Hakan Turan
Hectopat
Daha fazla
- Cinsiyet
- Erkek
- Meslek
- Öğrenci
Merhabalar. Sistemim genelde sorun çıkarmaz fakat geçen gün boşta beklerken mavi ekran verip restart attı. Ben de dump dosyasında 4 adet hata dosyası buldum geçmiştekilerle birlikte. Konu hakkında fazla bilgim olmadığı için yardımlarınızı bekliyorum.
Not: sistemim uzatma prizleri üzerinde çalışmakta, belki bu da sorun yaratıyor olabilir belirtmek istedim.
Sistem özelliklerim: MSI B450 Tomahawk Max, Ryzen 1600 AF, GeIL EVO X II 16 GB 3200MHz çift modül RAM, Sapphire Pulse 8 GB RX570, 120 GB M.2 SSD, 120 GB SATA SSD, 1TB HDD, 650W 80+ ın-Win PSU, 2 adet PWM 1 adet normal fan.
Hata 1:
Eklemeyi unutmuşum, USB Wi-Fi kartı ve USB ses kartı kullanıyorum bu sistemde.
Not: sistemim uzatma prizleri üzerinde çalışmakta, belki bu da sorun yaratıyor olabilir belirtmek istedim.
Sistem özelliklerim: MSI B450 Tomahawk Max, Ryzen 1600 AF, GeIL EVO X II 16 GB 3200MHz çift modül RAM, Sapphire Pulse 8 GB RX570, 120 GB M.2 SSD, 120 GB SATA SSD, 1TB HDD, 650W 80+ ın-Win PSU, 2 adet PWM 1 adet normal fan.
Hata 1:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\072321-12250-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff804`78c00000 psloadedmodulelist = 0xfffff804`7982a1d0
Debug session time: Fri jul 23 23:02:38.498 2021 (utc + 3:00)
System uptime: 4 days 21:45:29.189
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff804'78ff6F20 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffc89'7E3392A0 = 000000000000003B.
6: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, the subtype of the bugcheck.
Arg2: 0000016F005F2D18.
Arg3: 000000000000000F.
Arg4: Ffff8E02A9A37B00.
Debugging details:
------------------
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 3749.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 50378.
Key: Analysis. Init. CPU. Msec.
Value: 733.
Key: Analysis. Init. Elapsed. Msec.
Value: 60820.
Key: Analysis. Memory.commitpeak. MB.
Value: 77.
Key: Wer. OS. Branch.
Value: Vb_release.
Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z
Key: Wer. OS. Version.
Value: 10.0.19041.1
Bugcheck_code: 1A.
Bugcheck_p1: 61941.
Bugcheck_p2: 16F005F2D18.
Bugcheck_p3: F
Bugcheck_p4: Ffff8E02A9A37B00.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: svchost.exe
Stack_text:
Ffff8e02'a9a37958 fffff802'51C87C62: 00000000'0000001A 00000000'00061941 0000016F'005F2D18 00000000'0000000F: NT! Kebugcheckex.
Ffff8e02'a9a37960 fffff802'51C04D5e: Ffffc10b'b7F80000 ffffc10b'C0475A80 0000016F'7af59b20 ffffc10b'00002D84: NT! Mmaccessfault+0x15FE52
Ffff8e02'a9a37b00 00007FFE'6183E37B: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kipagefault+0x35e
00000045'e8C7e128 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffe`6183e37b
Module_name: Hardware.
Image_name: Hardware_ram.
Stack_command: Thread. Cxr; KB.
Faılure_bucket_ıd: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
Os_versıon: 10.0.19041.1
Buıldlab_str: Vb_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {C6E5C6CF-692e-7852-5DC5-B74944540fc0}
Followup: Machineowner.
---------
Hata 2:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\072321-12250-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff804`78c00000 psloadedmodulelist = 0xfffff804`7982a1d0
Debug session time: Fri jul 23 23:02:38.498 2021 (utc + 3:00)
System uptime: 4 days 21:45:29.189
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff804'78ff6F20 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffc89'7E3392A0 = 000000000000003B.
6: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000005, exception code that caused the bugcheck.
Arg2: FffFF804791F665b, address of the instruction which caused the bugcheck.
Arg3: FfffFC897E339ba0, address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Zero.
Debugging details:
------------------
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 4468.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 28399.
Key: Analysis. Init. CPU. Msec.
Value: 405.
Key: Analysis. Init. Elapsed. Msec.
Value: 4616.
Key: Analysis. Memory.commitpeak. MB.
Value: 83.
Key: Wer. OS. Branch.
Value: Vb_release.
Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z
Key: Wer. OS. Version.
Value: 10.0.19041.1
Bugcheck_code: 3B.
Bugcheck_p1: C0000005.
Bugcheck_p2: FffFF804791F665b.
Bugcheck_p3: FfffFC897E339ba0.
Bugcheck_p4: 0
Context: FfffFC897E339ba0 -- (.cxr 0xfffffc897e339ba0)
Rax = 0000000000000000 rbx = 0000000000000000 rcx = fffFE18F539C5080.
Rdx = ffffce0A1419FD00 rsi = 00000000001F0003 rdi = ffffce0A1419FD00.
Rip = fffFF804791F665b rsp = ffffFC897E33a5a0 rbp = ffffFC897E33a6C0.
R8 = ffffFC897E33a5b0 R9 = 0000000000000000 R10 = 7ffffffffffffffc.
R11 = 0000000000000070 R12 = 0000000000000000 R13 = fffFE18F539C5080.
R14 = 0000000000000000 R15 = 0000000000000006.
İopl = 0 nv up ei pl nzna po nc.
CS = 0010 SS = 0018 DS = 002b es = 002b fs = 0053 GS = 002b efl = 00050206.
NT! Obpcreatehandle+0x3fb:
Fffff804'791F665b 488B4608 mov rax, qword ptr [rsi+8] DS:002b:00000000'001F000b=?
Resetting default scope.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: svchost.exe
Stack_text:
Fffffc89'7E33A5A0 fffff804'79279EED: Ffffe18F'4A010340 ffffe18F'4A012900 ffffe18F'4A017F00 ffffce0a'00000080: NT! Obpcreatehandle+0x3fb
Fffffc89'7E33A790 fffff804'792790F1: 00000000'00000001 fffffc89'7E33AB80 00000000'00000001 00000000'00000001: NT! Obınsertobjectex+0x13D
Fffffc89'7E33AA20 fffff804'790088B8: Ffffe18F'539C5080 00000007'3bb9de58 fffffc89'7E33AAA8 00000000'00000000: NT! Ntcreateevent+0Xe1
Fffffc89'7E33AA90 00007FFD'E20ed724: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000007'3bb9de38 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffd`e20ed724
Symbol_name: NT! Obpcreatehandle+3fb
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.19041.1110
Stack_command: Cxr 0xfffffc897e339ba0; KB.
Bucket_ıd_func_offset: 3fb.
Faılure_bucket_ıd: 0x3B_c0000005_nt!ObpCreateHandle
Os_versıon: 10.0.19041.1
Buıldlab_str: Vb_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {DCD9630C-1938-35EA-221a-7B842C7Aa859}
Followup: Machineowner.
---------
Hata 3:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\060621-41265-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff805`68200000 psloadedmodulelist = 0xfffff805`68e2a1b0
Debug session time: Sun jun 6 09:31:07.383 2021 (utc + 3:00)
System uptime: 4 days 0:31:06.328
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff805'685F6CF0 48894C2408 mov qword ptr [rsp+8],rcx SS: Ffff9608'5bee4200 = 000000000000012B.
9: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a Single bit error was found in this page. This is a hardware Memory error.
Arguments:
Arg1: FffffffFC00002C4, Virtual address mapping the corrupted page.
Arg2: 0000000000000AD2, physical page number.
Arg3: 000002330D079930, Zero.
Arg4: FfffAE8084995000, Zero.
Debugging details:
------------------
*** Warnıng: Unable to verify checksum for win32k.sys
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 3875.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 34324.
Key: Analysis. Init. CPU. Msec.
Value: 702.
Key: Analysis. Init. Elapsed. Msec.
Value: 35115.
Key: Analysis. Memory.commitpeak. MB.
Value: 79.
Key: Blackbox. Smdecompressionfailure.compressedsize
Value: 0xad2.
Key: Blackbox. Smdecompressionfailure.compressionformat
Value: 0x3.
Key: Blackbox. Smdecompressionfailure. Sourcedatahash.
Value: 0xf34c3bf7.
Key: Blackbox. Smdecompressionfailure. Sourcedataoffset.
Value: 0x19930.
Key: Blackbox. Smdecompressionfailure. Sourcepfn1.
Value: 0x13d499.
Key: Blackbox. Smdecompressionfailure. Sourcepfn2.
Value: 0x13d49a.
Key: Blackbox. Smdecompressionfailure. Targetpfn.
Value: 0x25794e.
Key: Wer. OS. Branch.
Value: Vb_release.
Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z
Key: Wer. OS. Version.
Value: 10.0.19041.1
Bugcheck_code: 12b.
Bugcheck_p1: FffffffFC00002C4.
Bugcheck_p2: AD2.
Bugcheck_p3: 2330D079930.
Bugcheck_p4: FfffAE8084995000.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: Memcompression.
Stack_text:
Ffff9608'5bee41F8 fffff805'68796E62: 00000000'0000012B ffffffff'C00002C4 00000000'00000AD2 00000233'0D079930: NT! Kebugcheckex.
