Gigabyte H55M D2H sistemde mavi ekran

Bahadir Ylcnky

Picopat
Katılım
12 Kasım 2020
Mesajlar
1
Daha fazla  
Cinsiyet
Erkek
Sık sık mavi ekran ve donma hatası yemeye başladım ve nedenini bilmiyorum.
Sistem özelliklerim ve hata kodu;
İşlemci: i3 540.
Anakart: Gigabyte H55M D2H.
RAM: 4+2 6 GB 1333MHz RAM.

 
Belleklerde hata görüyorum, test yapın.

Kod:
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
    hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000003e3b, Incorrect checksum
Arg4: 000000000000a12b, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3601

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: 3e3b

BUGCHECK_P4: a12b

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffff940c`28fe9778 fffff802`51da51d6     : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00003e3b : nt!KeBugCheckEx
ffff940c`28fe9780 fffff802`51dad1b4     : 00000000`00000001 ffffd889`096425f0 00000001`5c595000 ffffd889`15795000 : nt!PopHiberChecksumHiberFileData+0xac16
ffff940c`28fe97e0 fffff802`51da46d1     : 00000000`8578e000 ffffc881`a4091220 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x78
ffff940c`28fe9850 fffff802`51d98fde     : 000068dc`35211688 ffffc881`a4091220 00000000`00000000 fffff802`522b68f8 : nt!PopRestoreHiberContext+0xb351
ffff940c`28fe98e0 fffff802`51d98d26     : fffff802`51c68050 ffff940c`28fe9a60 fffff802`51c68050 ffffd889`096425f0 : nt!PopHandleNextState+0x20e
ffff940c`28fe9930 fffff802`51d98a9b     : 00000000`00000100 00000000`00989680 ffffd889`096425f0 ffffd889`096425f0 : nt!PopIssueNextState+0x1a
ffff940c`28fe9960 fffff802`51d9932c     : 00000000`0000000c fffff680`000077c0 00000000`00000000 fffff802`518d13c4 : nt!PopInvokeSystemStateHandler+0x35b
ffff940c`28fe9b60 fffff802`51d9c167     : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffff940c`28fe9c20 fffff802`51d9bd45     : 00000000`00000000 00000000`00000000 00000065`00000001 00000000`00000001 : nt!MmDuplicateMemory+0x3cb
ffff940c`28fe9cc0 fffff802`51931a85     : ffffd889`0ea9a000 ffffd889`0ea9a040 fffff802`51d9bc20 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffff940c`28fe9d50 fffff802`519ca2e8     : fffff802`4f422180 ffffd889`0ea9a040 fffff802`51931a30 00700002`000003f6 : nt!PspSystemThreadStartup+0x55
ffff940c`28fe9da0 00000000`00000000     : ffff940c`28fea000 ffff940c`28fe4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PopHiberChecksumHiberFileData+ac16

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ac16

FAILURE_BUCKET_ID:  0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffabffc8cd028
Arg3: 0001000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8272

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffffabffc8cd028

BUGCHECK_P3: 1000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffffc105`fab5b038 fffff800`04ff7b76     : 00000000`0000001a 00000000`00041792 fffffabf`fc8cd028 00010000`00000000 : nt!KeBugCheckEx
ffffc105`fab5b040 fffff800`04e3ea17     : ffff8c0f`d5058580 fffffabf`fc8cd028 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1b7366
ffffc105`fab5b150 fffff800`04e3eed1     : ffffc105`fab5b5a0 fffffafd`5ffe4668 00000000`00000000 0a000001`21ffe867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffc105`fab5b210 fffff800`04e3eed1     : ffffc105`fab5b5a0 fffffafd`7eafff20 00000000`00000000 0a000000`6d4ed867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b2d0 fffff800`04e3eed1     : ffffc105`fab5b5a0 fffffafd`7ebf57f8 fffffafd`00000000 8a000000`969ce867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b390 fffff800`04e3e65c     : ffffc105`fab5b5a0 00000000`00000000 00000000`00000000 fffff800`04f04946 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc105`fab5b450 fffff800`04ee5b78     : ffffc105`fab5b5a0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffc105`fab5b550 fffff800`04e4ac20     : ffffffff`ffffffff ffff8c0f`d50583f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffc105`fab5b8f0 fffff800`0546b0ad     : ffff8c0f`d1a57160 00000000`01bb3000 ffff8c0f`d6222560 00000000`00000000 : nt!MiDeleteVad+0x860
ffffc105`fab5bab0 fffff800`0546aea3     : ffff8c0f`d6222560 00007ff9`190f0000 ffff8c0f`d2eb1820 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc105`fab5bae0 fffff800`0546ad39     : ffff8c0f`d5058080 fffff800`00000008 ffff8c0f`ccaa0c40 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffc105`fab5bbc0 fffff800`0546aa2c     : ffff8c0f`d60ea080 000001f7`da561fa0 000001f7`da561fa0 ffff8c0f`d5058080 : nt!NtUnmapViewOfSectionEx+0x99
ffffc105`fab5bc10 fffff800`04fd4558     : ffff8c0f`d60ea080 000000af`00000000 00007ff9`3337c8a0 000001f7`d8010028 : nt!NtUnmapViewOfSection+0xc
ffffc105`fab5bc40 00007ff9`3db3c604     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000af`85dfdc08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`3db3c604


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffe600ffc27028
Arg3: 0001000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5937

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7864

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffe600ffc27028

BUGCHECK_P3: 1000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffffe38d`27a14038 fffff807`223f7b76     : 00000000`0000001a 00000000`00041792 ffffe600`ffc27028 00010000`00000000 : nt!KeBugCheckEx
ffffe38d`27a14040 fffff807`2223ea17     : ffffbe02`cd69f580 ffffe600`ffc27028 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1b7366
ffffe38d`27a14150 fffff807`2223eed1     : ffffe38d`27a145a0 ffffe673`007fe138 00000000`00000000 0a000001`2cc3e867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffe38d`27a14210 fffff807`2223eed1     : ffffe38d`27a145a0 ffffe673`39803ff0 00000000`00000000 0a000000`847bd867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a142d0 fffff807`2223eed1     : ffffe38d`27a145a0 ffffe673`399cc018 ffffe673`00000000 0a000000`1a9bc867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a14390 fffff807`2223e65c     : ffffe38d`27a145a0 000001ff`84e01000 ffff9500`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe38d`27a14450 fffff807`222e5b78     : ffffe38d`27a145a0 ffffbe02`00000002 00000000`00000001 90000001`00000000 : nt!MiWalkPageTables+0x36c
ffffe38d`27a14550 fffff807`2224ac20     : ffffffff`ffffffff ffffbe02`cd69f3f8 ffffbe02`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffe38d`27a148f0 fffff807`2286b0ad     : 00000000`00000000 ffffbe02`cbe50950 ffffbe02`cbe50950 00000000`00000000 : nt!MiDeleteVad+0x860
ffffe38d`27a14ab0 fffff807`2286aea3     : ffffbe02`d087f3a0 00000000`00000000 000001ff`84e00000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe38d`27a14ae0 fffff807`2286ad39     : ffffbe02`cd69f080 00000000`00000008 ffffbe02`c607b980 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffffe38d`27a14bc0 fffff807`2286aa2c     : ffffbe02`cdd76080 00000069`8957f330 00000069`8957f1b0 ffffbe02`cd69f080 : nt!NtUnmapViewOfSectionEx+0x99
ffffe38d`27a14c10 fffff807`223d4558     : ffffbe02`00000000 00000069`00000001 00000000`00133000 ffffe38d`27a14cc0 : nt!NtUnmapViewOfSection+0xc
ffffe38d`27a14c40 00007ff8`bb69c604     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000069`8957eeb8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`bb69c604


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
    hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000009a77, Incorrect checksum
Arg4: 000000000000436c, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5703

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6516

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x9
  Hiber Crash Dump
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: 9a77

BUGCHECK_P4: 436c

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffff9a00`268ed418 fffff804`54fa3cb2     : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00009a77 : nt!KeBugCheckEx
ffff9a00`268ed420 fffff804`54fad194     : 00000000`00000001 ffffe408`7ea3e050 00000000`00000002 ffffe408`8ae05000 : nt!PopHiberChecksumHiberFileData+0xd3a2
ffff9a00`268ed480 fffff804`54facb66     : ffffd103`8c0910f0 ffffd103`8c091220 ffff9a00`268ed580 fffff804`523624bc : nt!PopRequestRead+0x78
ffff9a00`268ed4f0 fffff804`54b640d4     : 00000000`00000002 ffffe408`85fcaa60 fffff804`523624b0 fffff804`54acc808 : nt!PopDecompressCallback+0x16
ffff9a00`268ed520 fffff804`54d179ab     : ffffe408`8ae4bc13 00000000`00000090 ffffe408`8ae45000 ffffae00`75c00000 : nt!RtlpMakeXpressCallback+0x24
ffff9a00`268ed550 fffff804`54d177e4     : ffffae00`75c00000 ffff9a00`268ed730 00000000`00010000 00007d47`f52bb241 : nt!RtlDecompressBufferXpressHuffProgress+0x1b3
ffff9a00`268ed5d0 fffff804`54fa4f39     : 00000000`00000001 ffff9a00`268ed730 00000000`00000000 00000000`00010000 : nt!RtlDecompressBufferProgress+0xac
ffff9a00`268ed630 fffff804`54fa3eca     : 00000000`7d66e000 ffffd103`8c091220 00000000`00000001 00000000`00000001 : nt!PopDecompressHiberBlocks+0xb715
ffff9a00`268ed850 fffff804`54f983fe     : 00007d46`792b87a9 ffffd103`8c091220 00000000`00000000 fffff804`554b68f8 : nt!PopRestoreHiberContext+0xd18a
ffff9a00`268ed8e0 fffff804`54f9814a     : fffff804`54e67f10 ffff9a00`268eda60 fffff804`54e67f10 ffffe408`7ea3e050 : nt!PopHandleNextState+0x20e
ffff9a00`268ed930 fffff804`54f97ebf     : 00000000`00000100 00000000`00989680 ffffe408`7ea3e050 ffffe408`7ea3e050 : nt!PopIssueNextState+0x1a
ffff9a00`268ed960 fffff804`54f96cec     : 00000000`0000000c ffff9700`000077c0 00000000`00000000 fffff804`54abffa4 : nt!PopInvokeSystemStateHandler+0x35b
ffff9a00`268edb60 fffff804`54f9d7b7     : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffff9a00`268edc20 fffff804`54f9d395     : 00000000`00000000 00000000`00000000 00000065`00000001 00000000`00000001 : nt!MmDuplicateMemory+0x3cb
ffff9a00`268edcc0 fffff804`54b1e235     : ffffe408`8188b000 ffffe408`8188b080 fffff804`54f9d270 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffff9a00`268edd50 fffff804`54bc9f98     : ffffae00`731a9180 ffffe408`8188b080 fffff804`54b1e1e0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff9a00`268edda0 00000000`00000000     : ffff9a00`268ee000 ffff9a00`268e8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PopHiberChecksumHiberFileData+d3a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d3a2

FAILURE_BUCKET_ID:  0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff9500038b1ca0
Arg3: 00000000000000fa
Arg4: 00000000000000fb

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9958

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff9500038b1ca0

BUGCHECK_P3: fa

BUGCHECK_P4: fb

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffff686`e1355e88 fffff805`581f7e2a     : 00000000`0000001a 00000000`00041790 ffff9500`038b1ca0 00000000`000000fa : nt!KeBugCheckEx
fffff686`e1355e90 fffff805`58077c07     : 00000000`00000003 fffff686`e13565e0 fffff686`e13565e0 fffff686`e1356530 : nt!MiDeletePteRun+0x1b8dca
fffff686`e13560b0 fffff805`58073722     : ffffd403`69e54580 ffffef01`0147c7e0 00000000`00000000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffff686`e13560e0 fffff805`580738b1     : fffff686`e1356530 ffffef77`8080a3e0 00000000`00000000 0a000001`2e5ee867 : nt!MiWalkPageTablesRecursively+0x512
fffff686`e13561a0 fffff805`580738b1     : fffff686`e1356530 ffffef77`bbc04050 00000000`00000000 0a000000`dceff867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e1356260 fffff805`580738b1     : fffff686`e1356530 ffffef77`bbdde020 ffffef77`00000000 8a000000`62afe867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e1356320 fffff805`5807303c     : fffff686`e1356530 fffff805`00000000 ffff03d5`00000000 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x6a1
fffff686`e13563e0 fffff805`580714a8     : fffff686`e1356530 ffff9500`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff686`e13564e0 fffff805`5807f600     : ffffffff`ffffffff ffffd403`69e543f8 00000202`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff686`e1356880 fffff805`580c50aa     : 00000000`2028f8fb ffffd403`6b6d2080 00000000`00000000 fffff805`5807a5da : nt!MiDeleteVad+0x860
fffff686`e1356a40 fffff805`585e7ce0     : 00000000`00000000 00000000`00000000 fffff686`e1356ba0 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff686`e1356aa0 fffff805`585e791b     : 00000000`00000000 000000ad`1b7fca68 ffff03d5`b100a0ab 000000ad`00000004 : nt!MmFreeVirtualMemory+0x390
fffff686`e1356be0 fffff805`581d4258     : ffffd403`6b6d2080 fffff686`00000001 00000000`00000002 fffff686`e1356cc0 : nt!NtFreeVirtualMemory+0x8b
fffff686`e1356c40 00007ffc`667fc434     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ad`1b7fdb38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`667fc434


SYMBOL_NAME:  nt!MiDeletePteRun+1b8dca

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1b8dca

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup:     MachineOwner
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…