Sürekli mavi ekran ve crash Win 10 - Fortnite

MSI ve Steelseries araçlarını kaldır.
Memtest86 ve HDtune(Error scan, Health) sonuçlarını fotoğraf olarak paylaş.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80175bf1185, Address of the instruction which caused the bugcheck
Arg3: fffffc8ce7d93000, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80175bf1185

BUGCHECK_P3: fffffc8ce7d93000

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpReferenceObjectByHandleWithTag+195
fffff801`75bf1185 324318          xor     al,byte ptr [rbx+18h]

CONTEXT:  fffffc8ce7d93000 -- (.cxr 0xfffffc8ce7d93000)
rax=0000000100000316 rbx=0000010000031630 rcx=00000000001f0003
rdx=0000000000000000 rsi=00000000001f0003 rdi=ffffb00f981ff200
rip=fffff80175bf1185 rsp=fffffc8ce7d939f0 rbp=0000000000000480
 r8=ffffb00f96590001  r9=fffff80175600000 r10=0000fffff80175bf
r11=fffffc8ce7d93af8 r12=fffffc8ce7d93ac8 r13=0000000000000000
r14=0100000316308a41 r15=ffff88829c534080
iopl=0         nv up ei pl nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050212
nt!ObpReferenceObjectByHandleWithTag+0x195:
fffff801`75bf1185 324318          xor     al,byte ptr [rbx+18h] ds:002b:00000100`00031648=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: f98

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  FortniteClient-Win64-Shipping.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:45.0609

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80175bf3bf6 to fffff80175bf1185

STACK_TEXT: 
fffffc8c`e7d939f0 fffff801`75bf3bf6 : ffff8882`94dc9080 00000000`00100000 00000000`00000000 000001e7`1bb28001 : nt!ObpReferenceObjectByHandleWithTag+0x195
fffffc8c`e7d93a80 fffff801`757d2d18 : ffff8882`9c534080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0xa6
fffffc8c`e7d93b00 00007fff`40fbc144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000045`d537fcb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`40fbc144


THREAD_SHA1_HASH_MOD_FUNC:  57f76a949c8f3dcac1044a144592a6aaa0893c10

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  94fa4860268e64ea097ddbd2385cfaa8e09ec1ee

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!ObpReferenceObjectByHandleWithTag+195
fffff801`75bf1185 324318          xor     al,byte ptr [rbx+18h]

FAULT_INSTR_CODE:  32184332

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpReferenceObjectByHandleWithTag+195

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .cxr 0xfffffc8ce7d93000 ; kb

BUCKET_ID_FUNC_OFFSET:  195

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

BUCKET_ID:  0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

TARGET_TIME:  2020-01-01T10:06:33.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3751

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obpreferenceobjectbyhandlewithtag

FAILURE_ID_HASH:  {3d4819ec-af64-be43-ac98-a6e960db3861}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8057a7f15d0, Address of the instruction which caused the bugcheck
Arg3: fffffd05d8404fb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8057a7f15d0

BUGCHECK_P3: fffffd05d8404fb0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ExpLookupHandleTableEntry+0
fffff805`7a7f15d0 8b01            mov     eax,dword ptr [rcx]

CONTEXT:  fffffd05d8404fb0 -- (.cxr 0xfffffd05d8404fb0)
rax=00000000944d1c01 rbx=ffff840381ec3400 rcx=fdb2fde4fd9ffdd0
rdx=0000000000000954 rsi=000000000006d7eb rdi=ffff84038ed650c0
rip=fffff8057a7f15d0 rsp=fffffd05d84059a8 rbp=0000000000000954
 r8=ffff840381ec3400  r9=fdb2fde4fd9ffdd0 r10=0000000000000954
r11=ffffbafb95400000 r12=fffffd05d8405b10 r13=0000000000000000
r14=0000000000000001 r15=ffff8403955655c0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!ExpLookupHandleTableEntry:
fffff805`7a7f15d0 8b01            mov     eax,dword ptr [rcx] ds:002b:fdb2fde4`fd9ffdd0=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: f99

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  nvcontainer.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:41.0282

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8057a7f10df to fffff8057a7f15d0

STACK_TEXT: 
fffffd05`d84059a8 fffff805`7a7f10df : ffff8403`8e9a2b00 00000000`00000000 00000000`00000000 fffff805`7a7f10f1 : nt!ExpLookupHandleTableEntry
fffffd05`d84059b0 fffff805`7a7f0fde : ffff8403`8ed650c0 00000290`00000000 ffff8403`81ec3400 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0xef
fffffd05`d8405a40 fffff805`7a7fa4ae : 00000000`00000001 ffff8403`8e9a2b00 00000000`00000000 fffffd05`d8405a00 : nt!ObReferenceObjectByHandle+0x2e
fffffd05`d8405a90 fffff805`7a3d2d18 : ffff8403`955655c0 00000000`00000000 00000000`00000000 00000000`0006d7eb : nt!NtReleaseMutant+0x5e
fffffd05`d8405b00 00007fff`b273c4c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000aa`df1ffa08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b273c4c4