Ffff9608'5bee4200 fffff805'6864A5DF: 00000000'00000001 00000000'C00002C4 ffffae80'84995000 00000000'00000000: NT! St_store<sm_traıts>:stdmpageerror+0x10a
Ffff9608'5bee4260 fffff805'684A67C5: 00000000'00000004 fffff805'684A632e 00000000'00000000 00000000'00000001: NT! St_store<sm_traıts>:stdmsinglepagecopy+0x1a3df7
Ffff9608'5bee4320 fffff805'684a5ffc: 00000000'00000001 00000000'00019930 ffffc006'7fadf000 ffffc006'00001000: NT! St_store<sm_traıts>:stdmsinglepagetransfer+0xa5
Ffff9608'5bee4370 fffff805'684a5e2C: Fffff805'ffffffff ffffc006'83D83000 ffff9608'5bee4450 ffffc006'87AE8B10: NT! St_store<sm_traıts>:stdmpsinglepageretrieve+0x180
Ffff9608'5bee4410 fffff805'684a5C79: Ffffae80'82688730 00000000'00000001 00000000'00000000 00000000'00000000: NT! St_store<sm_traıts>:stdmpageretrieve+0xc8
Ffff9608'5bee44C0 fffff805'684a5b31: Ffffc006'7fadf000 ffffc006'87AE8B10 ffffc006'83D83000 ffffc006'7fae09C0: NT! Smkm_store<sm_traıts>:smstdirectreadıssue+0x85
Ffff9608'5bee4540 fffff805'68498BC8: Ffffc006'81C10080 ffffc006'7fadf000 00000000'00000000 ffffc006'8723B890: NT! Smkm_store<sm_traıts>:smstdirectreadcallout+0x21
Ffff9608'5bee4570 fffff805'684a368F: Fffff805'684a5B10 ffff9608'5bee4610 00000000'00000003 00000000'00000000: NT! Keexpandkernelstackandcalloutınternal+0x78
Ffff9608'5bee45e0 fffff805'68559934: Ffff9608'5bee46e0 00000000'31526D73 00000000'000003FF fffff805'68F229C0: NT! Smkm_store<sm_traıts>:smstdirectread+0xc7
Ffff9608'5bee46b0 fffff805'68559368: 00000000'0000000C 00000000'000003FF ffff9608'5bee4760 fffff805'68F229C0: NT! Smkm_store<sm_traıts>:smstworkıtemqueue+0x1AC
Ffff9608'5bee4700 fffff805'684a4117: 00000000'0000000C 00000000'00000001 ffffc006'87AE8B10 ffffc006'8723B890: NT! Smkm_store_mgr<sm_traıts>:smıoctxqueuework+0xc0
Ffff9608'5bee4790 fffff805'684fa96b: Ffffc006'00000001 ffffc006'8723B950 00000000'00000000 ffffc006'7fadf000: NT! Smkm_store_mgr<sm_traıts>:smpageread+0x167
Ffff9608'5bee4800 fffff805'6845E0A0: 0000007F'00000100 00000000'00000000 ffff9608'5bee4A58 fffff805'6845BFF0: NT! Smpageread+0x33
Ffff9608'5bee4850 fffff805'6845BB4D: 00000000'00000002 ffff9608'5bee48e0 ffff9608'5bee4A58 ffffc006'8723B840: NT! Miıssuehardfaultıo+0x10C
Ffff9608'5bee48a0 fffff805'68528278: 00000000'C0033333 00000000'00000001 00000297'24900C08 00000000'00000000: NT! Miıssuehardfault+0x29D
Ffff9608'5bee4960 fffff805'68604E5E: 00000297'1EBA365e 000000D6'94F7af10 ffff9608'5bee4b80 ffffc006'00000000: NT! Mmaccessfault+0x468
Ffff9608'5bee4b00 00007FF8'4D6FE5ab: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kipagefault+0x35e
000000D6'94F7ba50 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ff8`4d6fe5ab
Symbol_name: NT! St_store<sm_traıts>:stdmpageerror+10a
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.19041.985
Stack_command: Thread. Cxr; KB.
Bucket_ıd_func_offset: 10a.
Faılure_bucket_ıd: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
Os_versıon: 10.0.19041.1
Buıldlab_str: Vb_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {C6a6BB4D-3B77-DFF6-2D9B-75F5D0F61A50}
Followup: Machineowner.
---------
Hata 4:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\031321-12953-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff801`26e00000 psloadedmodulelist = 0xfffff801`27a2a490
Debug session time: Sat mar 13 14:37:13.038 2021 (utc + 3:00)
System uptime: 0 days 23:00:08.728
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff801'271F5C50 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff8b0e'0D124CE0 = 0000000000000050.
8: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid System Memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed Memory.
