muhammedkorkem
Femtopat
- Katılım
- 29 Temmuz 2020
- Mesajlar
- 16
i7-8700 ne zamandır beri 12 çekirdek? i9-10900K 10 çekirdek.
Minidump dosyalarını paylaşın.
Minidump Dosyalarını Paylaşın
23.06.2025 tarihinde yapılan güncel rehbere aşağıdaki linkten erişebilirsiniz: https://www.technopat.net/sosyal/konu/minidump-nedir-nasil-paylasilir.3817531/ Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi...www.technopat.net
@claus @Recep Baltaş @r.yasar10 @MayCrasH
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000011, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80512a4248f, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 2.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 2.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: a.
BUGCHECK_P1: 11.
BUGCHECK_P2: 2.
BUGCHECK_P3: 0.
BUGCHECK_P4: fffff80512a4248f.
READ_ADDRESS: fffff80512f733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000011.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: chrome.exe.
TRAP_FRAME: fffff40c5af57480 -- (.trap 0xfffff40c5af57480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000c0 rbx=0000000000000000 rcx=fffff78000000274.
rdx=00000000000e4000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8052ce8cbde rsp=fffff40c5af57610 rbp=00000000000e4000.
r8=ffffaa0cda4a9d00 r9=fffff40c5af57910 r10=fffff80512b25240.
r11=fffff40c5af57808 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po cy.
dxgmms2!FastZeroMemory+0x5e:
fffff805`2ce8cbde 660fe703 movntdq xmmword ptr [rbx],xmm0 ds:00000000`00000000=????????????????????????????????
Resetting default scope.
STACK_TEXT:
fffff40c`5af565b8 fffff805`12bd41e9 : 00000000`0000000a 00000000`00000011 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff40c`5af565c0 fffff805`12bd0529 : fffff40c`5af567c0 00000000`00000020 00000000`00000020 fffff805`2e4d50ea : nt!KiBugCheckDispatch+0x69.
fffff40c`5af56700 fffff805`12a4248f : ffff858b`45dde080 fffff805`00054009 000000d2`a5709130 000000d3`10ba6330 : nt!KiPageFault+0x469.
fffff40c`5af56890 fffff805`12a3ece2 : 00000000`00303238 ffffbd00`09096a98 fffff40c`00000000 ff030000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f.
fffff40c`5af56970 fffff805`12a69b69 : fffffae1`00000010 000646c8`00000002 00000000`00000000 000646c8`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372.
fffff40c`5af56b90 fffff805`12a6995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199.
fffff40c`5af56c70 fffff805`12a5dde6 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000001 : nt!MiGetFreeOrZeroPageAnyColor+0x62.
fffff40c`5af56cb0 fffff805`12a5d4e1 : fffff805`12e6a440 ffff858b`00000093 00000000`00000093 00000000`00000000 : nt!MiGetPage+0x346.
fffff40c`5af56d90 fffff805`12a5b20a : fffff40c`5af57100 00000000`00000000 00000000`00000001 00000000`00000011 : nt!MiGetPageChain+0x181.
fffff40c`5af56f80 fffff805`12a5ace8 : ffffaa0c`da19cb30 fffff40c`00000000 ffff858b`4596fb10 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x14a.
fffff40c`5af570a0 fffff805`12a5a5b2 : fffffafd`40558db0 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218.
fffff40c`5af57190 fffff805`12a58579 : 00000000`00000111 00000000`00000004 00000000`c0000016 ffffc280`62ac6101 : nt!MiDispatchFault+0x982.
fffff40c`5af572e0 fffff805`12bd041e : ffff858b`45dde460 fffff805`12acebf8 fffff40c`5af57910 fffff805`12aa19c9 : nt!MmAccessFault+0x169.
fffff40c`5af57480 fffff805`2ce8cbde : fffff40c`5af579b0 00000000`00000000 00000000`04000000 00000000`00000000 : nt!KiPageFault+0x35e.
fffff40c`5af57610 fffff805`2ce8cb28 : ffffaa0c`d9de6910 ffffaa0c`d4331560 ffff858b`4596fb10 fffff40c`5af57650 : dxgmms2!FastZeroMemory+0x5e.
fffff40c`5af57660 fffff805`2ce79b5c : ffff858b`45edec00 00000000`00000000 00000000`00000000 ffff858b`45edec90 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::ZeroMultirangeMemory+0x88.
fffff40c`5af576d0 fffff805`2ce86979 : ffffaa0c`da19cb30 fffff805`00000000 ffffaa0c`da19cb30 ffff858b`4596fb10 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ZeroIfNeeded+0x17c.
fffff40c`5af57750 fffff805`2ce133f9 : ffffaa0c`d54c3010 ffffaa0c`d425bf30 fffff40c`5af57900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::Lock+0x1a9.
fffff40c`5af57810 fffff805`2bdb8397 : ffffffff`ffffffff fffff40c`5af57a80 00000000`00000001 ffffaa0c`d54c3010 : dxgmms2!VidMmLock+0x9.
fffff40c`5af57840 fffff805`12bd3c15 : 00000000`00001400 ffff858b`45dde080 00000042`a65fcd30 fffff40c`5af57a80 : dxgkrnl!DxgkLock2+0x7f7.
fffff40c`5af57a00 00007ff9`68104f64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000042`a65fcc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`68104f64.
SYMBOL_NAME: dxgmms2!FastZeroMemory+5e.
MODULE_NAME: dxgmms2.
IMAGE_NAME: dxgmms2.sys.
IMAGE_VERSION: 10.0.18362.1061.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 5e.
FAILURE_BUCKET_ID: AV_dxgmms2!FastZeroMemory.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {959047b1-e0a3-f6f1-368c-9f58687231a6}
Followup: MachineOwner.
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80717c125b7, Address of the instruction which caused the bugcheck.
Arg3: fffffd8e5f3f6030, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 2.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 2.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: 3b.
BUGCHECK_P1: c0000005.
BUGCHECK_P2: fffff80717c125b7.
BUGCHECK_P3: fffffd8e5f3f6030.
