Gigabyte H55M D2H sistemde mavi ekran

Belleklerde hata görüyorum, test yapın.

Kod:
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
    hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000003e3b, Incorrect checksum
Arg4: 000000000000a12b, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3601

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: 3e3b

BUGCHECK_P4: a12b

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffff940c`28fe9778 fffff802`51da51d6     : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00003e3b : nt!KeBugCheckEx
ffff940c`28fe9780 fffff802`51dad1b4     : 00000000`00000001 ffffd889`096425f0 00000001`5c595000 ffffd889`15795000 : nt!PopHiberChecksumHiberFileData+0xac16
ffff940c`28fe97e0 fffff802`51da46d1     : 00000000`8578e000 ffffc881`a4091220 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x78
ffff940c`28fe9850 fffff802`51d98fde     : 000068dc`35211688 ffffc881`a4091220 00000000`00000000 fffff802`522b68f8 : nt!PopRestoreHiberContext+0xb351
ffff940c`28fe98e0 fffff802`51d98d26     : fffff802`51c68050 ffff940c`28fe9a60 fffff802`51c68050 ffffd889`096425f0 : nt!PopHandleNextState+0x20e
ffff940c`28fe9930 fffff802`51d98a9b     : 00000000`00000100 00000000`00989680 ffffd889`096425f0 ffffd889`096425f0 : nt!PopIssueNextState+0x1a
ffff940c`28fe9960 fffff802`51d9932c     : 00000000`0000000c fffff680`000077c0 00000000`00000000 fffff802`518d13c4 : nt!PopInvokeSystemStateHandler+0x35b
ffff940c`28fe9b60 fffff802`51d9c167     : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffff940c`28fe9c20 fffff802`51d9bd45     : 00000000`00000000 00000000`00000000 00000065`00000001 00000000`00000001 : nt!MmDuplicateMemory+0x3cb
ffff940c`28fe9cc0 fffff802`51931a85     : ffffd889`0ea9a000 ffffd889`0ea9a040 fffff802`51d9bc20 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffff940c`28fe9d50 fffff802`519ca2e8     : fffff802`4f422180 ffffd889`0ea9a040 fffff802`51931a30 00700002`000003f6 : nt!PspSystemThreadStartup+0x55
ffff940c`28fe9da0 00000000`00000000     : ffff940c`28fea000 ffff940c`28fe4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PopHiberChecksumHiberFileData+ac16

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ac16

FAILURE_BUCKET_ID:  0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffabffc8cd028
Arg3: 0001000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8272

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffffabffc8cd028

BUGCHECK_P3: 1000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffffc105`fab5b038 fffff800`04ff7b76     : 00000000`0000001a 00000000`00041792 fffffabf`fc8cd028 00010000`00000000 : nt!KeBugCheckEx
ffffc105`fab5b040 fffff800`04e3ea17     : ffff8c0f`d5058580 fffffabf`fc8cd028 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1b7366
ffffc105`fab5b150 fffff800`04e3eed1     : ffffc105`fab5b5a0 fffffafd`5ffe4668 00000000`00000000 0a000001`21ffe867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffc105`fab5b210 fffff800`04e3eed1     : ffffc105`fab5b5a0 fffffafd`7eafff20 00000000`00000000 0a000000`6d4ed867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b2d0 fffff800`04e3eed1     : ffffc105`fab5b5a0 fffffafd`7ebf57f8 fffffafd`00000000 8a000000`969ce867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b390 fffff800`04e3e65c     : ffffc105`fab5b5a0 00000000`00000000 00000000`00000000 fffff800`04f04946 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b450 fffff800`04ee5b78     : ffffc105`fab5b5a0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffc105`fab5b550 fffff800`04e4ac20     : ffffffff`ffffffff ffff8c0f`d50583f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffc105`fab5b8f0 fffff800`0546b0ad     : ffff8c0f`d1a57160 00000000`01bb3000 ffff8c0f`d6222560 00000000`00000000 : nt!MiDeleteVad+0x860
ffffc105`fab5bab0 fffff800`0546aea3     : ffff8c0f`d6222560 00007ff9`190f0000 ffff8c0f`d2eb1820 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc105`fab5bae0 fffff800`0546ad39     : ffff8c0f`d5058080 fffff800`00000008 ffff8c0f`ccaa0c40 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffc105`fab5bbc0 fffff800`0546aa2c     : ffff8c0f`d60ea080 000001f7`da561fa0 000001f7`da561fa0 ffff8c0f`d5058080 : nt!NtUnmapViewOfSectionEx+0x99
ffffc105`fab5bc10 fffff800`04fd4558     : ffff8c0f`d60ea080 000000af`00000000 00007ff9`3337c8a0 000001f7`d8010028 : nt!NtUnmapViewOfSection+0xc
ffffc105`fab5bc40 00007ff9`3db3c604     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000af`85dfdc08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3db3c604


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffe600ffc27028
Arg3: 0001000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5937

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7864

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffe600ffc27028

BUGCHECK_P3: 1000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffffe38d`27a14038 fffff807`223f7b76     : 00000000`0000001a 00000000`00041792 ffffe600`ffc27028 00010000`00000000 : nt!KeBugCheckEx
ffffe38d`27a14040 fffff807`2223ea17     : ffffbe02`cd69f580 ffffe600`ffc27028 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1b7366
ffffe38d`27a14150 fffff807`2223eed1     : ffffe38d`27a145a0 ffffe673`007fe138 00000000`00000000 0a000001`2cc3e867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffe38d`27a14210 fffff807`2223eed1     : ffffe38d`27a145a0 ffffe673`39803ff0 00000000`00000000 0a000000`847bd867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a142d0 fffff807`2223eed1     : ffffe38d`27a145a0 ffffe673`399cc018 ffffe673`00000000 0a000000`1a9bc867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a14390 fffff807`2223e65c     : ffffe38d`27a145a0 000001ff`84e01000 ffff9500`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a14450 fffff807`222e5b78     : ffffe38d`27a145a0 ffffbe02`00000002 00000000`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c
ffffe38d`27a14550 fffff807`2224ac20     : ffffffff`ffffffff ffffbe02`cd69f3f8 ffffbe02`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffe38d`27a148f0 fffff807`2286b0ad     : 00000000`00000000 ffffbe02`cbe50950 ffffbe02`cbe50950 00000000`00000000 : nt!MiDeleteVad+0x860
ffffe38d`27a14ab0 fffff807`2286aea3     : ffffbe02`d087f3a0 00000000`00000000 000001ff`84e00000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe38d`27a14ae0 fffff807`2286ad39     : ffffbe02`cd69f080 00000000`00000008 ffffbe02`c607b980 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffe38d`27a14bc0 fffff807`2286aa2c     : ffffbe02`cdd76080 00000069`8957f330 00000069`8957f1b0 ffffbe02`cd69f080 : nt!NtUnmapViewOfSectionEx+0x99
ffffe38d`27a14c10 fffff807`223d4558     : ffffbe02`00000000 00000069`00000001 00000000`00133000 ffffe38d`27a14cc0 : nt!NtUnmapViewOfSection+0xc
ffffe38d`27a14c40 00007ff8`bb69c604     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000069`8957eeb8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`bb69c604


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
    hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000009a77, Incorrect checksum
Arg4: 000000000000436c, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5703

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6516

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: 9a77

BUGCHECK_P4: 436c

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffff9a00`268ed418 fffff804`54fa3cb2     : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00009a77 : nt!KeBugCheckEx
ffff9a00`268ed420 fffff804`54fad194     : 00000000`00000001 ffffe408`7ea3e050 00000000`00000002 ffffe408`8ae05000 : nt!PopHiberChecksumHiberFileData+0xd3a2
ffff9a00`268ed480 fffff804`54facb66     : ffffd103`8c0910f0 ffffd103`8c091220 ffff9a00`268ed580 fffff804`523624bc : nt!PopRequestRead+0x78
ffff9a00`268ed4f0 fffff804`54b640d4     : 00000000`00000002 ffffe408`85fcaa60 fffff804`523624b0 fffff804`54acc808 : nt!PopDecompressCallback+0x16
ffff9a00`268ed520 fffff804`54d179ab     : ffffe408`8ae4bc13 00000000`00000090 ffffe408`8ae45000 ffffae00`75c00000 : nt!RtlpMakeXpressCallback+0x24
ffff9a00`268ed550 fffff804`54d177e4     : ffffae00`75c00000 ffff9a00`268ed730 00000000`00010000 00007d47`f52bb241 : nt!RtlDecompressBufferXpressHuffProgress+0x1b3
ffff9a00`268ed5d0 fffff804`54fa4f39     : 00000000`00000001 ffff9a00`268ed730 00000000`00000000 00000000`00010000 : nt!RtlDecompressBufferProgress+0xac
ffff9a00`268ed630 fffff804`54fa3eca     : 00000000`7d66e000 ffffd103`8c091220 00000000`00000001 00000000`00000001 : nt!PopDecompressHiberBlocks+0xb715
ffff9a00`268ed850 fffff804`54f983fe     : 00007d46`792b87a9 ffffd103`8c091220 00000000`00000000 fffff804`554b68f8 : nt!PopRestoreHiberContext+0xd18a
ffff9a00`268ed8e0 fffff804`54f9814a     : fffff804`54e67f10 ffff9a00`268eda60 fffff804`54e67f10 ffffe408`7ea3e050 : nt!PopHandleNextState+0x20e
ffff9a00`268ed930 fffff804`54f97ebf     : 00000000`00000100 00000000`00989680 ffffe408`7ea3e050 ffffe408`7ea3e050 : nt!PopIssueNextState+0x1a
ffff9a00`268ed960 fffff804`54f96cec     : 00000000`0000000c ffff9700`000077c0 00000000`00000000 fffff804`54abffa4 : nt!PopInvokeSystemStateHandler+0x35b
ffff9a00`268edb60 fffff804`54f9d7b7     : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffff9a00`268edc20 fffff804`54f9d395     : 00000000`00000000 00000000`00000000 00000065`00000001 00000000`00000001 : nt!MmDuplicateMemory+0x3cb
ffff9a00`268edcc0 fffff804`54b1e235     : ffffe408`8188b000 ffffe408`8188b080 fffff804`54f9d270 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffff9a00`268edd50 fffff804`54bc9f98     : ffffae00`731a9180 ffffe408`8188b080 fffff804`54b1e1e0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff9a00`268edda0 00000000`00000000     : ffff9a00`268ee000 ffff9a00`268e8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PopHiberChecksumHiberFileData+d3a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d3a2

FAILURE_BUCKET_ID:  0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff9500038b1ca0
Arg3: 00000000000000fa
Arg4: 00000000000000fb

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9958

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff9500038b1ca0

BUGCHECK_P3: fa

BUGCHECK_P4: fb

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffff686`e1355e88 fffff805`581f7e2a     : 00000000`0000001a 00000000`00041790 ffff9500`038b1ca0 00000000`000000fa : nt!KeBugCheckEx
fffff686`e1355e90 fffff805`58077c07     : 00000000`00000003 fffff686`e13565e0 fffff686`e13565e0 fffff686`e1356530 : nt!MiDeletePteRun+0x1b8dca
fffff686`e13560b0 fffff805`58073722     : ffffd403`69e54580 ffffef01`0147c7e0 00000000`00000000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffff686`e13560e0 fffff805`580738b1     : fffff686`e1356530 ffffef77`8080a3e0 00000000`00000000 0a000001`2e5ee867 : nt!MiWalkPageTablesRecursively+0x512
fffff686`e13561a0 fffff805`580738b1     : fffff686`e1356530 ffffef77`bbc04050 00000000`00000000 0a000000`dceff867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e1356260 fffff805`580738b1     : fffff686`e1356530 ffffef77`bbdde020 ffffef77`00000000 8a000000`62afe867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e1356320 fffff805`5807303c     : fffff686`e1356530 fffff805`00000000 ffff03d5`00000000 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e13563e0 fffff805`580714a8     : fffff686`e1356530 ffff9500`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff686`e13564e0 fffff805`5807f600     : ffffffff`ffffffff ffffd403`69e543f8 00000202`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff686`e1356880 fffff805`580c50aa     : 00000000`2028f8fb ffffd403`6b6d2080 00000000`00000000 fffff805`5807a5da : nt!MiDeleteVad+0x860
fffff686`e1356a40 fffff805`585e7ce0     : 00000000`00000000 00000000`00000000 fffff686`e1356ba0 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff686`e1356aa0 fffff805`585e791b     : 00000000`00000000 000000ad`1b7fca68 ffff03d5`b100a0ab 000000ad`00000004 : nt!MmFreeVirtualMemory+0x390
fffff686`e1356be0 fffff805`581d4258     : ffffd403`6b6d2080 fffff686`00000001 00000000`00000002 fffff686`e1356cc0 : nt!NtFreeVirtualMemory+0x8b
fffff686`e1356c40 00007ffc`667fc434     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ad`1b7fdb38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`667fc434


SYMBOL_NAME:  nt!MiDeletePteRun+1b8dca

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1b8dca

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı