Sürekli mavi ekran ve crash Win 10 - Fortnite

MSI ve Steelseries araçlarını kaldır.
Memtest86 ve HDtune(Error scan, Health) sonuçlarını fotoğraf olarak paylaş.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80175bf1185, Address of the instruction which caused the bugcheck
Arg3: fffffc8ce7d93000, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80175bf1185

BUGCHECK_P3: fffffc8ce7d93000

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ObpReferenceObjectByHandleWithTag+195
fffff801`75bf1185 324318          xor     al,byte ptr [rbx+18h]

CONTEXT:  fffffc8ce7d93000 -- (.cxr 0xfffffc8ce7d93000)
rax=0000000100000316 rbx=0000010000031630 rcx=00000000001f0003
rdx=0000000000000000 rsi=00000000001f0003 rdi=ffffb00f981ff200
rip=fffff80175bf1185 rsp=fffffc8ce7d939f0 rbp=0000000000000480
 r8=ffffb00f96590001  r9=fffff80175600000 r10=0000fffff80175bf
r11=fffffc8ce7d93af8 r12=fffffc8ce7d93ac8 r13=0000000000000000
r14=0100000316308a41 r15=ffff88829c534080
iopl=0         nv up ei pl nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050212
nt!ObpReferenceObjectByHandleWithTag+0x195:
fffff801`75bf1185 324318          xor     al,byte ptr [rbx+18h] ds:002b:00000100`00031648=??
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: f98

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  FortniteClient-Win64-Shipping.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:45.0609

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80175bf3bf6 to fffff80175bf1185

STACK_TEXT: 
fffffc8c`e7d939f0 fffff801`75bf3bf6 : ffff8882`94dc9080 00000000`00100000 00000000`00000000 000001e7`1bb28001 : nt!ObpReferenceObjectByHandleWithTag+0x195
fffffc8c`e7d93a80 fffff801`757d2d18 : ffff8882`9c534080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0xa6
fffffc8c`e7d93b00 00007fff`40fbc144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000045`d537fcb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`40fbc144


THREAD_SHA1_HASH_MOD_FUNC:  57f76a949c8f3dcac1044a144592a6aaa0893c10

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  94fa4860268e64ea097ddbd2385cfaa8e09ec1ee

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!ObpReferenceObjectByHandleWithTag+195
fffff801`75bf1185 324318          xor     al,byte ptr [rbx+18h]

FAULT_INSTR_CODE:  32184332

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpReferenceObjectByHandleWithTag+195

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .cxr 0xfffffc8ce7d93000 ; kb

BUCKET_ID_FUNC_OFFSET:  195

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

BUCKET_ID:  0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

TARGET_TIME:  2020-01-01T10:06:33.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3751

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!obpreferenceobjectbyhandlewithtag

FAILURE_ID_HASH:  {3d4819ec-af64-be43-ac98-a6e960db3861}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8057a7f15d0, Address of the instruction which caused the bugcheck
Arg3: fffffd05d8404fb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8057a7f15d0

BUGCHECK_P3: fffffd05d8404fb0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!ExpLookupHandleTableEntry+0
fffff805`7a7f15d0 8b01            mov     eax,dword ptr [rcx]

CONTEXT:  fffffd05d8404fb0 -- (.cxr 0xfffffd05d8404fb0)
rax=00000000944d1c01 rbx=ffff840381ec3400 rcx=fdb2fde4fd9ffdd0
rdx=0000000000000954 rsi=000000000006d7eb rdi=ffff84038ed650c0
rip=fffff8057a7f15d0 rsp=fffffd05d84059a8 rbp=0000000000000954
 r8=ffff840381ec3400  r9=fdb2fde4fd9ffdd0 r10=0000000000000954
r11=ffffbafb95400000 r12=fffffd05d8405b10 r13=0000000000000000
r14=0000000000000001 r15=ffff8403955655c0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!ExpLookupHandleTableEntry:
fffff805`7a7f15d0 8b01            mov     eax,dword ptr [rcx] ds:002b:fdb2fde4`fd9ffdd0=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: f99

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  nvcontainer.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:41.0282

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8057a7f10df to fffff8057a7f15d0

STACK_TEXT: 
fffffd05`d84059a8 fffff805`7a7f10df : ffff8403`8e9a2b00 00000000`00000000 00000000`00000000 fffff805`7a7f10f1 : nt!ExpLookupHandleTableEntry
fffffd05`d84059b0 fffff805`7a7f0fde : ffff8403`8ed650c0 00000290`00000000 ffff8403`81ec3400 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0xef
fffffd05`d8405a40 fffff805`7a7fa4ae : 00000000`00000001 ffff8403`8e9a2b00 00000000`00000000 fffffd05`d8405a00 : nt!ObReferenceObjectByHandle+0x2e
fffffd05`d8405a90 fffff805`7a3d2d18 : ffff8403`955655c0 00000000`00000000 00000000`00000000 00000000`0006d7eb : nt!NtReleaseMutant+0x5e
fffffd05`d8405b00 00007fff`b273c4c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000aa`df1ffa08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b273c4c4


