Tayfun48300
Decapat
- Katılım
- 25 Mayıs 2019
- Mesajlar
- 2
Google Drive: Sign-in
Access Google Drive with a Google account (for personal use) or Google Workspace account (for business use).
drive.google.com
drive.google.com
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80175bf1185, Address of the instruction which caused the bugcheck
Arg3: fffffc8ce7d93000, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80175bf1185
BUGCHECK_P3: fffffc8ce7d93000
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ObpReferenceObjectByHandleWithTag+195
fffff801`75bf1185 324318 xor al,byte ptr [rbx+18h]
CONTEXT: fffffc8ce7d93000 -- (.cxr 0xfffffc8ce7d93000)
rax=0000000100000316 rbx=0000010000031630 rcx=00000000001f0003
rdx=0000000000000000 rsi=00000000001f0003 rdi=ffffb00f981ff200
rip=fffff80175bf1185 rsp=fffffc8ce7d939f0 rbp=0000000000000480
r8=ffffb00f96590001 r9=fffff80175600000 r10=0000fffff80175bf
r11=fffffc8ce7d93af8 r12=fffffc8ce7d93ac8 r13=0000000000000000
r14=0100000316308a41 r15=ffff88829c534080
iopl=0 nv up ei pl nz ac pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050212
nt!ObpReferenceObjectByHandleWithTag+0x195:
fffff801`75bf1185 324318 xor al,byte ptr [rbx+18h] ds:002b:00000100`00031648=??
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: f98
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: FortniteClient-Win64-Shipping.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-04-2020 23:45:45.0609
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80175bf3bf6 to fffff80175bf1185
STACK_TEXT:
fffffc8c`e7d939f0 fffff801`75bf3bf6 : ffff8882`94dc9080 00000000`00100000 00000000`00000000 000001e7`1bb28001 : nt!ObpReferenceObjectByHandleWithTag+0x195
fffffc8c`e7d93a80 fffff801`757d2d18 : ffff8882`9c534080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0xa6
fffffc8c`e7d93b00 00007fff`40fbc144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000045`d537fcb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`40fbc144
THREAD_SHA1_HASH_MOD_FUNC: 57f76a949c8f3dcac1044a144592a6aaa0893c10
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 94fa4860268e64ea097ddbd2385cfaa8e09ec1ee
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!ObpReferenceObjectByHandleWithTag+195
fffff801`75bf1185 324318 xor al,byte ptr [rbx+18h]
FAULT_INSTR_CODE: 32184332
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+195
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xfffffc8ce7d93000 ; kb
BUCKET_ID_FUNC_OFFSET: 195
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag
BUCKET_ID: 0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag
TARGET_TIME: 2020-01-01T10:06:33.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3751
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!obpreferenceobjectbyhandlewithtag
FAILURE_ID_HASH: {3d4819ec-af64-be43-ac98-a6e960db3861}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8057a7f15d0, Address of the instruction which caused the bugcheck
Arg3: fffffd05d8404fb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8057a7f15d0
BUGCHECK_P3: fffffd05d8404fb0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExpLookupHandleTableEntry+0
fffff805`7a7f15d0 8b01 mov eax,dword ptr [rcx]
CONTEXT: fffffd05d8404fb0 -- (.cxr 0xfffffd05d8404fb0)
rax=00000000944d1c01 rbx=ffff840381ec3400 rcx=fdb2fde4fd9ffdd0
rdx=0000000000000954 rsi=000000000006d7eb rdi=ffff84038ed650c0
rip=fffff8057a7f15d0 rsp=fffffd05d84059a8 rbp=0000000000000954
r8=ffff840381ec3400 r9=fdb2fde4fd9ffdd0 r10=0000000000000954
r11=ffffbafb95400000 r12=fffffd05d8405b10 r13=0000000000000000
r14=0000000000000001 r15=ffff8403955655c0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!ExpLookupHandleTableEntry:
fffff805`7a7f15d0 8b01 mov eax,dword ptr [rcx] ds:002b:fdb2fde4`fd9ffdd0=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: f99
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: nvcontainer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-04-2020 23:45:41.0282
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8057a7f10df to fffff8057a7f15d0
STACK_TEXT:
fffffd05`d84059a8 fffff805`7a7f10df : ffff8403`8e9a2b00 00000000`00000000 00000000`00000000 fffff805`7a7f10f1 : nt!ExpLookupHandleTableEntry
fffffd05`d84059b0 fffff805`7a7f0fde : ffff8403`8ed650c0 00000290`00000000 ffff8403`81ec3400 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0xef
fffffd05`d8405a40 fffff805`7a7fa4ae : 00000000`00000001 ffff8403`8e9a2b00 00000000`00000000 fffffd05`d8405a00 : nt!ObReferenceObjectByHandle+0x2e
fffffd05`d8405a90 fffff805`7a3d2d18 : ffff8403`955655c0 00000000`00000000 00000000`00000000 00000000`0006d7eb : nt!NtReleaseMutant+0x5e
fffffd05`d8405b00 00007fff`b273c4c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000aa`df1ffa08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b273c4c4
