0341f058 00000000`0783e294     : 00000000`0000002b 00000000`07e85ad8 00000000`0000002c 00000000`00000000 : 0x282
00000000`0341f060 00000000`0000002b     : 00000000`07e85ad8 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x783e294
00000000`0341f068 00000000`07e85ad8     : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`0341f070 00000000`0000002c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0x7e85ad8
00000000`0341f078 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0783cb20 : 0x2c


SYMBOL_NAME:  nt!PspCatchCriticalBreak+115

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1198

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  115

FAILURE_BUCKET_ID:  0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_c9455080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dadbeb56-a635-5ee0-131b-a3c4bc8b6bd6}

Followup:     MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8016412a07b, The address that the exception occurred at
Arg3: ffffb601812e6488, Exception Record Address
Arg4: ffffb601812e5cd0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 6656

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 76390

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8016412a07b

BUGCHECK_P3: ffffb601812e6488

BUGCHECK_P4: ffffb601812e5cd0

EXCEPTION_RECORD:  ffffb601812e6488 -- (.exr 0xffffb601812e6488)
ExceptionAddress: fffff8016412a07b (dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x000000000000006b)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffb601812e5cd0 -- (.cxr 0xffffb601812e5cd0)
rax=0000000000002000 rbx=ffff82857ba3bec8 rcx=8ffe6c368e320000
rdx=ffdf82857d068c18 rsi=ffff82857ba3bdb0 rdi=ffdf82857d068c48
rip=fffff8016412a07b rsp=ffffb601812e66c0 rbp=ffffbe831d9c4000
 r8=0000000000000001  r9=0000000000000000 r10=0000000000000000
r11=ffffbe8313148ba0 r12=ffff82857e083f38 r13=ffff828598558870
r14=ffff82857ba3bec8 r15=ffff82857d068c48
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x6b:
fffff801`6412a07b 488b3f          mov     rdi,qword ptr [rdi] ds:002b:ffdf8285`7d068c48=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8015bf713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8015be283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8015be283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffb601`812e66c0 fffff801`6412a313     : ffffbe83`1859d410 ffffbe83`1859d390 ffff8285`7e083f38 00000000`00000008 : dxgmms1!VIDMM_GLOBAL::EvictAllocation+0x6b
ffffb601`812e6700 fffff801`64120cde     : 00000000`00000002 00000000`c01e0101 00000000`00000000 ffff8285`8208ede0 : dxgmms1!VIDMM_SEGMENT::UnusedPass+0x14b
ffffb601`812e6760 fffff801`6411efeb     : 00000000`00000000 ffff8285`8a625610 00000000`00000000 ffffbe83`245fb320 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x50e
ffffb601`812e68a0 fffff801`641347d5     : ffffbe83`271369a0 ffffbe83`00000000 ffffbe83`189a1500 ffffbe83`00000c40 : dxgmms1!VidSchiSubmitRenderCommand+0x1fb
ffffb601`812e6b80 fffff801`64134713     : ffffbe83`1be31000 00000000`00000080 fffff801`64134660 ffffbe83`1be31000 : dxgmms1!VidSchiRun_PriorityTable+0xb5
ffffb601`812e6bd0 fffff801`5bb33585     : ffffbe83`1bf9b0c0 fffff801`64134660 ffffbe83`1be31000 00000405`b59bbfff : dxgmms1!VidSchiWorkerThread+0xb3
ffffb601`812e6c10 fffff801`5bbcb128     : fffff801`5995e180 ffffbe83`1bf9b0c0 fffff801`5bb33530 41d3af0f`4101568d : nt!PspSystemThreadStartup+0x55
ffffb601`812e6c60 00000000`00000000     : ffffb601`812e7000 ffffb601`812e1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::EvictAllocation+6b

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .cxr 0xffffb601812e5cd0 ; kb

BUCKET_ID_FUNC_OFFSET:  6b

FAILURE_BUCKET_ID:  AV_dxgmms1!VIDMM_GLOBAL::EvictAllocation

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {992228a6-30aa-b12b-b436-05de95e4ea8d}

Followup:     MachineOwner
---------


KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffb28a647460c0, The address of the thread.
Arg2: ffffa28088bc8748, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11640

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  192

BUGCHECK_P1: ffffb28a647460c0

BUGCHECK_P2: ffffa28088bc8748

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff8006`d10ae1b8 fffff804`7843f077     : 00000000`00000192 ffffb28a`647460c0 ffffa280`88bc8748 00000000`00000000 : nt!KeBugCheckEx
ffff8006`d10ae1c0 fffff804`7843e3c6     : ffffa280`88bc8700 ffff9080`00000000 00000000`00000010 ffffb28a`5ab6b5a0 : nt!ExAcquirePushLockSharedEx+0x147
ffff8006`d10ae200 fffff804`79737ccc     : ffffb28a`666143c0 ffff8006`d10ae400 ffffb28a`5ab6b5a0 00000000`00000010 : nt!FsRtlLookupPerStreamContextInternal+0x46
ffff8006`d10ae230 fffff804`79737b39     : ffffb28a`5ab6b5a0 ffffb28a`5a227320 00000000`00000010 ffffb28a`5a9dd8a0 : FLTMGR!FltpGetStreamListCtrl+0x6c
ffff8006`d10ae2a0 fffff804`73f9604c     : 00000000`00000000 ffffb28a`727b90f8 ffff8006`d10ae370 00000000`00000010 : FLTMGR!FltGetStreamHandleContext+0x29
ffff8006`d10ae2e0 fffff804`73f961b3     : ffffb28a`727b90f8 00000000`00000000 ffff8006`d10ae419 ffffb28a`727b9010 : bindflt!BfCheckAndSwitchTarget+0x44
ffff8006`d10ae340 fffff804`79734a8c     : ffffb28a`727b9010 ffffb28a`727b9198 ffff8006`d10ae419 ffffb28a`727b9010 : bindflt!BfPreReadWrite+0x43
ffff8006`d10ae370 fffff804`797345d0     : ffff8006`d10ae550 00000000`00000000 ffffb28a`727b4904 00000000`00060a00 : FLTMGR!FltpPerformPreCallbacks+0x2fc
ffff8006`d10ae480 fffff804`79734142     : 00000000`00000000 ffff8006`d10ae550 ffffb28a`727b49a0 ffff8006`d10ae560 : FLTMGR!FltpPassThroughInternal+0x90
ffff8006`d10ae4b0 fffff804`79733f2e     : ffffb28a`647460c0 fffff804`7843fa5d 00000000`00000000 ffffb28a`66614440 : FLTMGR!FltpPassThrough+0x162
ffff8006`d10ae530 fffff804`78437159     : ffffb28a`727b49a0 00000000`00000001 00000000`00000001 ffffb28a`666143c0 : FLTMGR!FltpDispatch+0x9e
ffff8006`d10ae590 fffff804`789f2a95     : 00000000`00000001 ffffb28a`666143c0 ffffb28a`727b4e18 ffffb28a`666143c0 : nt!IofCallDriver+0x59
ffff8006`d10ae5d0 fffff804`78a297d6     : ffffb28a`00000000 ffffb28a`5a9668d0 ffffb28a`666143c0 ffff8006`d10ae860 : nt!IopSynchronousServiceTail+0x1a5
ffff8006`d10ae670 fffff804`785d5358     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x676
ffff8006`d10ae770 fffff804`785c7940     : fffff804`78aba096 00000000`00000000 ffff8006`d10aea21 ffffb28a`647460c0 : nt!KiSystemServiceCopyEnd+0x28
ffff8006`d10ae978 fffff804`78aba096     : 00000000`00000000 ffff8006`d10aea21 ffffb28a`647460c0 fffff804`78440025 : nt!KiServiceLinkage
ffff8006`d10ae980 fffff804`78a2fd5a     : ffffb28a`6468aa00 00000000`00000000 00000000`c0000001 00000000`c0000001 : nt!EtwpFlushBufferToLogfile+0xa6
ffff8006`d10ae9f0 fffff804`789c525a     : 00000000`00000000 00000000`00000000 ffffb28a`6468aa00 ffffb28a`64df0000 : nt!EtwpFlushBuffer+0x9a
ffff8006`d10aea20 fffff804`78ab7869     : ffffb28a`6468aa00 ffffb28a`6468aa00 00000000`00000000 ffffffff`fffffffd : nt!EtwpFlushActiveBuffers+0x242
ffff8006`d10aeb90 fffff804`78533585     : ffffffff`fffffffd ffffb28a`647460c0 00000000`00000080 fffff804`78ab76b0 : nt!EtwpLogger+0x1b9
ffff8006`d10aec10 fffff804`785cb128     : ffff9080`c5781180 ffffb28a`647460c0 fffff804`78533530 00000000`00000007 : nt!PspSystemThreadStartup+0x55
ffff8006`d10aec60 00000000`00000000     : ffff8006`d10af000 ffff8006`d10a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8047843e9fe - nt!ExReleaseCacheAwarePushLockSharedEx+6e
    [ fe:de ]
1 error : !nt (fffff8047843e9fe)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffc508104dc080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9437

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 53528

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffc508104dc080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  system32.exe

CRITICAL_PROCESS:  system32.exe

ERROR_CODE: (NTSTATUS) 0x1b3e50c0 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
fffffd8f`9bb3a938 fffff807`66ac9a59     : 00000000`000000ef ffffc508`104dc080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffd8f`9bb3a940 fffff807`669a380f     : ffffc508`104dc080 fffff807`66208599 ffffc508`104dc080 fffff807`662086b4 : nt!PspCatchCriticalBreak+0x115
fffffd8f`9bb3a9e0 fffff807`667bd144     : ffffc508`00000000 00000000`00000000 ffffc508`104dc080 ffffc508`104dc080 : nt!PspTerminateAllThreads+0x1e4773
fffffd8f`9bb3aa50 fffff807`667bbe69     : ffffffff`ffffffff fffffd8f`9bb3ab80 ffffc508`104dc080 fffff807`6686ad01 : nt!PspTerminateProcess+0xe0
fffffd8f`9bb3aa90 fffff807`663d4558     : ffffc508`00000b20 ffffc508`1b3e50c0 ffffc508`104dc080 00000000`77c729d4 : nt!NtTerminateProcess+0xa9
fffffd8f`9bb3ab00 00000000`77bc1cbc     : 00000000`77bc1c7b 00000000`77c46409 00000000`00000023 00000000`00000206 : nt!KiSystemServiceCopyEnd+0x28
00000000`0340f068 00000000`77bc1c7b     : 00000000`77c46409 00000000`00000023 00000000`00000206 00000000`0708e6d4 : 0x77bc1cbc
00000000`0340f070 00000000`77c46409     : 00000000`00000023 00000000`00000206 00000000`0708e6d4 00000000`0000002b : 0x77bc1c7b
00000000`0340f078 00000000`00000023     : 00000000`00000206 00000000`0708e6d4 00000000`0000002b 00000000`032bdbf8 : 0x77c46409
00000000`0340f080 00000000`00000206     : 00000000`0708e6d4 00000000`0000002b 00000000`032bdbf8 00000000`0000002c : 0x23
00000000`0340f088 00000000`0708e6d4     : 00000000`0000002b 00000000`032bdbf8 00000000`0000002c 00000000`00000000 : 0x206
00000000`0340f090 00000000`0000002b     : 00000000`032bdbf8 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x708e6d4
00000000`0340f098 00000000`032bdbf8     : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`0340f0a0 00000000`0000002c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0x32bdbf8
00000000`0340f0a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0708cf60 : 0x2c


SYMBOL_NAME:  nt!PspCatchCriticalBreak+115

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  115

FAILURE_BUCKET_ID:  0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_1b3e50c0_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1cb67859-e205-484b-ac0b-36ae7908dab8}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80131a5cab9, Address of the instruction which caused the bugcheck
Arg3: ffffeb02e24f8e80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10061

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11998

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80131a5cab9

BUGCHECK_P3: ffffeb02e24f8e80

BUGCHECK_P4: 0

CONTEXT:  ffffeb02e24f8e80 -- (.cxr 0xffffeb02e24f8e80)
rax=000000be2517f9a0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000001 rdi=ffff9989b2eb9ed0
rip=fffff80131a5cab9 rsp=ffffeb02e24f9870 rbp=ffffeb02e24f9b80
 r8=0000000000000000  r9=0000000000000000 r10=fffff80131a335b0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000008
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KeSetEvent+0x9:
fffff801`31a5cab9 f6017f          test    byte ptr [rcx],7Fh ds:002b:00000000`00000000=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  audiodg.exe

STACK_TEXT: 
ffffeb02`e24f9870 fffff801`31fd145c     : 00000000`00000000 fffff801`2f93a350 ffff9989`b2eb9ed0 00000000`00000000 : nt!KeSetEvent+0x9
ffffeb02`e24f9900 fffff801`31fd0c36     : ffff9989`b28dffe0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x80c
ffffeb02`e24f9a20 fffff801`31bd4558     : 00000000`00000000 ffffeb02`e24f9b80 ffff9989`b1af02e0 fffff801`320a9bfd : nt!NtDeviceIoControlFile+0x56
ffffeb02`e24f9a90 00007ffa`f899c1a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000be`2517f948 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`f899c1a4


SYMBOL_NAME:  nt!KeSetEvent+9

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .cxr 0xffffeb02e24f8e80 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KeSetEvent

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e21bfbf7-638e-bdcd-11e1-157958eb9932}

Followup:     MachineOwner
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…