BUGCHECK_P4: 0.
CONTEXT: fffffd8e5f3f6030 -- (.cxr 0xfffffd8e5f3f6030)
rax=ffffdd07c8657000 rbx=0000000000010000 rcx=ffff5d07cf543e3a.
rdx=0000000000000000 rsi=ffffdd07cf543dc0 rdi=0000000000000000.
rip=fffff80717c125b7 rsp=fffffd8e5f3f6a20 rbp=0000000000000000.
r8=ffffdd07cf543dc0 r9=0000000000000045 r10=0000000000000000.
r11=000000000000000b r12=0000000000000016 r13=0000000000000000.
r14=fffffd8e5f3f6b90 r15=0000000000000018.
iopl=0 nv up ei ng nz ac po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297.
Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67:
fffff807`17c125b7 440fb70c0a movzx r9d,word ptr [rdx+rcx] ds:002b:ffff5d07`cf543e3a=????
Resetting default scope.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: chrome.exe.
STACK_TEXT:
fffffd8e`5f3f6a20 fffff807`17c05a26 : ffffdd07`cf543dc0 fffffd8e`5f3f6b90 ffffdd07`d2c6ca58 fffff807`11ca1d3d : Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67.
fffffd8e`5f3f6a70 fffff807`17cff0fb : ffffdd07`d2c6c7c0 ffffdd07`d2c6c7c0 fffffd8e`5f3f6db0 ffffdd07`d2c6c660 : Ntfs!FsLibLookupFirstMatchingElementGenericTableAvl+0x46.
fffffd8e`5f3f6aa0 fffff807`17d03f23 : fffffd8e`5f3f6f80 ffffdd07`d2c6c660 fffffd8e`5f3f6d98 fffffd8e`5f3f7001 : Ntfs!NtfsFindPrefix+0x17b.
fffffd8e`5f3f6c00 fffff807`17d04ae8 : ffffcc8a`1a091058 ffffcc8a`1a96eb10 ffffcc8a`1a96eb10 fffffd8e`5f3f6e08 : Ntfs!NtfsFindStartingNode+0x4b3.
fffffd8e`5f3f6cc0 fffff807`17d07ebe : ffffcc8a`1a091058 fffffd8e`5f3f6f80 ffffcc8a`1a091058 ffffcc8a`1a96eb10 : Ntfs!NtfsCommonCreate+0x478.
fffffd8e`5f3f6eb0 fffff807`11c99ed9 : ffffcc8a`1406e030 ffffcc8a`1a96eb10 ffffcc8a`0be07700 ffffcc8a`1405b090 : Ntfs!NtfsFsdCreate+0x1fe.
fffffd8e`5f3f70e0 fffff807`165355de : ffffcc8a`1a96eb10 ffffcc8a`1a96ef00 ffffcc8a`1a96eb10 ffffcc8a`1c461670 : nt!IofCallDriver+0x59.
fffffd8e`5f3f7120 fffff807`1656cd27 : fffffd8e`5f3f71e0 fffff807`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e.
fffffd8e`5f3f71a0 fffff807`11c99ed9 : ffffcc8a`1c461600 fffff807`12204345 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x307.
fffffd8e`5f3f7250 fffff807`11c98f94 : 00000000`00000000 00000000`00000000 ffffcc8a`1a96ef40 ffffcc8a`1a96eb10 : nt!IofCallDriver+0x59.
fffffd8e`5f3f7290 fffff807`12204a1b : fffffd8e`5f3f7550 fffff807`12204345 fffffd8e`5f3f74c0 fffffd8e`5f3f77a0 : nt!IoCallDriverWithTracing+0x34.
fffffd8e`5f3f72e0 fffff807`1220b9ef : ffffcc8a`13e0d8f0 ffffcc8a`13e0d845 ffffcc8a`1a8294b0 00000000`00000001 : nt!IopParseDevice+0x62b.
fffffd8e`5f3f7450 fffff807`12209e51 : ffffcc8a`1a829400 fffffd8e`5f3f7698 00000000`00000040 ffffcc8a`0a8f8560 : nt!ObpLookupObjectName+0x78f.
fffffd8e`5f3f7610 fffff807`12250ac4 : ffffcc8a`00000001 00000058`4b7fed20 00000000`00000028 00000058`4b7fecf0 : nt!ObOpenObjectByNameEx+0x201.
fffffd8e`5f3f7750 fffff807`11dd3c15 : ffffcc8a`00000000 00000058`00000001 ffffcc8a`1b1f4080 fffffd8e`5f3f7a80 : nt!NtQueryFullAttributesFile+0x1b4.
fffffd8e`5f3f7a00 00007ffd`aeabe864 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000058`4b7fec98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`aeabe864.
SYMBOL_NAME: Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+67.
MODULE_NAME: Ntfs.
IMAGE_NAME: Ntfs.sys.
IMAGE_VERSION: 10.0.18362.719.
STACK_COMMAND: .cxr 0xfffffd8e5f3f6030 ; kb.
BUCKET_ID_FUNC_OFFSET: 67.
FAILURE_BUCKET_ID: 0x3B_c0000005_Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {643b1572-10af-990e-3668-d5620c6d9754}
Followup: MachineOwner.
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb6467b8d7960, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80786482140, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name.
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 3.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 3.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: 50.
BUGCHECK_P1: ffffb6467b8d7960.
BUGCHECK_P2: 2.
BUGCHECK_P3: fffff80786482140.
BUGCHECK_P4: 2.
READ_ADDRESS: fffff807819733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffb6467b8d7960.
MM_INTERNAL_CODE: 2.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: sppsvc.exe.
TRAP_FRAME: fffff60a49496f50 -- (.trap 0xfffff60a49496f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff807864880e0 rbx=0000000000000000 rcx=0000000000000023.
rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80786482140 rsp=fffff60a494970e8 rbp=0000000009733c1f.
r8=00000000aeee2865 r9=0000000066653d16 r10=00000000061a9eeb.
r11=0000000000bad64d r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
CI!Gv52a045+0x80:
fffff807`86482140 488904c7 mov qword ptr [rdi+rax*8],rax ds:ffffc03c`32440700=????????????????
Resetting default scope.
STACK_TEXT:
fffff60a`49496ca8 fffff807`815ecf0a : 00000000`00000050 ffffb646`7b8d7960 00000000`00000002 fffff60a`49496f50 : nt!KeBugCheckEx.
fffff60a`49496cb0 fffff807`8145875f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffb646`7b8d7960 : nt!MiSystemFault+0x1c5aaa.
fffff60a`49496db0 fffff807`815d041e : 00000000`00000000 00000000`00000000 00000000`00000001 ffff9e82`dd5cb7b0 : nt!MmAccessFault+0x34f.
fffff60a`49496f50 fffff807`86482140 : fffff807`864846bc fffff60a`49497110 fffff60a`49497250 00000000`00000000 : nt!KiPageFault+0x35e.
fffff60a`494970e8 fffff807`864846bc : fffff60a`49497110 fffff60a`49497250 00000000`00000000 e845998b`9733c1f0 : CI!Gv52a045+0x80.
fffff60a`494970f0 fffff807`864704b9 : 00000000`00000000 00000000`000027bb 00000000`00000005 00000000`00000000 : CI!Gvb3afc4+0x138.
fffff60a`49497450 fffff807`863d903f : c11b999c`187b4d0e 00000000`00000005 00000000`00000000 00000000`000027bb : CI!peauthvbn_StoreParameter+0x3d.
fffff60a`494974a0 fffff807`8644523b : 00000000`00000000 00000000`00000000 ffff808e`000112f0 ffff808e`000112f0 : CI!PEAuthStoreParameter+0x5f.
fffff60a`494974d0 fffff807`86445504 : 00000000`00001658 fffff60a`494975a9 ffff9e82`dd59bec0 ffff9e82`eb756080 : CI!I_PEUpdatePEHashBucket+0x157.
fffff60a`49497510 fffff807`819d1f48 : 00000000`00000000 00000000`00000000 00000000`0000ff00 ffff9e82`e9c4ac80 : CI!I_PEProcessNotify+0x34.
fffff60a`49497540 fffff807`81a30308 : ffff9e82`eb756000 ffff9e82`eb756080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x254.
fffff60a`49497610 fffff807`81a2662f : ffff9e82`eb753688 00000000`00000000 fffff60a`494977e9 00000000`00000000 : nt!PspExitProcess+0x70.
fffff60a`49497640 fffff807`81a23f23 : 00000000`00000000 a76c3505`612fbb01 0000007f`c2b54000 ffffc881`2a240180 : nt!PspExitThread+0x5c7.
fffff60a`49497750 fffff807`814a6441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33.
fffff60a`49497790 fffff807`815c6920 : ffffc881`2a240101 fffff60a`49497850 00000000`40b7fc89 00000000`00000000 : nt!KiDeliverApc+0x481.
fffff60a`49497850 fffff807`815d3cbf : 00000000`00000000 ffff9e82`da87d6c0 ffff9e82`eb753080 0000007f`c2eff578 : nt!KiInitiateUserApc+0x70.
fffff60a`49497990 00007ffe`8347cbc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
0000007f`c2eff558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8347cbc4.
CHKIMG_EXTENSION: !chkimg -lo 50 -d !CI.
fffff80786482143 - CI!Gv52a045+83.
[ cf:c7 ]
1 error : !CI (fffff80786482143)
MODULE_NAME: memory_corruption.
IMAGE_NAME: memory_corruption.
MEMORY_CORRUPTOR: ONE_BIT.
STACK_COMMAND: .thread ; .cxr ; kb.
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption.
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8077724248f, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 2.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 2.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: a.
BUGCHECK_P1: 10.
BUGCHECK_P2: 2.
BUGCHECK_P3: 0.
BUGCHECK_P4: fffff8077724248f.
READ_ADDRESS: fffff807777733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000010.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: explorer.exe.
TRAP_FRAME: ffff8d8b9331e8d0 -- (.trap 0xffff8d8b9331e8d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8077724248f rsp=ffff8d8b9331ea60 rbp=ffff8d8b9331ead9.
r8=00000000000000ab r9=00000000000000ab r10=0000000000000001.
r11=ffff8d8b9331eb38 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!MiInsertPageInFreeOrZeroedList+0x19f:
fffff807`7724248f 49034710 add rax,qword ptr [r15+10h] ds:00000000`00000010=????????????????
Resetting default scope.
STACK_TEXT:
ffff8d8b`9331e788 fffff807`773d41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
ffff8d8b`9331e790 fffff807`773d0529 : 00000000`00000000 00000000`000000ff fffff807`77668c07 ffffef00`004a1cf0 : nt!KiBugCheckDispatch+0x69.
ffff8d8b`9331e8d0 fffff807`7724248f : 00000000`00000000 fffff807`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469.
ffff8d8b`9331ea60 fffff807`7723ece2 : 00000000`00018bab ffffef00`004a3028 ffffef00`00000000 ffffa20b`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f.
ffff8d8b`9331eb40 fffff807`77269b69 : 00000000`00000010 00000000`00000002 00000000`00000000 fffff807`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372.
ffff8d8b`9331ed60 fffff807`7726995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199.
ffff8d8b`9331ee40 fffff807`7725dde6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetFreeOrZeroPageAnyColor+0x62.
ffff8d8b`9331ee80 fffff807`772b549c : fffff807`7766a440 0a000000`000000aa fffff807`7766a440 ffffef00`00000000 : nt!MiGetPage+0x346.
ffff8d8b`9331ef60 fffff807`772b7771 : ffffb789`b9a7c010 ffffb789`c9ce89a0 00000000`00000000 00000000`00000000 : nt!MiMakePageAvoidRead+0x18c.
ffff8d8b`9331f130 fffff807`772b6b2b : ffffa20b`18fa4000 00000000`06b09040 ffff8d8b`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x281.
ffff8d8b`9331f210 fffff807`772b8905 : ffffb789`c9ce89a0 00000000`06b09040 ffff8d8b`9331f3f0 00000000`00080000 : nt!CcMapAndCopyInToCache+0x5fb.
ffff8d8b`9331f390 fffff807`7a6d9136 : ffffc98c`c8ef1840 00000000`00000000 ffffc98c`c8ef1840 ffffc98c`00100000 : nt!CcCopyWriteEx+0x105.
ffff8d8b`9331f410 fffff807`78f35f78 : 00000000`00000000 00000000`000002c0 ffffb789`cb20c5d0 00000000`00000000 : Ntfs!NtfsCopyWriteA+0x456.
ffff8d8b`9331f720 fffff807`78f32fa3 : ffff8d8b`9331f810 00000000`00000000 00000000`00000000 ffffb789`c9191460 : FLTMGR!FltpPerformFastIoCall+0x198.
ffff8d8b`9331f780 fffff807`78f6c5d5 : b789c8cc`56b0f26f 00000000`001f0003 00000000`00000000 ffffb789`cb20c5d0 : FLTMGR!FltpPassThroughFastIo+0xd3.
ffff8d8b`9331f7e0 fffff807`778c9708 : ffffb789`cb20c5d0 00000000`0ebec460 00000000`0ebec460 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165.
ffff8d8b`9331f890 fffff807`773d3c15 : 00000000`00000000 00000000`0000156c 00000000`00000000 00000000`145231f0 : nt!NtWriteFile+0x458.
ffff8d8b`9331f990 00007ffe`2475c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000000`0ebec3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2475c174.
SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+19f.
MODULE_NAME: nt.
IMAGE_VERSION: 10.0.18362.959.
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: memory_corruption.
BUCKET_ID_FUNC_OFFSET: 19f.
FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}
Followup: MachineOwner.
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff9bffcac1590.
Arg3: 0200000000000000.
Arg4: 0000000000000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.Sec.
Value: 2.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.Sec.
Value: 2.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.
Key : Analysis.System.
Value: CreateObject.
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
BUGCHECK_CODE: 1a.
BUGCHECK_P1: 41792.
BUGCHECK_P2: fffff9bffcac1590.
BUGCHECK_P3: 200000000000000.
BUGCHECK_P4: 0.
MEMORY_CORRUPTOR: ONE_BIT.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: chrome.exe.
STACK_TEXT:
fffffd89`24bb9a68 fffff806`5460f55a : 00000000`0000001a 00000000`00041792 fffff9bf`fcac1590 02000000`00000000 : nt!KeBugCheckEx.
fffffd89`24bb9a70 fffff806`544732b7 : 00000000`00000000 fffff9bf`fcac1590 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a4aa.
fffffd89`24bb9b80 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`dffe5608 00000000`00000000 0a000002`549a2867 : nt!MiWalkPageTablesRecursively+0x1e7.
fffffd89`24bb9c40 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe6fff28 00000000`00000000 0a000002`544de867 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9d00 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe7f37f8 fffff9fc`00000000 8a000002`54578867 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9dc0 fffff806`54472efc : fffffd89`24bb9fd0 fffff9fc`fe7f3f98 fffffd89`00000000 fffffd89`24bb9f49 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9e80 fffff806`54471368 : fffffd89`24bb9fd0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c.
fffffd89`24bb9f80 fffff806`5447f4c0 : ffffffff`ffffffff ffff8306`c73443f8 fffffd89`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268.
fffffd89`24bba320 fffff806`549ce76d : ffff8306`c7839080 ffff8306`c7839080 ffff8306`c7038da0 ffff8306`c73443f0 : nt!MiDeleteVad+0x860.
fffffd89`24bba4e0 fffff806`549dd4a0 : ffff8306`c7038da0 ffff8306`c470ed60 ffff8306`c7839080 00000000`00000000 : nt!MiUnmapVad+0x49.
fffffd89`24bba510 fffff806`549dca0f : ffff8306`c8abcca0 ffff8306`c8abcca0 ffff8306`c7344080 fffff806`5486a440 : nt!MiCleanVad+0x30.
fffffd89`24bba540 fffff806`54a6d6b9 : ffffffff`00000000 ffffffff`ffffffff fffffd89`24bba701 ffff8306`c7344080 : nt!MmCleanProcessAddressSpace+0x137.
fffffd89`24bba5c0 fffff806`54a26673 : ffff8306`c7344080 ffffdb85`0ed9c060 fffffd89`24bba7e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139.
fffffd89`24bba640 fffff806`54a23f23 : ffff8306`00000000 00000000`00000001 00000050`8e7ba000 00000050`90fff920 : nt!PspExitThread+0x60b.
fffffd89`24bba750 fffff806`544a6441 : fffffd89`24bba940 00000050`90fff868 fffffd89`24bba968 fffff806`544a7000 : nt!KiSchedulerApcTerminate+0x33.
fffffd89`24bba790 fffff806`545c6920 : 00000050`90fff901 fffffd89`24bba850 00000000`000001f8 fffffd89`00000000 : nt!KiDeliverApc+0x481.
fffffd89`24bba850 fffff806`545d3cbf : ffff8306`c7839080 00000050`90fff848 fffffd89`24bba9a8 ffffdb85`0f114c40 : nt!KiInitiateUserApc+0x70.
fffffd89`24bba990 00007ff9`95efc194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
00000050`90fff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`95efc194.
SYMBOL_NAME: ONE_BIT.
MODULE_NAME: hardware.
IMAGE_NAME: memory_corruption.
STACK_COMMAND: .thread ; .cxr ; kb.
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner.
---------
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000011, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80512a4248f, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 2. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 2. Key : Analysis.Memory.CommitPeak.Mb. Value: 82. Key : Analysis.System. Value: CreateObject. DUMP_FILE_ATTRIBUTES: 0x8. Kernel Generated Triage Dump. BUGCHECK_CODE: a. BUGCHECK_P1: 11. BUGCHECK_P2: 2. BUGCHECK_P3: 0. BUGCHECK_P4: fffff80512a4248f. READ_ADDRESS: fffff80512f733b8: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock. fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. 0000000000000011. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: chrome.exe. TRAP_FRAME: fffff40c5af57480 -- (.trap 0xfffff40c5af57480) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000000c0 rbx=0000000000000000 rcx=fffff78000000274. rdx=00000000000e4000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8052ce8cbde rsp=fffff40c5af57610 rbp=00000000000e4000. r8=ffffaa0cda4a9d00 r9=fffff40c5af57910 r10=fffff80512b25240. r11=fffff40c5af57808 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei ng nz na po cy. dxgmms2!FastZeroMemory+0x5e: fffff805`2ce8cbde 660fe703 movntdq xmmword ptr [rbx],xmm0 ds:00000000`00000000=???????????????????????????????? Resetting default scope. STACK_TEXT: fffff40c`5af565b8 fffff805`12bd41e9 : 00000000`0000000a 00000000`00000011 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx. fffff40c`5af565c0 fffff805`12bd0529 : fffff40c`5af567c0 00000000`00000020 00000000`00000020 fffff805`2e4d50ea : nt!KiBugCheckDispatch+0x69. fffff40c`5af56700 fffff805`12a4248f : ffff858b`45dde080 fffff805`00054009 000000d2`a5709130 000000d3`10ba6330 : nt!KiPageFault+0x469. fffff40c`5af56890 fffff805`12a3ece2 : 00000000`00303238 ffffbd00`09096a98 fffff40c`00000000 ff030000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f. fffff40c`5af56970 fffff805`12a69b69 : fffffae1`00000010 000646c8`00000002 00000000`00000000 000646c8`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372. fffff40c`5af56b90 fffff805`12a6995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199. fffff40c`5af56c70 fffff805`12a5dde6 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000001 : nt!MiGetFreeOrZeroPageAnyColor+0x62. fffff40c`5af56cb0 fffff805`12a5d4e1 : fffff805`12e6a440 ffff858b`00000093 00000000`00000093 00000000`00000000 : nt!MiGetPage+0x346. fffff40c`5af56d90 fffff805`12a5b20a : fffff40c`5af57100 00000000`00000000 00000000`00000001 00000000`00000011 : nt!MiGetPageChain+0x181. fffff40c`5af56f80 fffff805`12a5ace8 : ffffaa0c`da19cb30 fffff40c`00000000 ffff858b`4596fb10 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x14a. fffff40c`5af570a0 fffff805`12a5a5b2 : fffffafd`40558db0 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218. fffff40c`5af57190 fffff805`12a58579 : 00000000`00000111 00000000`00000004 00000000`c0000016 ffffc280`62ac6101 : nt!MiDispatchFault+0x982. fffff40c`5af572e0 fffff805`12bd041e : ffff858b`45dde460 fffff805`12acebf8 fffff40c`5af57910 fffff805`12aa19c9 : nt!MmAccessFault+0x169. fffff40c`5af57480 fffff805`2ce8cbde : fffff40c`5af579b0 00000000`00000000 00000000`04000000 00000000`00000000 : nt!KiPageFault+0x35e. fffff40c`5af57610 fffff805`2ce8cb28 : ffffaa0c`d9de6910 ffffaa0c`d4331560 ffff858b`4596fb10 fffff40c`5af57650 : dxgmms2!FastZeroMemory+0x5e. fffff40c`5af57660 fffff805`2ce79b5c : ffff858b`45edec00 00000000`00000000 00000000`00000000 ffff858b`45edec90 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::ZeroMultirangeMemory+0x88. fffff40c`5af576d0 fffff805`2ce86979 : ffffaa0c`da19cb30 fffff805`00000000 ffffaa0c`da19cb30 ffff858b`4596fb10 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ZeroIfNeeded+0x17c. fffff40c`5af57750 fffff805`2ce133f9 : ffffaa0c`d54c3010 ffffaa0c`d425bf30 fffff40c`5af57900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::Lock+0x1a9. fffff40c`5af57810 fffff805`2bdb8397 : ffffffff`ffffffff fffff40c`5af57a80 00000000`00000001 ffffaa0c`d54c3010 : dxgmms2!VidMmLock+0x9. fffff40c`5af57840 fffff805`12bd3c15 : 00000000`00001400 ffff858b`45dde080 00000042`a65fcd30 fffff40c`5af57a80 : dxgkrnl!DxgkLock2+0x7f7. fffff40c`5af57a00 00007ff9`68104f64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 00000042`a65fcc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`68104f64. SYMBOL_NAME: dxgmms2!FastZeroMemory+5e. MODULE_NAME: dxgmms2. IMAGE_NAME: dxgmms2.sys. IMAGE_VERSION: 10.0.18362.1061. STACK_COMMAND: .thread ; .cxr ; kb. BUCKET_ID_FUNC_OFFSET: 5e. FAILURE_BUCKET_ID: AV_dxgmms2!FastZeroMemory. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {959047b1-e0a3-f6f1-368c-9f58687231a6} Followup: MachineOwner. --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck. Arg2: fffff80717c125b7, Address of the instruction which caused the bugcheck. Arg3: fffffd8e5f3f6030, Address of the context record for the exception that caused the bugcheck. Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 2. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 2. Key : Analysis.Memory.CommitPeak.Mb. Value: 80. Key : Analysis.System. Value: CreateObject. DUMP_FILE_ATTRIBUTES: 0x8. Kernel Generated Triage Dump. BUGCHECK_CODE: 3b. BUGCHECK_P1: c0000005. BUGCHECK_P2: fffff80717c125b7. BUGCHECK_P3: fffffd8e5f3f6030. BUGCHECK_P4: 0. CONTEXT: fffffd8e5f3f6030 -- (.cxr 0xfffffd8e5f3f6030) rax=ffffdd07c8657000 rbx=0000000000010000 rcx=ffff5d07cf543e3a. rdx=0000000000000000 rsi=ffffdd07cf543dc0 rdi=0000000000000000. rip=fffff80717c125b7 rsp=fffffd8e5f3f6a20 rbp=0000000000000000. r8=ffffdd07cf543dc0 r9=0000000000000045 r10=0000000000000000. r11=000000000000000b r12=0000000000000016 r13=0000000000000000. r14=fffffd8e5f3f6b90 r15=0000000000000018. iopl=0 nv up ei ng nz ac po cy. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297. Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67: fffff807`17c125b7 440fb70c0a movzx r9d,word ptr [rdx+rcx] ds:002b:ffff5d07`cf543e3a=???? Resetting default scope. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: chrome.exe. STACK_TEXT: fffffd8e`5f3f6a20 fffff807`17c05a26 : ffffdd07`cf543dc0 fffffd8e`5f3f6b90 ffffdd07`d2c6ca58 fffff807`11ca1d3d : Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67. fffffd8e`5f3f6a70 fffff807`17cff0fb : ffffdd07`d2c6c7c0 ffffdd07`d2c6c7c0 fffffd8e`5f3f6db0 ffffdd07`d2c6c660 : Ntfs!FsLibLookupFirstMatchingElementGenericTableAvl+0x46. fffffd8e`5f3f6aa0 fffff807`17d03f23 : fffffd8e`5f3f6f80 ffffdd07`d2c6c660 fffffd8e`5f3f6d98 fffffd8e`5f3f7001 : Ntfs!NtfsFindPrefix+0x17b. fffffd8e`5f3f6c00 fffff807`17d04ae8 : ffffcc8a`1a091058 ffffcc8a`1a96eb10 ffffcc8a`1a96eb10 fffffd8e`5f3f6e08 : Ntfs!NtfsFindStartingNode+0x4b3. fffffd8e`5f3f6cc0 fffff807`17d07ebe : ffffcc8a`1a091058 fffffd8e`5f3f6f80 ffffcc8a`1a091058 ffffcc8a`1a96eb10 : Ntfs!NtfsCommonCreate+0x478. fffffd8e`5f3f6eb0 fffff807`11c99ed9 : ffffcc8a`1406e030 ffffcc8a`1a96eb10 ffffcc8a`0be07700 ffffcc8a`1405b090 : Ntfs!NtfsFsdCreate+0x1fe. fffffd8e`5f3f70e0 fffff807`165355de : ffffcc8a`1a96eb10 ffffcc8a`1a96ef00 ffffcc8a`1a96eb10 ffffcc8a`1c461670 : nt!IofCallDriver+0x59. fffffd8e`5f3f7120 fffff807`1656cd27 : fffffd8e`5f3f71e0 fffff807`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e. fffffd8e`5f3f71a0 fffff807`11c99ed9 : ffffcc8a`1c461600 fffff807`12204345 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x307. fffffd8e`5f3f7250 fffff807`11c98f94 : 00000000`00000000 00000000`00000000 ffffcc8a`1a96ef40 ffffcc8a`1a96eb10 : nt!IofCallDriver+0x59. fffffd8e`5f3f7290 fffff807`12204a1b : fffffd8e`5f3f7550 fffff807`12204345 fffffd8e`5f3f74c0 fffffd8e`5f3f77a0 : nt!IoCallDriverWithTracing+0x34. fffffd8e`5f3f72e0 fffff807`1220b9ef : ffffcc8a`13e0d8f0 ffffcc8a`13e0d845 ffffcc8a`1a8294b0 00000000`00000001 : nt!IopParseDevice+0x62b. fffffd8e`5f3f7450 fffff807`12209e51 : ffffcc8a`1a829400 fffffd8e`5f3f7698 00000000`00000040 ffffcc8a`0a8f8560 : nt!ObpLookupObjectName+0x78f. fffffd8e`5f3f7610 fffff807`12250ac4 : ffffcc8a`00000001 00000058`4b7fed20 00000000`00000028 00000058`4b7fecf0 : nt!ObOpenObjectByNameEx+0x201. fffffd8e`5f3f7750 fffff807`11dd3c15 : ffffcc8a`00000000 00000058`00000001 ffffcc8a`1b1f4080 fffffd8e`5f3f7a80 : nt!NtQueryFullAttributesFile+0x1b4. fffffd8e`5f3f7a00 00007ffd`aeabe864 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 00000058`4b7fec98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`aeabe864. SYMBOL_NAME: Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+67. MODULE_NAME: Ntfs. IMAGE_NAME: Ntfs.sys. IMAGE_VERSION: 10.0.18362.719. STACK_COMMAND: .cxr 0xfffffd8e5f3f6030 ; kb. BUCKET_ID_FUNC_OFFSET: 67. FAILURE_BUCKET_ID: 0x3B_c0000005_Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {643b1572-10af-990e-3668-d5620c6d9754} Followup: MachineOwner. --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: ffffb6467b8d7960, memory referenced. Arg2: 0000000000000002, value 0 = read operation, 1 = write operation. Arg3: fffff80786482140, If non-zero, the instruction address which referenced the bad memory. address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name. KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 3. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 3. Key : Analysis.Memory.CommitPeak.Mb. Value: 76. Key : Analysis.System. Value: CreateObject. DUMP_FILE_ATTRIBUTES: 0x8. Kernel Generated Triage Dump. BUGCHECK_CODE: 50. BUGCHECK_P1: ffffb6467b8d7960. BUGCHECK_P2: 2. BUGCHECK_P3: fffff80786482140. BUGCHECK_P4: 2. READ_ADDRESS: fffff807819733b8: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock. fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. ffffb6467b8d7960. MM_INTERNAL_CODE: 2. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: sppsvc.exe. TRAP_FRAME: fffff60a49496f50 -- (.trap 0xfffff60a49496f50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff807864880e0 rbx=0000000000000000 rcx=0000000000000023. rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000. rip=fffff80786482140 rsp=fffff60a494970e8 rbp=0000000009733c1f. r8=00000000aeee2865 r9=0000000066653d16 r10=00000000061a9eeb. r11=0000000000bad64d r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl nz na pe nc. CI!Gv52a045+0x80: fffff807`86482140 488904c7 mov qword ptr [rdi+rax*8],rax ds:ffffc03c`32440700=???????????????? Resetting default scope. STACK_TEXT: fffff60a`49496ca8 fffff807`815ecf0a : 00000000`00000050 ffffb646`7b8d7960 00000000`00000002 fffff60a`49496f50 : nt!KeBugCheckEx. fffff60a`49496cb0 fffff807`8145875f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffb646`7b8d7960 : nt!MiSystemFault+0x1c5aaa. fffff60a`49496db0 fffff807`815d041e : 00000000`00000000 00000000`00000000 00000000`00000001 ffff9e82`dd5cb7b0 : nt!MmAccessFault+0x34f. fffff60a`49496f50 fffff807`86482140 : fffff807`864846bc fffff60a`49497110 fffff60a`49497250 00000000`00000000 : nt!KiPageFault+0x35e. fffff60a`494970e8 fffff807`864846bc : fffff60a`49497110 fffff60a`49497250 00000000`00000000 e845998b`9733c1f0 : CI!Gv52a045+0x80. fffff60a`494970f0 fffff807`864704b9 : 00000000`00000000 00000000`000027bb 00000000`00000005 00000000`00000000 : CI!Gvb3afc4+0x138. fffff60a`49497450 fffff807`863d903f : c11b999c`187b4d0e 00000000`00000005 00000000`00000000 00000000`000027bb : CI!peauthvbn_StoreParameter+0x3d. fffff60a`494974a0 fffff807`8644523b : 00000000`00000000 00000000`00000000 ffff808e`000112f0 ffff808e`000112f0 : CI!PEAuthStoreParameter+0x5f. fffff60a`494974d0 fffff807`86445504 : 00000000`00001658 fffff60a`494975a9 ffff9e82`dd59bec0 ffff9e82`eb756080 : CI!I_PEUpdatePEHashBucket+0x157. fffff60a`49497510 fffff807`819d1f48 : 00000000`00000000 00000000`00000000 00000000`0000ff00 ffff9e82`e9c4ac80 : CI!I_PEProcessNotify+0x34. fffff60a`49497540 fffff807`81a30308 : ffff9e82`eb756000 ffff9e82`eb756080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x254. fffff60a`49497610 fffff807`81a2662f : ffff9e82`eb753688 00000000`00000000 fffff60a`494977e9 00000000`00000000 : nt!PspExitProcess+0x70. fffff60a`49497640 fffff807`81a23f23 : 00000000`00000000 a76c3505`612fbb01 0000007f`c2b54000 ffffc881`2a240180 : nt!PspExitThread+0x5c7. fffff60a`49497750 fffff807`814a6441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33. fffff60a`49497790 fffff807`815c6920 : ffffc881`2a240101 fffff60a`49497850 00000000`40b7fc89 00000000`00000000 : nt!KiDeliverApc+0x481. fffff60a`49497850 fffff807`815d3cbf : 00000000`00000000 ffff9e82`da87d6c0 ffff9e82`eb753080 0000007f`c2eff578 : nt!KiInitiateUserApc+0x70. fffff60a`49497990 00007ffe`8347cbc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f. 0000007f`c2eff558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8347cbc4. CHKIMG_EXTENSION: !chkimg -lo 50 -d !CI. fffff80786482143 - CI!Gv52a045+83. [ cf:c7 ] 1 error : !CI (fffff80786482143) MODULE_NAME: memory_corruption. IMAGE_NAME: memory_corruption. MEMORY_CORRUPTOR: ONE_BIT. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: memory_corruption. --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000010, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8077724248f, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 2. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 2. Key : Analysis.Memory.CommitPeak.Mb. Value: 80. Key : Analysis.System. Value: CreateObject. DUMP_FILE_ATTRIBUTES: 0x8. Kernel Generated Triage Dump. BUGCHECK_CODE: a. BUGCHECK_P1: 10. BUGCHECK_P2: 2. BUGCHECK_P3: 0. BUGCHECK_P4: fffff8077724248f. READ_ADDRESS: fffff807777733b8: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock. fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. 0000000000000010. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: explorer.exe. TRAP_FRAME: ffff8d8b9331e8d0 -- (.trap 0xffff8d8b9331e8d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8077724248f rsp=ffff8d8b9331ea60 rbp=ffff8d8b9331ead9. r8=00000000000000ab r9=00000000000000ab r10=0000000000000001. r11=ffff8d8b9331eb38 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl nz na po nc. nt!MiInsertPageInFreeOrZeroedList+0x19f: fffff807`7724248f 49034710 add rax,qword ptr [r15+10h] ds:00000000`00000010=???????????????? Resetting default scope. STACK_TEXT: ffff8d8b`9331e788 fffff807`773d41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx. ffff8d8b`9331e790 fffff807`773d0529 : 00000000`00000000 00000000`000000ff fffff807`77668c07 ffffef00`004a1cf0 : nt!KiBugCheckDispatch+0x69. ffff8d8b`9331e8d0 fffff807`7724248f : 00000000`00000000 fffff807`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469. ffff8d8b`9331ea60 fffff807`7723ece2 : 00000000`00018bab ffffef00`004a3028 ffffef00`00000000 ffffa20b`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f. ffff8d8b`9331eb40 fffff807`77269b69 : 00000000`00000010 00000000`00000002 00000000`00000000 fffff807`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372. ffff8d8b`9331ed60 fffff807`7726995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199. ffff8d8b`9331ee40 fffff807`7725dde6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetFreeOrZeroPageAnyColor+0x62. ffff8d8b`9331ee80 fffff807`772b549c : fffff807`7766a440 0a000000`000000aa fffff807`7766a440 ffffef00`00000000 : nt!MiGetPage+0x346. ffff8d8b`9331ef60 fffff807`772b7771 : ffffb789`b9a7c010 ffffb789`c9ce89a0 00000000`00000000 00000000`00000000 : nt!MiMakePageAvoidRead+0x18c. ffff8d8b`9331f130 fffff807`772b6b2b : ffffa20b`18fa4000 00000000`06b09040 ffff8d8b`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x281. ffff8d8b`9331f210 fffff807`772b8905 : ffffb789`c9ce89a0 00000000`06b09040 ffff8d8b`9331f3f0 00000000`00080000 : nt!CcMapAndCopyInToCache+0x5fb. ffff8d8b`9331f390 fffff807`7a6d9136 : ffffc98c`c8ef1840 00000000`00000000 ffffc98c`c8ef1840 ffffc98c`00100000 : nt!CcCopyWriteEx+0x105. ffff8d8b`9331f410 fffff807`78f35f78 : 00000000`00000000 00000000`000002c0 ffffb789`cb20c5d0 00000000`00000000 : Ntfs!NtfsCopyWriteA+0x456. ffff8d8b`9331f720 fffff807`78f32fa3 : ffff8d8b`9331f810 00000000`00000000 00000000`00000000 ffffb789`c9191460 : FLTMGR!FltpPerformFastIoCall+0x198. ffff8d8b`9331f780 fffff807`78f6c5d5 : b789c8cc`56b0f26f 00000000`001f0003 00000000`00000000 ffffb789`cb20c5d0 : FLTMGR!FltpPassThroughFastIo+0xd3. ffff8d8b`9331f7e0 fffff807`778c9708 : ffffb789`cb20c5d0 00000000`0ebec460 00000000`0ebec460 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165. ffff8d8b`9331f890 fffff807`773d3c15 : 00000000`00000000 00000000`0000156c 00000000`00000000 00000000`145231f0 : nt!NtWriteFile+0x458. ffff8d8b`9331f990 00007ffe`2475c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25. 00000000`0ebec3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2475c174. SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+19f. MODULE_NAME: nt. IMAGE_VERSION: 10.0.18362.959. STACK_COMMAND: .thread ; .cxr ; kb. IMAGE_NAME: memory_corruption. BUCKET_ID_FUNC_OFFSET: 19f. FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a} Followup: MachineOwner. --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of. the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff9bffcac1590. Arg3: 0200000000000000. Arg4: 0000000000000000. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.Sec. Value: 2. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-VFOM7MS. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.Sec. Value: 2. Key : Analysis.Memory.CommitPeak.Mb. Value: 75. Key : Analysis.System. Value: CreateObject. DUMP_FILE_ATTRIBUTES: 0x8. Kernel Generated Triage Dump. BUGCHECK_CODE: 1a. BUGCHECK_P1: 41792. BUGCHECK_P2: fffff9bffcac1590. BUGCHECK_P3: 200000000000000. BUGCHECK_P4: 0. MEMORY_CORRUPTOR: ONE_BIT. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: chrome.exe. STACK_TEXT: fffffd89`24bb9a68 fffff806`5460f55a : 00000000`0000001a 00000000`00041792 fffff9bf`fcac1590 02000000`00000000 : nt!KeBugCheckEx. fffffd89`24bb9a70 fffff806`544732b7 : 00000000`00000000 fffff9bf`fcac1590 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a4aa. fffffd89`24bb9b80 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`dffe5608 00000000`00000000 0a000002`549a2867 : nt!MiWalkPageTablesRecursively+0x1e7. fffffd89`24bb9c40 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe6fff28 00000000`00000000 0a000002`544de867 : nt!MiWalkPageTablesRecursively+0x6a1. fffffd89`24bb9d00 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe7f37f8 fffff9fc`00000000 8a000002`54578867 : nt!MiWalkPageTablesRecursively+0x6a1. fffffd89`24bb9dc0 fffff806`54472efc : fffffd89`24bb9fd0 fffff9fc`fe7f3f98 fffffd89`00000000 fffffd89`24bb9f49 : nt!MiWalkPageTablesRecursively+0x6a1. fffffd89`24bb9e80 fffff806`54471368 : fffffd89`24bb9fd0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c. fffffd89`24bb9f80 fffff806`5447f4c0 : ffffffff`ffffffff ffff8306`c73443f8 fffffd89`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268. fffffd89`24bba320 fffff806`549ce76d : ffff8306`c7839080 ffff8306`c7839080 ffff8306`c7038da0 ffff8306`c73443f0 : nt!MiDeleteVad+0x860. fffffd89`24bba4e0 fffff806`549dd4a0 : ffff8306`c7038da0 ffff8306`c470ed60 ffff8306`c7839080 00000000`00000000 : nt!MiUnmapVad+0x49. fffffd89`24bba510 fffff806`549dca0f : ffff8306`c8abcca0 ffff8306`c8abcca0 ffff8306`c7344080 fffff806`5486a440 : nt!MiCleanVad+0x30. fffffd89`24bba540 fffff806`54a6d6b9 : ffffffff`00000000 ffffffff`ffffffff fffffd89`24bba701 ffff8306`c7344080 : nt!MmCleanProcessAddressSpace+0x137. fffffd89`24bba5c0 fffff806`54a26673 : ffff8306`c7344080 ffffdb85`0ed9c060 fffffd89`24bba7e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139. fffffd89`24bba640 fffff806`54a23f23 : ffff8306`00000000 00000000`00000001 00000050`8e7ba000 00000050`90fff920 : nt!PspExitThread+0x60b. fffffd89`24bba750 fffff806`544a6441 : fffffd89`24bba940 00000050`90fff868 fffffd89`24bba968 fffff806`544a7000 : nt!KiSchedulerApcTerminate+0x33. fffffd89`24bba790 fffff806`545c6920 : 00000050`90fff901 fffffd89`24bba850 00000000`000001f8 fffffd89`00000000 : nt!KiDeliverApc+0x481. fffffd89`24bba850 fffff806`545d3cbf : ffff8306`c7839080 00000050`90fff848 fffffd89`24bba9a8 ffffdb85`0f114c40 : nt!KiInitiateUserApc+0x70. fffffd89`24bba990 00007ff9`95efc194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f. 00000050`90fff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`95efc194. SYMBOL_NAME: ONE_BIT. MODULE_NAME: hardware. IMAGE_NAME: memory_corruption. STACK_COMMAND: .thread ; .cxr ; kb. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner. ---------
RAM arızası gibi duruyor, Memtest86 ile bellek testi yapın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net