THREAD_SHA1_HASH_MOD_FUNC: 56dbd26506810d4d49b13f7630a2f712bc68ff80
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2278cd7582646f4e2422a6021f1a392e18dc75bf
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!ExpLookupHandleTableEntry+0
fffff805`7a7f15d0 8b01 mov eax,dword ptr [rcx]
FAULT_INSTR_CODE: 8348018b
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExpLookupHandleTableEntry+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xfffffd05d8404fb0 ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExpLookupHandleTableEntry
BUCKET_ID: 0x3B_c0000005_nt!ExpLookupHandleTableEntry
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!ExpLookupHandleTableEntry
TARGET_TIME: 2020-01-04T12:06:51.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 663e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!explookuphandletableentry
FAILURE_ID_HASH: {9aaa38f2-e070-5a45-fdb6-fcf0ed5410df}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80431cf15a1, Address of the instruction which caused the bugcheck
Arg3: ffffe68b4b47cd80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80431cf15a1
BUGCHECK_P3: ffffe68b4b47cd80
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+ce41
fffff804`31cf15a1 4c8b6038 mov r12,qword ptr [rax+38h]
CONTEXT: ffffe68b4b47cd80 -- (.cxr 0xffffe68b4b47cd80)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=00000000000004cc rsi=ffff860f9f3d73e0 rdi=ffff860f9e244300
rip=fffff80431cf15a1 rsp=ffffe68b4b47d770 rbp=ffffe68b4b47d819
r8=ffff860f9e244ac0 r9=00000000000004ce r10=ffff860f9d5c8fd0
r11=0000000000000001 r12=0000000010000004 r13=0000000000000000
r14=0000000000000000 r15=ffff860f9f3d7400
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
FLTMGR!FltpPerformPreCallbacks+0xce41:
fffff804`31cf15a1 4c8b6038 mov r12,qword ptr [rax+38h] ds:002b:00000000`00000038=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: f99
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: nvcontainer.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-04-2020 23:45:49.0920
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80431ce2f5c to fffff80431cf15a1
STACK_TEXT:
ffffe68b`4b47d770 fffff804`31ce2f5c : ffffe68b`4b47d910 ffffe68b`4b47d910 00000000`00000004 fffff804`31ce6400 : FLTMGR!FltpPerformPreCallbacks+0xce41
ffffe68b`4b47d880 fffff804`31d1c5d5 : 00000000`00000001 ffffe68b`4b47d9e8 ffffe68b`4b47da20 ffff860f`9cd6e2c0 : FLTMGR!FltpPassThroughFastIo+0x8c
ffffe68b`4b47d8e0 fffff804`30a46348 : ffff860f`9cd6e2c0 00000000`00000000 00000000`00000000 ffffe68b`00000000 : FLTMGR!FltpFastIoWrite+0x165
ffffe68b`4b47d990 fffff804`305d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x458
ffffe68b`4b47da90 00007ffc`2521c1c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007c`0bdff4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2521c1c4
THREAD_SHA1_HASH_MOD_FUNC: ae1b6ce5747fd15ee3dc4f35107e7ec8ddfe0727
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: dbfc3ba60c25ade444d37f2acd253d368d2c6a10
THREAD_SHA1_HASH_MOD: c48bb7014c6bc00e7c264dcececf9775442fdb99
FOLLOWUP_IP:
FLTMGR!FltpPerformPreCallbacks+ce41
fffff804`31cf15a1 4c8b6038 mov r12,qword ptr [rax+38h]
FAULT_INSTR_CODE: 38608b4c
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: FLTMGR!FltpPerformPreCallbacks+ce41
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.267
STACK_COMMAND: .cxr 0xffffe68b4b47cd80 ; kb
BUCKET_ID_FUNC_OFFSET: ce41
FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks
BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks
TARGET_TIME: 2019-12-29T13:27:42.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 10102
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_fltmgr!fltpperformprecallbacks
FAILURE_ID_HASH: {8a3fd757-8fa5-e557-36d7-0eb34e85f336}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffba8fc42d3010, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffba8fc42d3010, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffba8fc42d3010
BUGCHECK_P2: 11
BUGCHECK_P3: ffffba8fc42d3010
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff802127733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffba8fc42d3010
FAULTING_IP:
+0
ffffba8f`c42d3010 0000 add byte ptr [rax],al
MM_INTERNAL_CODE: 2
CPU_COUNT: c
CPU_MHZ: f98
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: RuntimeBroker.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-04-2020 23:45:54.0866
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffb907aad54f00 -- (.trap 0xffffb907aad54f00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffba8fcb5bc1dc rbx=0000000000000000 rcx=ffffba8fcb5bc1dc
rdx=ffffc8f404e03d54 rsi=0000000000000000 rdi=0000000000000000
rip=ffffba8fc42d3010 rsp=ffffb907aad55090 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffff802122317a0