THREAD_SHA1_HASH_MOD_FUNC:  56dbd26506810d4d49b13f7630a2f712bc68ff80

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2278cd7582646f4e2422a6021f1a392e18dc75bf

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!ExpLookupHandleTableEntry+0
fffff805`7a7f15d0 8b01            mov     eax,dword ptr [rcx]

FAULT_INSTR_CODE:  8348018b

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ExpLookupHandleTableEntry+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .cxr 0xfffffd05d8404fb0 ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExpLookupHandleTableEntry

BUCKET_ID:  0x3B_c0000005_nt!ExpLookupHandleTableEntry

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!ExpLookupHandleTableEntry

TARGET_TIME:  2020-01-04T12:06:51.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  663e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!explookuphandletableentry

FAILURE_ID_HASH:  {9aaa38f2-e070-5a45-fdb6-fcf0ed5410df}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80431cf15a1, Address of the instruction which caused the bugcheck
Arg3: ffffe68b4b47cd80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80431cf15a1

BUGCHECK_P3: ffffe68b4b47cd80

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
FLTMGR!FltpPerformPreCallbacks+ce41
fffff804`31cf15a1 4c8b6038        mov     r12,qword ptr [rax+38h]

CONTEXT:  ffffe68b4b47cd80 -- (.cxr 0xffffe68b4b47cd80)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002
rdx=00000000000004cc rsi=ffff860f9f3d73e0 rdi=ffff860f9e244300
rip=fffff80431cf15a1 rsp=ffffe68b4b47d770 rbp=ffffe68b4b47d819
 r8=ffff860f9e244ac0  r9=00000000000004ce r10=ffff860f9d5c8fd0
r11=0000000000000001 r12=0000000010000004 r13=0000000000000000
r14=0000000000000000 r15=ffff860f9f3d7400
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
FLTMGR!FltpPerformPreCallbacks+0xce41:
fffff804`31cf15a1 4c8b6038        mov     r12,qword ptr [rax+38h] ds:002b:00000000`00000038=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: f99

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  nvcontainer.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:49.0920

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff80431ce2f5c to fffff80431cf15a1

STACK_TEXT: 
ffffe68b`4b47d770 fffff804`31ce2f5c : ffffe68b`4b47d910 ffffe68b`4b47d910 00000000`00000004 fffff804`31ce6400 : FLTMGR!FltpPerformPreCallbacks+0xce41
ffffe68b`4b47d880 fffff804`31d1c5d5 : 00000000`00000001 ffffe68b`4b47d9e8 ffffe68b`4b47da20 ffff860f`9cd6e2c0 : FLTMGR!FltpPassThroughFastIo+0x8c
ffffe68b`4b47d8e0 fffff804`30a46348 : ffff860f`9cd6e2c0 00000000`00000000 00000000`00000000 ffffe68b`00000000 : FLTMGR!FltpFastIoWrite+0x165
ffffe68b`4b47d990 fffff804`305d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x458
ffffe68b`4b47da90 00007ffc`2521c1c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007c`0bdff4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2521c1c4


THREAD_SHA1_HASH_MOD_FUNC:  ae1b6ce5747fd15ee3dc4f35107e7ec8ddfe0727

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  dbfc3ba60c25ade444d37f2acd253d368d2c6a10

THREAD_SHA1_HASH_MOD:  c48bb7014c6bc00e7c264dcececf9775442fdb99

FOLLOWUP_IP:
FLTMGR!FltpPerformPreCallbacks+ce41
fffff804`31cf15a1 4c8b6038        mov     r12,qword ptr [rax+38h]

FAULT_INSTR_CODE:  38608b4c

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  FLTMGR!FltpPerformPreCallbacks+ce41

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.267

STACK_COMMAND:  .cxr 0xffffe68b4b47cd80 ; kb

BUCKET_ID_FUNC_OFFSET:  ce41

FAILURE_BUCKET_ID:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks

BUCKET_ID:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacks

TARGET_TIME:  2019-12-29T13:27:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  10102

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_fltmgr!fltpperformprecallbacks

FAILURE_ID_HASH:  {8a3fd757-8fa5-e557-36d7-0eb34e85f336}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffba8fc42d3010, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffffba8fc42d3010, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffba8fc42d3010

BUGCHECK_P2: 11

BUGCHECK_P3: ffffba8fc42d3010

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff802127733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffba8fc42d3010

FAULTING_IP:
+0
ffffba8f`c42d3010 0000            add     byte ptr [rax],al

MM_INTERNAL_CODE:  2

CPU_COUNT: c

CPU_MHZ: f98

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  RuntimeBroker.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:54.0866

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffb907aad54f00 -- (.trap 0xffffb907aad54f00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffba8fcb5bc1dc rbx=0000000000000000 rcx=ffffba8fcb5bc1dc
rdx=ffffc8f404e03d54 rsi=0000000000000000 rdi=0000000000000000
rip=ffffba8fc42d3010 rsp=ffffb907aad55090 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffff802122317a0
r11=ffffba8fcb5bc1dc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffffba8f`c42d3010 0000            add     byte ptr [rax],al ds:ffffba8f`cb5bc1dc=5c
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802123e35d6 to fffff802123c14e0

STACK_TEXT: 
ffffb907`aad54c58 fffff802`123e35d6 : 00000000`00000050 ffffba8f`c42d3010 00000000`00000011 ffffb907`aad54f00 : nt!KeBugCheckEx
ffffb907`aad54c60 fffff802`12272eef : ffffba8f`00000000 00000000`00000011 00000000`00000000 ffffba8f`c42d3010 : nt!MiSystemFault+0x1d6866
ffffb907`aad54d60 fffff802`123cf520 : 00000000`00000000 ffffba8f`c6023c50 ffffba8f`bde10130 00000000`00000000 : nt!MmAccessFault+0x34f
ffffb907`aad54f00 ffffba8f`c42d3010 : 00000000`00000000 ffffba8f`bde10130 ffffba8f`c4bf8010 ffffba8f`c922c001 : nt!KiPageFault+0x360
ffffb907`aad55090 00000000`00000000 : ffffba8f`bde10130 ffffba8f`c4bf8010 ffffba8f`c922c001 ffffba8f`cb5bc1c0 : 0xffffba8f`c42d3010


THREAD_SHA1_HASH_MOD_FUNC:  35852f70c1fb96d682b5bd0e931cc10c7b9fe1fe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c0efb11bdbdabbfe638cd9930c42dad821618e02

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!MiSystemFault+1d6866
fffff802`123e35d6 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiSystemFault+1d6866

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d6866

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

BUCKET_ID:  AV_INVALID_nt!MiSystemFault

PRIMARY_PROBLEM_CLASS:  AV_INVALID_nt!MiSystemFault

TARGET_TIME:  2019-12-22T15:44:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  9213

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_invalid_nt!misystemfault

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000100, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031643c7c0, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 100

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8031643c7c0

READ_ADDRESS: fffff803169733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000100

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiSwapThread+c00
fffff803`1643c7c0 498b9ec8000000  mov     rbx,qword ptr [r14+0C8h]

CPU_COUNT: c

CPU_MHZ: f98

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  RGBFusion.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-04-2020 23:45:58.0755

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffffa8ffe091780 -- (.trap 0xfffffa8ffe091780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000265000 rbx=0000000000000000 rcx=fffffa8ffe0918d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031643c7c0 rsp=fffffa8ffe091910 rbp=0000000000000000
 r8=0000000000001fe0  r9=0000000000000000 r10=0000000000000000
r11=fffff80316400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwapThread+0xc00:
fffff803`1643c7c0 498b9ec8000000  mov     rbx,qword ptr [r14+0C8h] ds:00000000`000000c8=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803165d32e9 to fffff803165c14e0

STACK_TEXT: 
fffffa8f`fe091638 fffff803`165d32e9 : 00000000`0000000a 00000000`00000100 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa8f`fe091640 fffff803`165cf62b : ffff8489`068c7080 fffff803`165c89f4 fffff803`14705180 00000000`0000003f : nt!KiBugCheckDispatch+0x69
fffffa8f`fe091780 fffff803`1643c7c0 : fffff803`14705180 00000000`ffffff00 fffff803`ffffffff 00000000`00000040 : nt!KiPageFault+0x46b
fffffa8f`fe091910 fffff803`1643b644 : ffff8489`068c7080 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xc00
fffffa8f`fe0919b0 fffff803`16436400 : ffff8489`00000095 ffff8489`00000000 fffffa8f`00000001 00000000`00000002 : nt!KiCommitThreadWait+0x144
fffffa8f`fe091a50 fffff803`169eb1bf : ffff8489`068c7080 00000000`1cbafda0 fffffa8f`fe091b10 00000000`00000002 : nt!KeDelayExecutionThread+0x4c0
fffffa8f`fe091ad0 fffff803`165d2d18 : 00000000`00000000 fffffa8f`00000001 ffffffff`ffffd8f0 fffffa8f`fe091b80 : nt!NtDelayExecution+0x5f
fffffa8f`fe091b00 00000000`77e21cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1cbaf008 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77e21cbc


THREAD_SHA1_HASH_MOD_FUNC:  84f0d86cd8f01d64a6c3c0ffcf84247ac62c4a1d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  de4105351e81cc5cc3f7ca26ca2490472792a796

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!KiSwapThread+c00
fffff803`1643c7c0 498b9ec8000000  mov     rbx,qword ptr [r14+0C8h]

FAULT_INSTR_CODE:  c89e8b49

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiSwapThread+c00

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c00

FAILURE_BUCKET_ID:  AV_nt!KiSwapThread

BUCKET_ID:  AV_nt!KiSwapThread

PRIMARY_PROBLEM_CLASS:  AV_nt!KiSwapThread

TARGET_TIME:  2019-12-08T19:05:47.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  23d1

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kiswapthread

FAILURE_ID_HASH:  {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı