Marathon.exe throwing my PC into BugCheck
For those who understand:
BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8068f1fec54 BUGCHECK_P3: 0 BUGCHECK_P4: ffffffffffffffff FILE_IN_CAB: MEMORY.DMP DUMP_FILE_ATTRIBUTES: 0x21800 FAULTING_THREAD: ffff93836738b080 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: ffffffffffffffff BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 (!blackboxwinlogon) PROCESS_NAME: Marathon.exe IP_IN_PAGED_CODE: nt!KiIpiProcessRequests+f4 fffff806`8f1fec54 488b36 mov rsi,qword ptr [rsi] STACK_TEXT: ffffc981`06558458 fffff806`8f1e8c2b : 00000000`0000001e ffffffff`c0000005 fffff806`8f1fec54 00000000`00000000 : nt!KeBugCheckEx ffffc981`06558460 fffff806`8f4bee45 : 00000000`00004e20 00000000`00000001 00000000`00000000 00000000`00004e20 : nt!KiDispatchException+0x91b ffffc981`06558b50 fffff806`8f4b9b25 : 00000002`00001000 00000028`064f5540 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x145 ffffc981`06558d30 fffff806`8f1fec54 : 00000000`00000000 fffff806`8f14d49e 00000000`00000000 ffffc981`06558f38 : nt!KiGeneralProtectionFault+0x365 ffffc981`06558ec0 fffff806`8f4b29c0 : 00000000`00000004 ffffc800`5de9faa0 00000000`00000000 00000000`00000000 : nt!KiIpiProcessRequests+0xf4 ffffc981`06558fb0 fffff806`8f4b25da : ffff9383`6738b080 00000000`000005f4 00000000`00000004 00000000`00000001 : nt!KiIpiInterruptSubDispatch+0x40 ffffc800`5de9fa20 00007ff7`788846c0 : 00000000`00000003 00000000`5ec70001 00000000`ffffffff 00000000`bf8dffff : nt!KiIpiInterrupt+0x39a 000000c1`15fff950 00007ff7`780d7c28 : 000007cd`0003f8f9 00000000`0000ffff 00007ff7`7eb5a078 00007ff7`7ab6429c : Marathon!AK::WriteBytesCount::Clear+0xf8760 000000c1`15fff9c0 00007ff7`7a6970e1 : 000001fc`bdac5b00 00007ff7`00000007 00007ff7`7a697090 00007ff7`7a69709b : Marathon!script_workflow_tag_unit_tests_dispose__function+0x157c8 000000c1`15fffa40 00007ff7`792b61b3 : 00007ff7`7eb5a078 000001fd`b6d00040 00000000`00000000 00007ff7`7eb5a078 : Marathon!AK::WriteBytesMem::SetCount+0xd3aed1 000000c1`15fffa70 00007ff7`799bbb8f : 00007ff7`7eb5a078 00007ff7`7eb5a09c 00000000`00000080 00000000`00000000 : Marathon!_setup_script_workflow_tag_suite+0x8b4283 000000c1`15fffab0 00007ffb`d710e8d7 : 00007ff7`7eb5a078 00000000`00000000 00000000`00000000 00000000`00000000 : Marathon!AK::WriteBytesMem::SetCount+0x5f97f 000000c1`15fffaf0 00007ffb`d824c48c : 00000000`00000000 00000000`00000000 000004f0`fffffb30 000004d0`fffffb30 : KERNEL32!BaseThreadInitThunk+0x17 000000c1`15fffb20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x2c SYMBOL_NAME: nt!KiIpiProcessRequests+f4 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .process /r /p 0xffff9383687d1080; .thread 0xffff93836738b080 ; kb
0
Comments
Please sign in to leave a comment.