r11=ffffba8fcb5bc1dc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ffffba8f`c42d3010 0000 add byte ptr [rax],al ds:ffffba8f`cb5bc1dc=5c
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802123e35d6 to fffff802123c14e0
STACK_TEXT:
ffffb907`aad54c58 fffff802`123e35d6 : 00000000`00000050 ffffba8f`c42d3010 00000000`00000011 ffffb907`aad54f00 : nt!KeBugCheckEx
ffffb907`aad54c60 fffff802`12272eef : ffffba8f`00000000 00000000`00000011 00000000`00000000 ffffba8f`c42d3010 : nt!MiSystemFault+0x1d6866
ffffb907`aad54d60 fffff802`123cf520 : 00000000`00000000 ffffba8f`c6023c50 ffffba8f`bde10130 00000000`00000000 : nt!MmAccessFault+0x34f
ffffb907`aad54f00 ffffba8f`c42d3010 : 00000000`00000000 ffffba8f`bde10130 ffffba8f`c4bf8010 ffffba8f`c922c001 : nt!KiPageFault+0x360
ffffb907`aad55090 00000000`00000000 : ffffba8f`bde10130 ffffba8f`c4bf8010 ffffba8f`c922c001 ffffba8f`cb5bc1c0 : 0xffffba8f`c42d3010
THREAD_SHA1_HASH_MOD_FUNC: 35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: c0efb11bdbdabbfe638cd9930c42dad821618e02
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff802`123e35d6 cc int 3
FAULT_INSTR_CODE: 4d8d48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiSystemFault+1d6866
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 1d6866
FAILURE_BUCKET_ID: AV_INVALID_nt!MiSystemFault
BUCKET_ID: AV_INVALID_nt!MiSystemFault
PRIMARY_PROBLEM_CLASS: AV_INVALID_nt!MiSystemFault
TARGET_TIME: 2019-12-22T15:44:42.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 9213
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_nt!misystemfault
FAILURE_ID_HASH: {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000100, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031643c7c0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 100
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8031643c7c0
READ_ADDRESS: fffff803169733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000100
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSwapThread+c00
fffff803`1643c7c0 498b9ec8000000 mov rbx,qword ptr [r14+0C8h]
CPU_COUNT: c
CPU_MHZ: f98
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: RGBFusion.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 01-04-2020 23:45:58.0755
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffffa8ffe091780 -- (.trap 0xfffffa8ffe091780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000265000 rbx=0000000000000000 rcx=fffffa8ffe0918d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031643c7c0 rsp=fffffa8ffe091910 rbp=0000000000000000
r8=0000000000001fe0 r9=0000000000000000 r10=0000000000000000
r11=fffff80316400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwapThread+0xc00:
fffff803`1643c7c0 498b9ec8000000 mov rbx,qword ptr [r14+0C8h] ds:00000000`000000c8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803165d32e9 to fffff803165c14e0
STACK_TEXT:
fffffa8f`fe091638 fffff803`165d32e9 : 00000000`0000000a 00000000`00000100 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa8f`fe091640 fffff803`165cf62b : ffff8489`068c7080 fffff803`165c89f4 fffff803`14705180 00000000`0000003f : nt!KiBugCheckDispatch+0x69
fffffa8f`fe091780 fffff803`1643c7c0 : fffff803`14705180 00000000`ffffff00 fffff803`ffffffff 00000000`00000040 : nt!KiPageFault+0x46b
fffffa8f`fe091910 fffff803`1643b644 : ffff8489`068c7080 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xc00
fffffa8f`fe0919b0 fffff803`16436400 : ffff8489`00000095 ffff8489`00000000 fffffa8f`00000001 00000000`00000002 : nt!KiCommitThreadWait+0x144
fffffa8f`fe091a50 fffff803`169eb1bf : ffff8489`068c7080 00000000`1cbafda0 fffffa8f`fe091b10 00000000`00000002 : nt!KeDelayExecutionThread+0x4c0
fffffa8f`fe091ad0 fffff803`165d2d18 : 00000000`00000000 fffffa8f`00000001 ffffffff`ffffd8f0 fffffa8f`fe091b80 : nt!NtDelayExecution+0x5f
fffffa8f`fe091b00 00000000`77e21cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1cbaf008 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77e21cbc
THREAD_SHA1_HASH_MOD_FUNC: 84f0d86cd8f01d64a6c3c0ffcf84247ac62c4a1d
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: de4105351e81cc5cc3f7ca26ca2490472792a796
THREAD_SHA1_HASH_MOD: cb5f414824c2521bcc505eaa03e92fa10922dad8
FOLLOWUP_IP:
nt!KiSwapThread+c00
fffff803`1643c7c0 498b9ec8000000 mov rbx,qword ptr [r14+0C8h]
FAULT_INSTR_CODE: c89e8b49
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSwapThread+c00
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4efcf7a9
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c00
FAILURE_BUCKET_ID: AV_nt!KiSwapThread
BUCKET_ID: AV_nt!KiSwapThread
PRIMARY_PROBLEM_CLASS: AV_nt!KiSwapThread
TARGET_TIME: 2019-12-08T19:05:47.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 23d1
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kiswapthread
FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.