Arguments:
Arg1: FffFD6001996e022, Memory referenced.
Arg2: 0000000000000000, Value 0 = read operation, 1 = write operation.
Arg3: FffFF8012704D1ca, ıf non-Zero, the instruction address which referenced the bad Memory.
Address.
Arg4: 0000000000000000, (reserved)
Debugging details:
------------------
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 3530.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 6477.
Key: Analysis. Init. CPU. Msec.
Value: 406.
Key: Analysis. Init. Elapsed. Msec.
Value: 2325.
Key: Analysis. Memory.commitpeak. MB.
Value: 74.
Key: Wer. OS. Branch.
Value: Vb_release.
Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z
Key: Wer. OS. Version.
Value: 10.0.19041.1
Bugcheck_code: 50.
Bugcheck_p1: FFFFD6001996E022.
Bugcheck_p2: 0
Bugcheck_p3: FffFF8012704D1ca.
Bugcheck_p4: 0
Read_address: FffFF80127Afb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
FFFFD6001996E022
Mm_ınternal_code: 0
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: explorer.exe
Trap_frame: Ffff8b0e0D124F80 -- (.trap 0xffff8b0e0d124f80)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 0000000000002BED rbx = 0000000000000000 rcx = 00000000000ec000.
Rdx = 0000000003F914DC rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8012704D1ca rsp = ffff8b0e0D125110 rbp = fffFD60FDC800280.
R8 = 03F914DC576fc2e4 R9 = 0000000000050008 R10 = fffFD6001996e000.
R11 = ffff8b0e0D125228 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna po nc.
NT! Rtlphpvscontextallocateınternal+0x1aa:
Fffff801'2704D1CA 410FB74A22 movzx ecx, Word ptr [r10+22h] DS: Ffffd600'1996E022=?
Resetting default scope.
Stack_text:
Ffff8b0e'0D124CD8 fffff801'2721EDB1: 00000000'00000050 ffffd600'1996E022 00000000'00000000 ffff8b0e'0D124F80: NT! Kebugcheckex.
Ffff8b0e'0D124CE0 fffff801'2700C960: 00000000'00000000 00000000'00000000 ffff8b0e'0D125000 00000000'00000000: NT! Misystemfault+0x1F45a1
Ffff8b0e'0D124DE0 fffff801'27203D5E: Ffffd60F'FD265268 ffffd60F'FD2651B0 ffffd60F'FD265218 00000000'002ffc38: NT! Mmaccessfault+0x400
Ffff8b0e'0D124F80 fffff801'2704D1CA: Ffffdd3D'C9483FEA 00000000'00000003 00000000'00000000 ffffc10F'C04e8DC0: NT! Kipagefault+0x35e
Ffff8b0e'0D125110 fffff801'270505FD: 00000000'00001820 ffff8b0e'00001820 ffff8b0e'0D125251 00000000'74536D4D: NT! Rtlphpvscontextallocateınternal+0x1aa
Ffff8b0e'0D125170 fffff801'2704FEDF: 00000000'00000000 ffff8b0e'0D1254B0 00000000'74536D4D 00000000'00000000: NT! Exallocateheappool+0x6ed
Ffff8b0e'0D1252B0 fffff801'270A1036: 00000000'80000000 00000000'00001820 00000000'74536D4D 00000000'00000000: NT! Expallocatepoolwithtagfromnode+0x5F
Ffff8b0e'0D125300 fffff801'274D04b0: 00000000'00000000 ffff8b0e'0D125610 00000000'00000002 ffffc10F'00000000: NT! Miallocatepool+0x86
Ffff8b0e'0D125350 fffff801'27441853: 00000000'00000002 ffffab81'85272220 ffff8b0e'0D125610 00000000'00000304: NT! Mibuildımagecontrolarea+0x104
Ffff8b0e'0D1253E0 fffff801'2744309B: Ffff8b0e'0D125840 00000005'00000003 00000000'00000000 00000000'00000000: NT! Micreateımagefilemap+0x33F
Ffff8b0e'0D125560 fffff801'274309CB: Ffffc10F'C8702E60 ffff8b0e'0D125840 ffff8b0e'0D125840 00000008'00000000: NT! Micreatenewsection+0x127
Ffff8b0e'0D1256D0 fffff801'27430014: Ffff8b0e'0D125700 00000000'00000000 ffffc10F'C8702E60 00000000'00000000: NT! Micreateımageordatasection+0x2dB
Ffff8b0e'0D1257C0 fffff801'2742FDF7: 00000000'11000000 ffff8b0e'0D125B80 00000000'00000001 00000000'00000002: NT! Micreatesection+0xf4
Ffff8b0e'0D125940 fffff801'2742FBDC: 00000000'00a7D920 00000000'00000001 00000000'00000000 00000000'00000001: NT! Micreatesectioncommon+0x207
Ffff8b0e'0D125A20 fffff801'272075B8: 00000000'000017A2 00000000'058e0000 00000000'00000000 fffff801'27435D5A: NT! Ntcreatesection+0x5C
Ffff8b0e'0D125A90 00007FFA'0226D554: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000000'00a7D8D8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`0226d554
Symbol_name: NT! Rtlphpvscontextallocateınternal+1aa
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.19041.867
Stack_command: Thread. Cxr; KB.
Bucket_ıd_func_offset: 1aa.
Faılure_bucket_ıd: Av_r_ınvalıd_nt! Rtlphpvscontextallocateınternal
Os_versıon: 10.0.19041.1
Buıldlab_str: Vb_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {BB97F450-3432-3449-B336-0cebcfb26F4b}
Followup: Machineowner.
---------
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\072321-12250-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff804`78c00000 psloadedmodulelist = 0xfffff804`7982a1d0
Debug session time: Fri jul 23 23:02:38.498 2021 (utc + 3:00)
System uptime: 4 days 21:45:29.189
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff804'78ff6F20 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffc89'7E3392A0 = 000000000000003B.
6: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, the subtype of the bugcheck.
Arg2: 0000016F005F2D18.
Arg3: 000000000000000F.
Arg4: Ffff8E02A9A37B00.
Debugging details:
------------------
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 3749.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 50378.
Key: Analysis. Init. CPU. Msec.
Value: 733.
Key: Analysis. Init. Elapsed. Msec.
Value: 60820.
Key: Analysis. Memory.commitpeak. MB.
Value: 77.
Key: Wer. OS. Branch.
Value: Vb_release.
Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z
Key: Wer. OS. Version.
Value: 10.0.19041.1
Bugcheck_code: 1A.
Bugcheck_p1: 61941.
Bugcheck_p2: 16F005F2D18.
Bugcheck_p3: F
Bugcheck_p4: Ffff8E02A9A37B00.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: svchost.exe
Stack_text:
Ffff8e02'a9a37958 fffff802'51C87C62: 00000000'0000001A 00000000'00061941 0000016F'005F2D18 00000000'0000000F: NT! Kebugcheckex.
Ffff8e02'a9a37960 fffff802'51C04D5e: Ffffc10b'b7F80000 ffffc10b'C0475A80 0000016F'7af59b20 ffffc10b'00002D84: NT! Mmaccessfault+0x15FE52
Ffff8e02'a9a37b00 00007FFE'6183E37B: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kipagefault+0x35e
00000045'e8C7e128 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffe`6183e37b
Module_name: Hardware.
Image_name: Hardware_ram.
Stack_command: Thread. Cxr; KB.
Faılure_bucket_ıd: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
Os_versıon: 10.0.19041.1
Buıldlab_str: Vb_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {C6E5C6CF-692e-7852-5DC5-B74944540fc0}
Followup: Machineowner.
---------
Hata 2:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\072321-12250-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff804`78c00000 psloadedmodulelist = 0xfffff804`7982a1d0
Debug session time: Fri jul 23 23:02:38.498 2021 (utc + 3:00)
System uptime: 4 days 21:45:29.189
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff804'78ff6F20 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffc89'7E3392A0 = 000000000000003B.
6: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000005, exception code that caused the bugcheck.
Arg2: FffFF804791F665b, address of the instruction which caused the bugcheck.
Arg3: FfffFC897E339ba0, address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Zero.
Debugging details:
------------------
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 4468.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 28399.
Key: Analysis. Init. CPU. Msec.
Value: 405.
Key: Analysis. Init. Elapsed. Msec.
Value: 4616.
Key: Analysis. Memory.commitpeak. MB.
Value: 83.
Key: Wer. OS. Branch.
Value: Vb_release.
Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z
Key: Wer. OS. Version.
Value: 10.0.19041.1
Bugcheck_code: 3B.
Bugcheck_p1: C0000005.
Bugcheck_p2: FffFF804791F665b.
Bugcheck_p3: FfffFC897E339ba0.
Bugcheck_p4: 0
Context: FfffFC897E339ba0 -- (.cxr 0xfffffc897e339ba0)
Rax = 0000000000000000 rbx = 0000000000000000 rcx = fffFE18F539C5080.
Rdx = ffffce0A1419FD00 rsi = 00000000001F0003 rdi = ffffce0A1419FD00.
Rip = fffFF804791F665b rsp = ffffFC897E33a5a0 rbp = ffffFC897E33a6C0.
R8 = ffffFC897E33a5b0 R9 = 0000000000000000 R10 = 7ffffffffffffffc.
R11 = 0000000000000070 R12 = 0000000000000000 R13 = fffFE18F539C5080.
R14 = 0000000000000000 R15 = 0000000000000006.
İopl = 0 nv up ei pl nzna po nc.
CS = 0010 SS = 0018 DS = 002b es = 002b fs = 0053 GS = 002b efl = 00050206.
NT! Obpcreatehandle+0x3fb:
Fffff804'791F665b 488B4608 mov rax, qword ptr [rsi+8] DS:002b:00000000'001F000b=?
Resetting default scope.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: svchost.exe
Stack_text:
Fffffc89'7E33A5A0 fffff804'79279EED: Ffffe18F'4A010340 ffffe18F'4A012900 ffffe18F'4A017F00 ffffce0a'00000080: NT! Obpcreatehandle+0x3fb
Fffffc89'7E33A790 fffff804'792790F1: 00000000'00000001 fffffc89'7E33AB80 00000000'00000001 00000000'00000001: NT! Obınsertobjectex+0x13D
Fffffc89'7E33AA20 fffff804'790088B8: Ffffe18F'539C5080 00000007'3bb9de58 fffffc89'7E33AAA8 00000000'00000000: NT! Ntcreateevent+0Xe1
Fffffc89'7E33AA90 00007FFD'E20ed724: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000007'3bb9de38 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffd`e20ed724
Symbol_name: NT! Obpcreatehandle+3fb
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.19041.1110
Stack_command: Cxr 0xfffffc897e339ba0; KB.
Bucket_ıd_func_offset: 3fb.
Faılure_bucket_ıd: 0x3B_c0000005_nt!ObpCreateHandle
Os_versıon: 10.0.19041.1
Buıldlab_str: Vb_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {DCD9630C-1938-35EA-221a-7B842C7Aa859}
Followup: Machineowner.
---------
Hata 3:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\060621-41265-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff805`68200000 psloadedmodulelist = 0xfffff805`68e2a1b0
Debug session time: Sun jun 6 09:31:07.383 2021 (utc + 3:00)
System uptime: 4 days 0:31:06.328
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff805'685F6CF0 48894C2408 mov qword ptr [rsp+8],rcx SS: Ffff9608'5bee4200 = 000000000000012B.
9: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a Single bit error was found in this page. This is a hardware Memory error.
Arguments:
Arg1: FffffffFC00002C4, Virtual address mapping the corrupted page.
Arg2: 0000000000000AD2, physical page number.
Arg3: 000002330D079930, Zero.
Arg4: FfffAE8084995000, Zero.
Debugging details:
------------------
*** Warnıng: Unable to verify checksum for win32k.sys
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 3875.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 34324.
Key: Analysis. Init. CPU. Msec.
Value: 702.
Key: Analysis. Init. Elapsed. Msec.
Value: 35115.
Key: Analysis. Memory.commitpeak. MB.
Value: 79.
Key: Blackbox. Smdecompressionfailure.compressedsize
Value: 0xad2.
Key: Blackbox. Smdecompressionfailure.compressionformat
Value: 0x3.
Key: Blackbox. Smdecompressionfailure. Sourcedatahash.
Value: 0xf34c3bf7.
Key: Blackbox. Smdecompressionfailure. Sourcedataoffset.
Value: 0x19930.
Key: Blackbox. Smdecompressionfailure. Sourcepfn1.
Value: 0x13d499.
Key: Blackbox. Smdecompressionfailure. Sourcepfn2.
Value: 0x13d49a.
Key: Blackbox. Smdecompressionfailure. Targetpfn.
Value: 0x25794e.
Key: Wer. OS. Branch.
Value: Vb_release.
Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z
Key: Wer. OS. Version.
Value: 10.0.19041.1
Bugcheck_code: 12b.
Bugcheck_p1: FffffffFC00002C4.
Bugcheck_p2: AD2.
Bugcheck_p3: 2330D079930.
Bugcheck_p4: FfffAE8084995000.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: Memcompression.
Stack_text:
Ffff9608'5bee41F8 fffff805'68796E62: 00000000'0000012B ffffffff'C00002C4 00000000'00000AD2 00000233'0D079930: NT! Kebugcheckex.