THREAD_SHA1_HASH_MOD_FUNC:  56dbd26506810d4d49b13f7630a2f712bc68ff80

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2278cd7582646f4e2422a6021f1a392e18dc75bf

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!ExpLookupHandleTableEntry+0
fffff805`7a7f15d0 8b01            mov     eax,dword ptr [rcx]

FAULT_INSTR_CODE:  8348018b

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpLookupHandleTableEntry+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .cxr 0xfffffd05d8404fb0 ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExpLookupHandleTableEntry

BUCKET_ID:  0x3B_c0000005_nt!ExpLookupHandleTableEntry

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ExpLookupHandleTableEntry

TARGET_TIME:  2020-01-04T12:06:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  663e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!explookuphandletableentry

FAILURE_ID_HASH:  {9aaa38f2-e070-5a45-fdb6-fcf0ed5410df}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80431cf15a1, Address of the instruction which caused the bugcheck
Arg3: ffffe68b4b47cd80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80431cf15a1

BUGCHECK_P3: ffffe68b4b47cd80

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+ce41
fffff804`31cf15a1 4c8b6038        mov     r12,qword ptr [rax+38h]

CONTEXT:  ffffe68b4b47cd80 -- (.cxr 0xffffe68b4b47cd80)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=00000000000004cc rsi=ffff860f9f3d73e0 rdi=ffff860f9e244300
rip=fffff80431cf15a1 rsp=ffffe68b4b47d770 rbp=ffffe68b4b47d819
 r8=ffff860f9e244ac0  r9=00000000000004ce r10=ffff860f9d5c8fd0
r11=0000000000000001 r12=0000000010000004 r13=0000000000000000
r14=0000000000000000 r15=ffff860f9f3d7400
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
FLTMGR!FltpPerformPreCallbacks+0xce41:
fffff804`31cf15a1 4c8b6038        mov     r12,qword ptr [rax+38h] ds:002b:00000000`00000038=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: f99

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  nvcontainer.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:49.0920

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80431ce2f5c to fffff80431cf15a1

STACK_TEXT: 
ffffe68b`4b47d770 fffff804`31ce2f5c : ffffe68b`4b47d910 ffffe68b`4b47d910 00000000`00000004 fffff804`31ce6400 : FLTMGR!FltpPerformPreCallbacks+0xce41
ffffe68b`4b47d880 fffff804`31d1c5d5 : 00000000`00000001 ffffe68b`4b47d9e8 ffffe68b`4b47da20 ffff860f`9cd6e2c0 : FLTMGR!FltpPassThroughFastIo+0x8c
ffffe68b`4b47d8e0 fffff804`30a46348 : ffff860f`9cd6e2c0 00000000`00000000 00000000`00000000 ffffe68b`00000000 : FLTMGR!FltpFastIoWrite+0x165
ffffe68b`4b47d990 fffff804`305d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x458
ffffe68b`4b47da90 00007ffc`2521c1c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007c`0bdff4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2521c1c4


THREAD_SHA1_HASH_MOD_FUNC:  ae1b6ce5747fd15ee3dc4f35107e7ec8ddfe0727

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  dbfc3ba60c25ade444d37f2acd253d368d2c6a10

THREAD_SHA1_HASH_MOD:  c48bb7014c6bc00e7c264dcececf9775442fdb99

FOLLOWUP_IP:
FLTMGR!FltpPerformPreCallbacks+ce41
fffff804`31cf15a1 4c8b6038        mov     r12,qword ptr [rax+38h]

FAULT_INSTR_CODE:  38608b4c

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  FLTMGR!FltpPerformPreCallbacks+ce41

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.267

STACK_COMMAND:  .cxr 0xffffe68b4b47cd80 ; kb

BUCKET_ID_FUNC_OFFSET:  ce41

FAILURE_BUCKET_ID:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks

BUCKET_ID:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks

TARGET_TIME:  2019-12-29T13:27:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  10102

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_fltmgr!fltpperformprecallbacks

FAILURE_ID_HASH:  {8a3fd757-8fa5-e557-36d7-0eb34e85f336}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffba8fc42d3010, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffba8fc42d3010, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffba8fc42d3010

BUGCHECK_P2: 11

BUGCHECK_P3: ffffba8fc42d3010

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff802127733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffba8fc42d3010

FAULTING_IP:
+0
ffffba8f`c42d3010 0000            add     byte ptr [rax],al

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: f98

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  RuntimeBroker.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:54.0866

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffb907aad54f00 -- (.trap 0xffffb907aad54f00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffba8fcb5bc1dc rbx=0000000000000000 rcx=ffffba8fcb5bc1dc
rdx=ffffc8f404e03d54 rsi=0000000000000000 rdi=0000000000000000
rip=ffffba8fc42d3010 rsp=ffffb907aad55090 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffff802122317a0
r11=ffffba8fcb5bc1dc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffffba8f`c42d3010 0000            add     byte ptr [rax],al ds:ffffba8f`cb5bc1dc=5c
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802123e35d6 to fffff802123c14e0

STACK_TEXT: 
ffffb907`aad54c58 fffff802`123e35d6 : 00000000`00000050 ffffba8f`c42d3010 00000000`00000011 ffffb907`aad54f00 : nt!KeBugCheckEx
ffffb907`aad54c60 fffff802`12272eef : ffffba8f`00000000 00000000`00000011 00000000`00000000 ffffba8f`c42d3010 : nt!MiSystemFault+0x1d6866
ffffb907`aad54d60 fffff802`123cf520 : 00000000`00000000 ffffba8f`c6023c50 ffffba8f`bde10130 00000000`00000000 : nt!MmAccessFault+0x34f
ffffb907`aad54f00 ffffba8f`c42d3010 : 00000000`00000000 ffffba8f`bde10130 ffffba8f`c4bf8010 ffffba8f`c922c001 : nt!KiPageFault+0x360
ffffb907`aad55090 00000000`00000000 : ffffba8f`bde10130 ffffba8f`c4bf8010 ffffba8f`c922c001 ffffba8f`cb5bc1c0 : 0xffffba8f`c42d3010


THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c0efb11bdbdabbfe638cd9930c42dad821618e02

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff802`123e35d6 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+1d6866

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d6866

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_nt!MiSystemFault

TARGET_TIME:  2019-12-22T15:44:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  9213

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_nt!misystemfault

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000100, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031643c7c0, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 100

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8031643c7c0

READ_ADDRESS: fffff803169733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000100

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiSwapThread+c00
fffff803`1643c7c0 498b9ec8000000  mov     rbx,qword ptr [r14+0C8h]

CPU_COUNT: c

CPU_MHZ: f98

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  RGBFusion.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:58.0755

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffffa8ffe091780 -- (.trap 0xfffffa8ffe091780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000265000 rbx=0000000000000000 rcx=fffffa8ffe0918d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031643c7c0 rsp=fffffa8ffe091910 rbp=0000000000000000
 r8=0000000000001fe0  r9=0000000000000000 r10=0000000000000000
r11=fffff80316400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwapThread+0xc00:
fffff803`1643c7c0 498b9ec8000000  mov     rbx,qword ptr [r14+0C8h] ds:00000000`000000c8=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803165d32e9 to fffff803165c14e0

STACK_TEXT: 
fffffa8f`fe091638 fffff803`165d32e9 : 00000000`0000000a 00000000`00000100 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa8f`fe091640 fffff803`165cf62b : ffff8489`068c7080 fffff803`165c89f4 fffff803`14705180 00000000`0000003f : nt!KiBugCheckDispatch+0x69
fffffa8f`fe091780 fffff803`1643c7c0 : fffff803`14705180 00000000`ffffff00 fffff803`ffffffff 00000000`00000040 : nt!KiPageFault+0x46b
fffffa8f`fe091910 fffff803`1643b644 : ffff8489`068c7080 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xc00
fffffa8f`fe0919b0 fffff803`16436400 : ffff8489`00000095 ffff8489`00000000 fffffa8f`00000001 00000000`00000002 : nt!KiCommitThreadWait+0x144
fffffa8f`fe091a50 fffff803`169eb1bf : ffff8489`068c7080 00000000`1cbafda0 fffffa8f`fe091b10 00000000`00000002 : nt!KeDelayExecutionThread+0x4c0
fffffa8f`fe091ad0 fffff803`165d2d18 : 00000000`00000000 fffffa8f`00000001 ffffffff`ffffd8f0 fffffa8f`fe091b80 : nt!NtDelayExecution+0x5f
fffffa8f`fe091b00 00000000`77e21cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1cbaf008 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77e21cbc


THREAD_SHA1_HASH_MOD_FUNC:  84f0d86cd8f01d64a6c3c0ffcf84247ac62c4a1d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  de4105351e81cc5cc3f7ca26ca2490472792a796

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!KiSwapThread+c00
fffff803`1643c7c0 498b9ec8000000  mov     rbx,qword ptr [r14+0C8h]

FAULT_INSTR_CODE:  c89e8b49

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiSwapThread+c00

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c00

FAILURE_BUCKET_ID:  AV_nt!KiSwapThread

BUCKET_ID:  AV_nt!KiSwapThread

PRIMARY_PROBLEM_CLASS:  AV_nt!KiSwapThread

TARGET_TIME:  2019-12-08T19:05:47.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  23d1

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kiswapthread

FAILURE_ID_HASH:  {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}

Followup:     MachineOwner
---------
 

Bu konuyu görüntüleyen kullanıcılar

Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…