Didn't find what you were looking for?

New post

Marathon.exe throwing my PC into BugCheck

For those who understand:

 

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8068f1fec54

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

FILE_IN_CAB:  MEMORY.DMP

DUMP_FILE_ATTRIBUTES: 0x21800

FAULTING_THREAD:  ffff93836738b080

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS:  ffffffffffffffff 

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


PROCESS_NAME:  Marathon.exe

IP_IN_PAGED_CODE: 
nt!KiIpiProcessRequests+f4
fffff806`8f1fec54 488b36          mov     rsi,qword ptr [rsi]

STACK_TEXT:  
ffffc981`06558458 fffff806`8f1e8c2b     : 00000000`0000001e ffffffff`c0000005 fffff806`8f1fec54 00000000`00000000 : nt!KeBugCheckEx
ffffc981`06558460 fffff806`8f4bee45     : 00000000`00004e20 00000000`00000001 00000000`00000000 00000000`00004e20 : nt!KiDispatchException+0x91b
ffffc981`06558b50 fffff806`8f4b9b25     : 00000002`00001000 00000028`064f5540 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x145
ffffc981`06558d30 fffff806`8f1fec54     : 00000000`00000000 fffff806`8f14d49e 00000000`00000000 ffffc981`06558f38 : nt!KiGeneralProtectionFault+0x365
ffffc981`06558ec0 fffff806`8f4b29c0     : 00000000`00000004 ffffc800`5de9faa0 00000000`00000000 00000000`00000000 : nt!KiIpiProcessRequests+0xf4
ffffc981`06558fb0 fffff806`8f4b25da     : ffff9383`6738b080 00000000`000005f4 00000000`00000004 00000000`00000001 : nt!KiIpiInterruptSubDispatch+0x40
ffffc800`5de9fa20 00007ff7`788846c0     : 00000000`00000003 00000000`5ec70001 00000000`ffffffff 00000000`bf8dffff : nt!KiIpiInterrupt+0x39a
000000c1`15fff950 00007ff7`780d7c28     : 000007cd`0003f8f9 00000000`0000ffff 00007ff7`7eb5a078 00007ff7`7ab6429c : Marathon!AK::WriteBytesCount::Clear+0xf8760
000000c1`15fff9c0 00007ff7`7a6970e1     : 000001fc`bdac5b00 00007ff7`00000007 00007ff7`7a697090 00007ff7`7a69709b : Marathon!script_workflow_tag_unit_tests_dispose__function+0x157c8
000000c1`15fffa40 00007ff7`792b61b3     : 00007ff7`7eb5a078 000001fd`b6d00040 00000000`00000000 00007ff7`7eb5a078 : Marathon!AK::WriteBytesMem::SetCount+0xd3aed1
000000c1`15fffa70 00007ff7`799bbb8f     : 00007ff7`7eb5a078 00007ff7`7eb5a09c 00000000`00000080 00000000`00000000 : Marathon!_setup_script_workflow_tag_suite+0x8b4283
000000c1`15fffab0 00007ffb`d710e8d7     : 00007ff7`7eb5a078 00000000`00000000 00000000`00000000 00000000`00000000 : Marathon!AK::WriteBytesMem::SetCount+0x5f97f
000000c1`15fffaf0 00007ffb`d824c48c     : 00000000`00000000 00000000`00000000 000004f0`fffffb30 000004d0`fffffb30 : KERNEL32!BaseThreadInitThunk+0x17
000000c1`15fffb20 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x2c


SYMBOL_NAME:  nt!KiIpiProcessRequests+f4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

STACK_COMMAND: .process /r /p 0xffff9383687d1080; .thread 0xffff93836738b080 ; kb

0

Comments

0 comments

Please sign in to leave a comment.