Ffff9608'5bee4200 fffff805'6864A5DF: 00000000'00000001 00000000'C00002C4 ffffae80'84995000 00000000'00000000: NT! St_store<sm_traıts>:stdmpageerror+0x10a
Ffff9608'5bee4260 fffff805'684A67C5: 00000000'00000004 fffff805'684A632e 00000000'00000000 00000000'00000001: NT! St_store<sm_traıts>:stdmsinglepagecopy+0x1a3df7
Ffff9608'5bee4320 fffff805'684a5ffc: 00000000'00000001 00000000'00019930 ffffc006'7fadf000 ffffc006'00001000: NT! St_store<sm_traıts>:stdmsinglepagetransfer+0xa5
Ffff9608'5bee4370 fffff805'684a5e2C: Fffff805'ffffffff ffffc006'83D83000 ffff9608'5bee4450 ffffc006'87AE8B10: NT! St_store<sm_traıts>:stdmpsinglepageretrieve+0x180
Ffff9608'5bee4410 fffff805'684a5C79: Ffffae80'82688730 00000000'00000001 00000000'00000000 00000000'00000000: NT! St_store<sm_traıts>:stdmpageretrieve+0xc8
Ffff9608'5bee44C0 fffff805'684a5b31: Ffffc006'7fadf000 ffffc006'87AE8B10 ffffc006'83D83000 ffffc006'7fae09C0: NT! Smkm_store<sm_traıts>:smstdirectreadıssue+0x85
Ffff9608'5bee4540 fffff805'68498BC8: Ffffc006'81C10080 ffffc006'7fadf000 00000000'00000000 ffffc006'8723B890: NT! Smkm_store<sm_traıts>:smstdirectreadcallout+0x21
Ffff9608'5bee4570 fffff805'684a368F: Fffff805'684a5B10 ffff9608'5bee4610 00000000'00000003 00000000'00000000: NT! Keexpandkernelstackandcalloutınternal+0x78
Ffff9608'5bee45e0 fffff805'68559934: Ffff9608'5bee46e0 00000000'31526D73 00000000'000003FF fffff805'68F229C0: NT! Smkm_store<sm_traıts>:smstdirectread+0xc7
Ffff9608'5bee46b0 fffff805'68559368: 00000000'0000000C 00000000'000003FF ffff9608'5bee4760 fffff805'68F229C0: NT! Smkm_store<sm_traıts>:smstworkıtemqueue+0x1AC
Ffff9608'5bee4700 fffff805'684a4117: 00000000'0000000C 00000000'00000001 ffffc006'87AE8B10 ffffc006'8723B890: NT! Smkm_store_mgr<sm_traıts>:smıoctxqueuework+0xc0
Ffff9608'5bee4790 fffff805'684fa96b: Ffffc006'00000001 ffffc006'8723B950 00000000'00000000 ffffc006'7fadf000: NT! Smkm_store_mgr<sm_traıts>:smpageread+0x167
Ffff9608'5bee4800 fffff805'6845E0A0: 0000007F'00000100 00000000'00000000 ffff9608'5bee4A58 fffff805'6845BFF0: NT! Smpageread+0x33
Ffff9608'5bee4850 fffff805'6845BB4D: 00000000'00000002 ffff9608'5bee48e0 ffff9608'5bee4A58 ffffc006'8723B840: NT! Miıssuehardfaultıo+0x10C
Ffff9608'5bee48a0 fffff805'68528278: 00000000'C0033333 00000000'00000001 00000297'24900C08 00000000'00000000: NT! Miıssuehardfault+0x29D
Ffff9608'5bee4960 fffff805'68604E5E: 00000297'1EBA365e 000000D6'94F7af10 ffff9608'5bee4b80 ffffc006'00000000: NT! Mmaccessfault+0x468
Ffff9608'5bee4b00 00007FF8'4D6FE5ab: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kipagefault+0x35e
000000D6'94F7ba50 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ff8`4d6fe5ab
Symbol_name: NT! St_store<sm_traıts>:stdmpageerror+10a
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.19041.985
Stack_command: Thread. Cxr; KB.
Bucket_ıd_func_offset: 10a.
Faılure_bucket_ıd: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError
Os_versıon: 10.0.19041.1
Buıldlab_str: Vb_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {C6a6BB4D-3B77-DFF6-2D9B-75F5D0F61A50}
Followup: Machineowner.
---------
Hata 4:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.
Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\031321-12953-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff801`26e00000 psloadedmodulelist = 0xfffff801`27a2a490
Debug session time: Sat mar 13 14:37:13.038 2021 (utc + 3:00)
System uptime: 0 days 23:00:08.728
Loading kernel symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff801'271F5C50 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff8b0e'0D124CE0 = 0000000000000050.
8: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid System Memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed Memory.
Arguments:
Arg1: FffFD6001996e022, Memory referenced.
Arg2: 0000000000000000, Value 0 = read operation, 1 = write operation.
Arg3: FffFF8012704D1ca, ıf non-Zero, the instruction address which referenced the bad Memory.
Address.
Arg4: 0000000000000000, (reserved)
Debugging details:
------------------
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 3530.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 6477.
Key: Analysis. Init. CPU. Msec.
Value: 406.
Key: Analysis. Init. Elapsed. Msec.
Value: 2325.
Key: Analysis. Memory.commitpeak. MB.
Value: 74.
Key: Wer. OS. Branch.
Value: Vb_release.
Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z
Key: Wer. OS. Version.
Value: 10.0.19041.1
Bugcheck_code: 50.
Bugcheck_p1: FFFFD6001996E022.
Bugcheck_p2: 0
Bugcheck_p3: FffFF8012704D1ca.
Bugcheck_p4: 0
Read_address: FffFF80127Afb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
FFFFD6001996E022
Mm_ınternal_code: 0
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: explorer.exe
Trap_frame: Ffff8b0e0D124F80 -- (.trap 0xffff8b0e0d124f80)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 0000000000002BED rbx = 0000000000000000 rcx = 00000000000ec000.
Rdx = 0000000003F914DC rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8012704D1ca rsp = ffff8b0e0D125110 rbp = fffFD60FDC800280.
R8 = 03F914DC576fc2e4 R9 = 0000000000050008 R10 = fffFD6001996e000.
R11 = ffff8b0e0D125228 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna po nc.
NT! Rtlphpvscontextallocateınternal+0x1aa:
Fffff801'2704D1CA 410FB74A22 movzx ecx, Word ptr [r10+22h] DS: Ffffd600'1996E022=?
Resetting default scope.
Stack_text:
Ffff8b0e'0D124CD8 fffff801'2721EDB1: 00000000'00000050 ffffd600'1996E022 00000000'00000000 ffff8b0e'0D124F80: NT! Kebugcheckex.
Ffff8b0e'0D124CE0 fffff801'2700C960: 00000000'00000000 00000000'00000000 ffff8b0e'0D125000 00000000'00000000: NT! Misystemfault+0x1F45a1
Ffff8b0e'0D124DE0 fffff801'27203D5E: Ffffd60F'FD265268 ffffd60F'FD2651B0 ffffd60F'FD265218 00000000'002ffc38: NT! Mmaccessfault+0x400
Ffff8b0e'0D124F80 fffff801'2704D1CA: Ffffdd3D'C9483FEA 00000000'00000003 00000000'00000000 ffffc10F'C04e8DC0: NT! Kipagefault+0x35e
Ffff8b0e'0D125110 fffff801'270505FD: 00000000'00001820 ffff8b0e'00001820 ffff8b0e'0D125251 00000000'74536D4D: NT! Rtlphpvscontextallocateınternal+0x1aa
Ffff8b0e'0D125170 fffff801'2704FEDF: 00000000'00000000 ffff8b0e'0D1254B0 00000000'74536D4D 00000000'00000000: NT! Exallocateheappool+0x6ed
Ffff8b0e'0D1252B0 fffff801'270A1036: 00000000'80000000 00000000'00001820 00000000'74536D4D 00000000'00000000: NT! Expallocatepoolwithtagfromnode+0x5F
Ffff8b0e'0D125300 fffff801'274D04b0: 00000000'00000000 ffff8b0e'0D125610 00000000'00000002 ffffc10F'00000000: NT! Miallocatepool+0x86
Ffff8b0e'0D125350 fffff801'27441853: 00000000'00000002 ffffab81'85272220 ffff8b0e'0D125610 00000000'00000304: NT! Mibuildımagecontrolarea+0x104
Ffff8b0e'0D1253E0 fffff801'2744309B: Ffff8b0e'0D125840 00000005'00000003 00000000'00000000 00000000'00000000: NT! Micreateımagefilemap+0x33F
Ffff8b0e'0D125560 fffff801'274309CB: Ffffc10F'C8702E60 ffff8b0e'0D125840 ffff8b0e'0D125840 00000008'00000000: NT! Micreatenewsection+0x127
Ffff8b0e'0D1256D0 fffff801'27430014: Ffff8b0e'0D125700 00000000'00000000 ffffc10F'C8702E60 00000000'00000000: NT! Micreateımageordatasection+0x2dB
Ffff8b0e'0D1257C0 fffff801'2742FDF7: 00000000'11000000 ffff8b0e'0D125B80 00000000'00000001 00000000'00000002: NT! Micreatesection+0xf4
Ffff8b0e'0D125940 fffff801'2742FBDC: 00000000'00a7D920 00000000'00000001 00000000'00000000 00000000'00000001: NT! Micreatesectioncommon+0x207
Ffff8b0e'0D125A20 fffff801'272075B8: 00000000'000017A2 00000000'058e0000 00000000'00000000 fffff801'27435D5A: NT! Ntcreatesection+0x5C
Ffff8b0e'0D125A90 00007FFA'0226D554: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000000'00a7D8D8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`0226d554
Symbol_name: NT! Rtlphpvscontextallocateınternal+1aa
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.19041.867
Stack_command: Thread. Cxr; KB.
Bucket_ıd_func_offset: 1aa.
Faılure_bucket_ıd: Av_r_ınvalıd_nt! Rtlphpvscontextallocateınternal
Os_versıon: 10.0.19041.1
Buıldlab_str: Vb_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {BB97F450-3432-3449-B336-0cebcfb26F4b}
Followup: Machineowner.
---------
Son düzenleme: