https://drive.google.com/file/d/1JvTpZvtDKfvbuTDqrtjCbAmW7W7_DQgk/view?usp=sharing
Minidump klasöründeki dosyalar bunlar. Lütfen yardımcı olursanız sevinirim.
Minidump klasöründeki dosyalar bunlar. Lütfen yardımcı olursanız sevinirim.
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8085a006100, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8079128e729, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
Unable to load image \SystemRoot\System32\drivers\Netwtw04.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Netwtw04.sys
*** WARNING: Unable to verify timestamp for dump_iaStorAC.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4703
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21028
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff8085a006100
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8079128e729
BUGCHECK_P4: 2
READ_ADDRESS: fffff807782fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8077820f378: Unable to get Flags value from nt!KdVersionBlock
fffff8077820f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8085a006100
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff98519d0a580 -- (.trap 0xfffff98519d0a580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8a00000007000001 rbx=0000000000000000 rcx=ffffa3ffffffffff
rdx=fffff98519d0a6b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8079128e729 rsp=fffff98519d0a710 rbp=fffff80777885260
r8=ffffa38000000000 r9=fffff80791240400 r10=b7f556989cffeab9
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
hardlock+0x4e729:
fffff807`9128e729 458b0e mov r9d,dword ptr [r14] ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
fffff985`19d0a368 fffff807`779de677 : 00000000`00000050 fffff808`5a006100 00000000`00000000 fffff985`19d0a580 : nt!KeBugCheckEx
fffff985`19d0a370 fffff807`77866508 : fffff808`5a006100 00000000`c0000016 fffff985`19d0a580 00000000`00000000 : nt!MiSystemFault+0x17f6fb
fffff985`19d0a470 fffff807`779ab91e : 00000000`00000000 00000000`00000090 fffff807`777d2000 fffff807`77882d29 : nt!MmAccessFault+0x218
fffff985`19d0a580 fffff807`9128e729 : fffff807`777d2000 ffffffff`80001558 fffff807`91250718 ffffa3fc`03bbbe90 : nt!KiPageFault+0x35e
fffff985`19d0a710 fffff807`777d2000 : ffffffff`80001558 fffff807`91250718 ffffa3fc`03bbbe90 ffffa3d1`fe01ddd8 : hardlock+0x4e729
fffff985`19d0a718 ffffffff`80001558 : fffff807`91250718 ffffa3fc`03bbbe90 ffffa3d1`fe01ddd8 fffff807`777d2000 : nt!_guard_fids_table <PERF> (nt+0x1d2000)
fffff985`19d0a720 fffff807`91250718 : ffffa3fc`03bbbe90 ffffa3d1`fe01ddd8 fffff807`777d2000 fffff807`9128e03c : 0xffffffff`80001558
fffff985`19d0a728 ffffa3fc`03bbbe90 : ffffa3d1`fe01ddd8 fffff807`777d2000 fffff807`9128e03c ffffffff`80001558 : hardlock+0x10718
fffff985`19d0a730 ffffa3d1`fe01ddd8 : fffff807`777d2000 fffff807`9128e03c ffffffff`80001558 fffff807`9127ac0e : 0xffffa3fc`03bbbe90
fffff985`19d0a738 fffff807`777d2000 : fffff807`9128e03c ffffffff`80001558 fffff807`9127ac0e fffff807`9127ae18 : 0xffffa3d1`fe01ddd8
fffff985`19d0a740 fffff807`9128e03c : ffffffff`80001558 fffff807`9127ac0e fffff807`9127ae18 fffff807`9128e809 : nt!_guard_fids_table <PERF> (nt+0x1d2000)
fffff985`19d0a748 ffffffff`80001558 : fffff807`9127ac0e fffff807`9127ae18 fffff807`9128e809 fffff985`19d0a960 : hardlock+0x4e03c
fffff985`19d0a750 fffff807`9127ac0e : fffff807`9127ae18 fffff807`9128e809 fffff985`19d0a960 ffff9306`9beff000 : 0xffffffff`80001558
fffff985`19d0a758 fffff807`9127ae18 : fffff807`9128e809 fffff985`19d0a960 ffff9306`9beff000 fffff807`9128e538 : hardlock+0x3ac0e
fffff985`19d0a760 fffff807`9128e809 : fffff985`19d0a960 ffff9306`9beff000 fffff807`9128e538 fffff807`777d2000 : hardlock+0x3ae18
fffff985`19d0a768 fffff985`19d0a960 : ffff9306`9beff000 fffff807`9128e538 fffff807`777d2000 ffff9306`9c0764d0 : hardlock+0x4e809
fffff985`19d0a770 ffff9306`9beff000 : fffff807`9128e538 fffff807`777d2000 ffff9306`9c0764d0 ffff9306`9be54e50 : 0xfffff985`19d0a960
fffff985`19d0a778 fffff807`9128e538 : fffff807`777d2000 ffff9306`9c0764d0 ffff9306`9be54e50 00000000`00000000 : 0xffff9306`9beff000
fffff985`19d0a780 fffff807`777d2000 : ffff9306`9c0764d0 ffff9306`9be54e50 00000000`00000000 ffffffff`80001558 : hardlock+0x4e538
fffff985`19d0a788 ffff9306`9c0764d0 : ffff9306`9be54e50 00000000`00000000 ffffffff`80001558 ffffa483`4b2bbcf0 : nt!_guard_fids_table <PERF> (nt+0x1d2000)
fffff985`19d0a790 ffff9306`9be54e50 : 00000000`00000000 ffffffff`80001558 ffffa483`4b2bbcf0 00000000`00000000 : 0xffff9306`9c0764d0
fffff985`19d0a798 00000000`00000000 : ffffffff`80001558 ffffa483`4b2bbcf0 00000000`00000000 fffff807`9128e1de : 0xffff9306`9be54e50
SYMBOL_NAME: hardlock+4e729
MODULE_NAME: hardlock
IMAGE_NAME: hardlock.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4e729
FAILURE_BUCKET_ID: AV_R_INVALID_hardlock!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6703f46d-8934-806c-3853-68517428ac64}
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8016ab7960f, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8014244e729, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0356013.inf_amd64_61ba7b1fb4cf4aec\B355483\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
Unable to load image \SystemRoot\System32\drivers\dump_iaStorAC.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dump_iaStorAC.sys
Unable to load image \SystemRoot\system32\DRIVERS\klgse.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for klgse.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19340
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff8016ab7960f
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8014244e729
BUGCHECK_P4: 2
READ_ADDRESS: fffff801296fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8012960f378: Unable to get Flags value from nt!KdVersionBlock
fffff8012960f378: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8016ab7960f
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff601353d2580 -- (.trap 0xfffff601353d2580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8a00000007000001 rbx=0000000000000000 rcx=ffff917fffffffff
rdx=fffff601353d26b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014244e729 rsp=fffff601353d2710 rbp=fffff80128c60600
r8=ffff910000000000 r9=fffff80142400400 r10=b7f556989cffeab9
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
hardlock+0x4e729:
fffff801`4244e729 458b0e mov r9d,dword ptr [r14] ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
fffff601`353d2368 fffff801`28dde677 : 00000000`00000050 fffff801`6ab7960f 00000000`00000000 fffff601`353d2580 : nt!KeBugCheckEx
fffff601`353d2370 fffff801`28c66508 : fffff801`6ab7960f 00000000`c0000016 fffff601`353d2580 00000000`00000000 : nt!MiSystemFault+0x17f6fb
fffff601`353d2470 fffff801`28dab91e : fffff601`353d2650 fffff801`28da463f fffff801`28bfe000 fffff801`28c82d29 : nt!MmAccessFault+0x218
fffff601`353d2580 fffff801`4244e729 : fffff801`28bfe000 ffffffff`80001828 fffff801`42434f00 ffff917c`00945ff0 : nt!KiPageFault+0x35e
fffff601`353d2710 fffff801`28bfe000 : ffffffff`80001828 fffff801`42434f00 ffff917c`00945ff0 ffff9148`be004a28 : hardlock+0x4e729
fffff601`353d2718 ffffffff`80001828 : fffff801`42434f00 ffff917c`00945ff0 ffff9148`be004a28 fffff801`28bfe000 : nt!_guard_fids_table <PERF> (nt+0x1fe000)
fffff601`353d2720 fffff801`42434f00 : ffff917c`00945ff0 ffff9148`be004a28 fffff801`28bfe000 fffff801`4244e03c : 0xffffffff`80001828
fffff601`353d2728 ffff917c`00945ff0 : ffff9148`be004a28 fffff801`28bfe000 fffff801`4244e03c ffffffff`80001828 : hardlock+0x34f00
fffff601`353d2730 ffff9148`be004a28 : fffff801`28bfe000 fffff801`4244e03c ffffffff`80001828 fffff801`4243ac0e : 0xffff917c`00945ff0
fffff601`353d2738 fffff801`28bfe000 : fffff801`4244e03c ffffffff`80001828 fffff801`4243ac0e fffff801`4243ae18 : 0xffff9148`be004a28
fffff601`353d2740 fffff801`4244e03c : ffffffff`80001828 fffff801`4243ac0e fffff801`4243ae18 fffff801`4244e809 : nt!_guard_fids_table <PERF> (nt+0x1fe000)
fffff601`353d2748 ffffffff`80001828 : fffff801`4243ac0e fffff801`4243ae18 fffff801`4244e809 fffff601`353d2960 : hardlock+0x4e03c
fffff601`353d2750 fffff801`4243ac0e : fffff801`4243ae18 fffff801`4244e809 fffff601`353d2960 ffffb58a`5c547000 : 0xffffffff`80001828
fffff601`353d2758 fffff801`4243ae18 : fffff801`4244e809 fffff601`353d2960 ffffb58a`5c547000 fffff801`4244e538 : hardlock+0x3ac0e
fffff601`353d2760 fffff801`4244e809 : fffff601`353d2960 ffffb58a`5c547000 fffff801`4244e538 fffff801`28bfe000 : hardlock+0x3ae18
fffff601`353d2768 fffff601`353d2960 : ffffb58a`5c547000 fffff801`4244e538 fffff801`28bfe000 ffffb58a`5c560ed0 : hardlock+0x4e809
fffff601`353d2770 ffffb58a`5c547000 : fffff801`4244e538 fffff801`28bfe000 ffffb58a`5c560ed0 ffffb58a`5c92fe30 : 0xfffff601`353d2960
fffff601`353d2778 fffff801`4244e538 : fffff801`28bfe000 ffffb58a`5c560ed0 ffffb58a`5c92fe30 00000000`00000000 : 0xffffb58a`5c547000
fffff601`353d2780 fffff801`28bfe000 : ffffb58a`5c560ed0 ffffb58a`5c92fe30 00000000`00000000 ffffffff`80001828 : hardlock+0x4e538
fffff601`353d2788 ffffb58a`5c560ed0 : ffffb58a`5c92fe30 00000000`00000000 ffffffff`80001828 ffffdb00`3c334200 : nt!_guard_fids_table <PERF> (nt+0x1fe000)
fffff601`353d2790 ffffb58a`5c92fe30 : 00000000`00000000 ffffffff`80001828 ffffdb00`3c334200 00000000`00000000 : 0xffffb58a`5c560ed0
fffff601`353d2798 00000000`00000000 : ffffffff`80001828 ffffdb00`3c334200 00000000`00000000 fffff801`4244e1de : 0xffffb58a`5c92fe30
SYMBOL_NAME: hardlock+4e729
MODULE_NAME: hardlock
IMAGE_NAME: hardlock.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4e729
FAILURE_BUCKET_ID: AV_R_INVALID_hardlock!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6703f46d-8934-806c-3853-68517428ac64}
Followup: MachineOwner
---------
0: kd> lmvm hardlock
Browse full module list
start end module name
fffff801`42400000 fffff801`4244f600 hardlock T (no symbols)
Loaded symbol image file: hardlock.sys
Image path: \??\C:\WINDOWS\system32\drivers\hardlock.sys
Image name: hardlock.sys
Browse all global symbols functions data
Timestamp: Tue Apr 15 17:22:59 2014 (534D40C3)
CheckSum: 00054CEF
ImageSize: 0004F600
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd4c99e8cb9c0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8031f0f2793, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5139
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12726
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd4c99e8cb9c0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8031f0f2793
BUGCHECK_P4: 2
READ_ADDRESS: fffff803047713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff803046283b8: Unable to get Flags value from nt!KdVersionBlock
fffff803046283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd4c99e8cb9c0
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff90f0ae07660 -- (.trap 0xfffff90f0ae07660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000f02 rbx=0000000000000000 rcx=00000008fffffff7
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031f0f2793 rsp=fffff90f0ae077f0 rbp=0000000000000000
r8=ffffd481946f4e40 r9=0000000000000002 r10=ffffd48194483a20
r11=fffff90f0ae077d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323:
fffff803`1f0f2793 8984cea8000000 mov dword ptr [rsi+rcx*8+0A8h],eax ds:00000048`00000060=????????
Resetting default scope
STACK_TEXT:
fffff90f`0ae073b8 fffff803`043ed75a : 00000000`00000050 ffffd4c9`9e8cb9c0 00000000`00000002 fffff90f`0ae07660 : nt!KeBugCheckEx
fffff90f`0ae073c0 fffff803`0425889f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffd4c9`9e8cb9c0 : nt!MiSystemFault+0x1c62fa
fffff90f`0ae074c0 fffff803`043d0c5e : fffff90f`0ae077c8 00000000`00000000 ffffd481`99196190 00000006`6c3178d6 : nt!MmAccessFault+0x34f
fffff90f`0ae07660 fffff803`1f0f2793 : ffffd481`a1b1f2c0 ffffd481`a1c8f3d0 ffffd481`9e8cb960 fffff803`1eec2eda : nt!KiPageFault+0x35e
fffff90f`0ae077f0 fffff803`1ef91819 : ffffd481`991c29b0 00000000`00000000 fffff803`1f323000 ffffd481`96934301 : Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323
fffff90f`0ae07860 fffff803`1ef24b0f : fffff803`1ef91790 fffff90f`0ae07990 ffffd481`96934300 00000000`00000000 : Netwtw06!mmacAlDispatchCmdRespCbJob+0x89
fffff90f`0ae07890 fffff803`08de0722 : ffffd481`9dcab040 ffffd481`9aa68420 00000000`00000000 fffff803`08de0710 : Netwtw06!prvJobScheduler_jobExecuter+0x45f
fffff90f`0ae079d0 fffff803`04291fef : 00000000`00000000 ffffd481`9acc8500 ffffd481`00000000 fffff803`1bb35050 : ndis!ndisDispatchIoWorkItem+0x12
fffff90f`0ae07a00 fffff803`04283aa5 : ffffd481`944cfa60 ffffd481`9dcab040 fffff803`04291ef0 00000000`0000000d : nt!IopProcessWorkItem+0xff
fffff90f`0ae07a70 fffff803`0431e235 : ffffd481`9dcab040 00000000`00000080 ffffd481`94480300 00000000`00000080 : nt!ExpWorkerThread+0x105
fffff90f`0ae07b10 fffff803`043ca1d8 : ffff9201`5cba1180 ffffd481`9dcab040 fffff803`0431e1e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff90f`0ae07b60 00000000`00000000 : fffff90f`0ae08000 fffff90f`0ae01000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Netwtw06!prvMvmManagerTimeEventResponseHandler+323
MODULE_NAME: Netwtw06
IMAGE_NAME: Netwtw06.sys
IMAGE_VERSION: 20.50.0.5
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 323
FAILURE_BUCKET_ID: AV_INVALID_Netwtw06!prvMvmManagerTimeEventResponseHandler
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d71428cf-496d-5e77-45fa-f3ffc163411a}
Followup: MachineOwner
---------
2: kd> lmvm Netwtw06
Browse full module list
start end module name
fffff803`1ee00000 fffff803`1f69b000 Netwtw06 (pdb symbols) C:\ProgramData\Dbg\sym\Netwtw06.pdb\89DA3DCFF2B2441B874E70ADB862BDDE1\Netwtw06.pdb
Loaded symbol image file: Netwtw06.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\Netwtw06.sys\5B1952F789b000\Netwtw06.sys
Image path: \SystemRoot\System32\drivers\Netwtw06.sys
Image name: Netwtw06.sys
Browse all global symbols functions data
Timestamp: Thu Jun 7 18:44:55 2018 (5B1952F7)
CheckSum: 00855347
ImageSize: 0089B000
File version: 20.50.0.5
Product version: 1.0.1.0
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Intel Corporation
ProductName: Intel® Wireless WiFi Link Adapter
InternalName: .sys
OriginalFilename: .sys
FileVersion: 20.50.0.5
FileDescription: Intel® Wireless WiFi Link Driver
LegalCopyright: Copyright © Intel Corporation 2011
Comments: NDIS650_MINIPORT
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff804f5a763530, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8024abd2793, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14084
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff804f5a763530
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8024abd2793
BUGCHECK_P4: 2
READ_ADDRESS: fffff8022cf713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8022ce283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8022ce283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff804f5a763530
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffcc88abd17660 -- (.trap 0xffffcc88abd17660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000603 rbx=0000000000000000 rcx=00000008fffffff7
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8024abd2793 rsp=ffffcc88abd177f0 rbp=0000000000000000
r8=ffff80074fa3f880 r9=0000000000000002 r10=ffff80074f683720
r11=ffffcc88abd177d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323:
fffff802`4abd2793 8984cea8000000 mov dword ptr [rsi+rcx*8+0A8h],eax ds:00000048`00000060=????????
Resetting default scope
STACK_TEXT:
ffffcc88`abd173b8 fffff802`2cbed75a : 00000000`00000050 ffff804f`5a763530 00000000`00000002 ffffcc88`abd17660 : nt!KeBugCheckEx
ffffcc88`abd173c0 fffff802`2ca5889f : 00000000`00000040 00000000`00000002 00000000`00000000 ffff804f`5a763530 : nt!MiSystemFault+0x1c62fa
ffffcc88`abd174c0 fffff802`2cbd0c5e : ffffcc88`abd177c8 00000000`00000000 ffff8007`54594cf0 00000002`4828fb29 : nt!MmAccessFault+0x34f
ffffcc88`abd17660 fffff802`4abd2793 : ffff8007`5cab3b00 ffff8007`4fbaf4f0 ffff8007`5a7634d0 fffff802`4a9a2eda : nt!KiPageFault+0x35e
ffffcc88`abd177f0 fffff802`4aa71819 : ffff8007`545d29b0 00000000`00000000 fffff802`4ae03000 ffff8007`51f15201 : Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323
ffffcc88`abd17860 fffff802`4aa04b0f : fffff802`4aa71790 ffffcc88`abd17990 ffff8007`51f15200 00000000`00000000 : Netwtw06!mmacAlDispatchCmdRespCbJob+0x89
ffffcc88`abd17890 fffff802`321e0722 : ffff8007`590a2040 ffff8007`54061960 00000000`00000000 fffff802`321e0710 : Netwtw06!prvJobScheduler_jobExecuter+0x45f
ffffcc88`abd179d0 fffff802`2ca91fef : 00000000`00000000 ffff8007`590a1040 ffff8007`00000000 fffff802`45005050 : ndis!ndisDispatchIoWorkItem+0x12
ffffcc88`abd17a00 fffff802`2ca83aa5 : ffff8007`4f67e5f0 ffff8007`590a2040 fffff802`2ca91ef0 00000000`0000000c : nt!IopProcessWorkItem+0xff
ffffcc88`abd17a70 fffff802`2cb1e235 : ffff8007`590a2040 00000000`00000080 ffff8007`4f67f040 fffff802`2cbcb6a0 : nt!ExpWorkerThread+0x105
ffffcc88`abd17b10 fffff802`2cbca1d8 : ffffab00`862de180 ffff8007`590a2040 fffff802`2cb1e1e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffcc88`abd17b60 00000000`00000000 : ffffcc88`abd18000 ffffcc88`abd11000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Netwtw06!prvMvmManagerTimeEventResponseHandler+323
MODULE_NAME: Netwtw06
IMAGE_NAME: Netwtw06.sys
IMAGE_VERSION: 20.50.0.5
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 323
FAILURE_BUCKET_ID: AV_INVALID_Netwtw06!prvMvmManagerTimeEventResponseHandler
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d71428cf-496d-5e77-45fa-f3ffc163411a}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb452768c0a00, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80174cf2793, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5780
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17053
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffb452768c0a00
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80174cf2793
BUGCHECK_P4: 2
READ_ADDRESS: fffff8015ab713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8015aa283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8015aa283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb452768c0a00
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe909a36b0660 -- (.trap 0xffffe909a36b0660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000003e01 rbx=0000000000000000 rcx=00000008fffffff7
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80174cf2793 rsp=ffffe909a36b07f0 rbp=0000000000000000
r8=ffffb40a6ca3f940 r9=0000000000000006 r10=ffffb40a6c683840
r11=ffffe909a36b07d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323:
fffff801`74cf2793 8984cea8000000 mov dword ptr [rsi+rcx*8+0A8h],eax ds:00000048`00000060=????????
Resetting default scope
STACK_TEXT:
ffffe909`a36b03b8 fffff801`5a7ed75a : 00000000`00000050 ffffb452`768c0a00 00000000`00000002 ffffe909`a36b0660 : nt!KeBugCheckEx
ffffe909`a36b03c0 fffff801`5a65889f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffb452`768c0a00 : nt!MiSystemFault+0x1c62fa
ffffe909`a36b04c0 fffff801`5a7d0c5e : ffffe909`a36b07c8 00000000`00000000 ffffb40a`6e67aaa0 00000001`06f39541 : nt!MmAccessFault+0x34f
ffffe909`a36b0660 fffff801`74cf2793 : ffffb40a`782409c0 ffffb40a`76ecaee0 ffffb40a`768c09a0 fffff801`74ac2eda : nt!KiPageFault+0x35e
ffffe909`a36b07f0 fffff801`74b91819 : ffffb40a`72c459b0 00000000`00000000 fffff801`74f23000 00000000`00000001 : Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323
ffffe909`a36b0860 fffff801`74b24b0f : fffff801`74b91790 ffffe909`a36b0990 ffffb40a`6ef73a70 00000000`00000000 : Netwtw06!mmacAlDispatchCmdRespCbJob+0x89
ffffe909`a36b0890 fffff801`5cdd0722 : ffffb40a`6e729580 ffffb40a`72c5e140 00000000`00000000 fffff801`5cdd0710 : Netwtw06!prvJobScheduler_jobExecuter+0x45f
ffffe909`a36b09d0 fffff801`5a691fef : 00000000`00000000 ffffb40a`751f5080 ffffb40a`00000000 fffff801`6f8f5050 : ndis!ndisDispatchIoWorkItem+0x12
ffffe909`a36b0a00 fffff801`5a683aa5 : ffffb40a`6c6e0a20 ffffb40a`6e729580 fffff801`5a691ef0 ffffd900`0000000f : nt!IopProcessWorkItem+0xff
ffffe909`a36b0a70 fffff801`5a71e235 : ffffb40a`6e729580 00000000`00000080 ffffb40a`6c6cf080 000024ef`bd9bbfff : nt!ExpWorkerThread+0x105
ffffe909`a36b0b10 fffff801`5a7ca1d8 : ffffd900`dd379180 ffffb40a`6e729580 fffff801`5a71e1e0 00000050`0000001c : nt!PspSystemThreadStartup+0x55
ffffe909`a36b0b60 00000000`00000000 : ffffe909`a36b1000 ffffe909`a36aa000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Netwtw06!prvMvmManagerTimeEventResponseHandler+323
MODULE_NAME: Netwtw06
IMAGE_NAME: Netwtw06.sys
IMAGE_VERSION: 20.50.0.5
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 323
FAILURE_BUCKET_ID: AV_INVALID_Netwtw06!prvMvmManagerTimeEventResponseHandler
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d71428cf-496d-5e77-45fa-f3ffc163411a}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa9d7294b9a00, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff800805f2793, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8674
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa9d7294b9a00
BUGCHECK_P2: 2
BUGCHECK_P3: fffff800805f2793
BUGCHECK_P4: 2
READ_ADDRESS: fffff800683713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff800682283b8: Unable to get Flags value from nt!KdVersionBlock
fffff800682283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa9d7294b9a00
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff68481837660 -- (.trap 0xfffff68481837660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000002f01 rbx=0000000000000000 rcx=00000008fffffff7
rdx=fffffffffffffffe rsi=0000000000000000 rdi=0000000000000000
rip=fffff800805f2793 rsp=fffff684818377f0 rbp=0000000000000000
r8=ffffa98f1f5eb580 r9=0000000000000000 r10=ffffa98f1f283cc0
r11=fffff684818377d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323:
fffff800`805f2793 8984cea8000000 mov dword ptr [rsi+rcx*8+0A8h],eax ds:00000048`00000060=????????
Resetting default scope
STACK_TEXT:
fffff684`818373b8 fffff800`67fed75a : 00000000`00000050 ffffa9d7`294b9a00 00000000`00000002 fffff684`81837660 : nt!KeBugCheckEx
fffff684`818373c0 fffff800`67e5889f : fffff684`818375b0 00000000`00000002 00000000`00000000 ffffa9d7`294b9a00 : nt!MiSystemFault+0x1c62fa
fffff684`818374c0 fffff800`67fd0c5e : fffff684`818377c8 00000000`00000000 ffffa98f`212faf60 00000000`06e842aa : nt!MmAccessFault+0x34f
fffff684`81837660 fffff800`805f2793 : ffffa98f`29774060 ffffa98f`297cd6d0 ffffa98f`294b99a0 fffff800`803c2eda : nt!KiPageFault+0x35e
fffff684`818377f0 fffff800`80491819 : ffffa98f`21fd99b0 00000000`00000000 fffff800`80823000 00000000`00000001 : Netwtw06!prvMvmManagerTimeEventResponseHandler+0x323
fffff684`81837860 fffff800`80424b0f : fffff800`80491790 fffff684`81837990 ffffa98f`21ae9ad0 00000000`00000000 : Netwtw06!mmacAlDispatchCmdRespCbJob+0x89
fffff684`81837890 fffff800`6b250722 : 00000000`00000000 ffffa98f`258b4f10 ffffa98f`21386040 fffff800`6b250710 : Netwtw06!prvJobScheduler_jobExecuter+0x45f
fffff684`818379d0 fffff800`67e91fef : 00000000`00000000 ffffa98f`258b4f10 ffffa98f`21f10050 fffff800`7e155050 : ndis!ndisDispatchIoWorkItem+0x12
fffff684`81837a00 fffff800`67e83aa5 : ffffa98f`1f2cea60 ffffa98f`28d2b040 fffff800`67e91ef0 00000000`0000000e : nt!IopProcessWorkItem+0xff
fffff684`81837a70 fffff800`67f1e235 : ffffa98f`28d2b040 00000000`00000080 ffffa98f`1f281040 000024ef`bd9bbfff : nt!ExpWorkerThread+0x105
fffff684`81837b10 fffff800`67fca1d8 : fffff800`640c5180 ffffa98f`28d2b040 fffff800`67f1e1e0 00000001`00000002 : nt!PspSystemThreadStartup+0x55
fffff684`81837b60 00000000`00000000 : fffff684`81838000 fffff684`81831000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80067e9201a-fffff80067e9201f 6 bytes - nt!IopProcessWorkItem+12a
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067e9203a-fffff80067e9203f 6 bytes - nt!ObpFilterOperation+1a (+0x20)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067ea1b2a-fffff80067ea1b2f 6 bytes - nt!ExAcquirePushLockExclusiveEx+1ba (+0xfaf0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067ec0afa-fffff80067ec0aff 6 bytes - nt!CmpAllocatePoolWithTag+1a (+0x1efd0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067ec0bca-fffff80067ec0bcf 6 bytes - nt!RtlUnicodeStringCopy+ca (+0xd0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067ed3c32-fffff80067ed3c37 6 bytes - nt!PspReaper+a2 (+0x13068)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f0c3aa-fffff80067f0c3af 6 bytes - nt!EtwpGetPerfCounter+1a (+0x38778)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f0c3f6-fffff80067f0c3fb 6 bytes - nt!MiIsPdeOrAboveAccessible+46 (+0x4c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f0c48a-fffff80067f0c48f 6 bytes - nt!CcScheduleLazyWriteScan+8e (+0x94)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f1a11e-fffff80067f1a123 6 bytes - nt!ExFreePoolEx+e (+0xdc94)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f1a1a2-fffff80067f1a1a7 6 bytes - nt!MiCleanWorkingSet+7e (+0x84)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f1e262-fffff80067f1e267 6 bytes - nt!PspSystemThreadStartup+82 (+0x40c0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f26986-fffff80067f2698b 6 bytes - nt!PfSnEnablePrefetcherTimerRoutine+26 (+0x8724)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f26a1a-fffff80067f26a1f 6 bytes - nt!PfSnUpdatePrefetcherFlags+8e (+0x94)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f5a24e-fffff80067f5a253 6 bytes - nt!PnpDeviceCompletionRequestDestroyWorkItem+3e (+0x33834)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f763ea-fffff80067f763ef 6 bytes - nt!EmpCheckErrataList+a (+0x1c19c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067f76426-fffff80067f7642b 6 bytes - nt!IoAllocateErrorLogEntry+36 (+0x3c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff80067fc2baa-fffff80067fc2bab 2 bytes - nt!ZwLoadKey3+2a (+0x4c784)
[ 84 00:4c 87 ]
fffff80067fc2bad-fffff80067fc2baf 3 bytes - nt!ZwLoadKey3+2d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80067fc2bca-fffff80067fc2bcb 2 bytes - nt!KiBugCheckReturn+16 (+0x1d)
[ 84 00:4c 87 ]
fffff80067fc2bcd-fffff80067fc2bcf 3 bytes - nt!KiBugCheckReturn+19 (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80067fc2cfa-fffff80067fc2cfb 2 bytes - nt!KeBugCheckEx+12a (+0x12d)
[ 84 00:4c 87 ]
fffff80067fc2cfd-fffff80067fc2cff 3 bytes - nt!KeBugCheckEx+12d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80067fc2dfa-fffff80067fc2dfb 2 bytes - nt!KeContextToKframes+fa (+0xfd)
[ 84 00:4c 87 ]
fffff80067fc2dfd-fffff80067fc2dff 3 bytes - nt!KeContextToKframes+fd (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80067fc2e4a-fffff80067fc2e4b 2 bytes - nt!KiSaveInitialProcessorControlState+4a (+0x4d)
[ 84 00:4c 87 ]
fffff80067fc2e4d-fffff80067fc2e4f 3 bytes - nt!KiSaveInitialProcessorControlState+4d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff80067fc2f1a-fffff80067fc2f1f 6 bytes - nt!KiRestoreProcessorControlState+ca (+0xcd)
[ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
fffff80067fc997a-fffff80067fc997f 6 bytes - nt!KiSwapContext+da (+0x6a60)
[ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
fffff80067fc9a0a-fffff80067fc9a0f 6 bytes - nt!KiDispatchInterruptContinue+4a (+0x90)
[ cc cc cc 0f 1f 00:4c 87 00 98 c3 90 ]
fffff80067fca1ea-fffff80067fca1ef 6 bytes - nt!KiStartSystemThread+3a (+0x7e0)
[ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
fffff800680b297a-fffff800680b297f 6 bytes - nt!KiForceIdleStopDpcRoutine+ea (+0xe8790)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800683e0ae2-fffff800683e0ae7 6 bytes - nt!CmpFree+22
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800683e0b32-fffff800683e0b37 6 bytes - nt!EtwpAdjustFreeBuffers+4a (+0x50)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff8006847e67a-fffff8006847e67f 6 bytes - nt!HvpGetCellPaged+da (+0x9db48)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff8006847ed3a-fffff8006847ed3f 6 bytes - nt!HvpReleaseCellPaged+7a (+0x6c0)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800684d7502-fffff800684d7507 6 bytes - nt!CmpFileWrite+32 (+0x587c8)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800684d8396-fffff800684d839b 6 bytes - nt!CmpFileRead+36 (+0xe94)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800684d83ce-fffff800684d83d3 6 bytes - nt!HvUnlockHiveFlusherExclusive+32 (+0x38)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800684d83ea-fffff800684d83ef 6 bytes - nt!HvLockHiveFlusherExclusive+16 (+0x1c)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800684d843e-fffff800684d8443 6 bytes - nt!CmpVolumeContextMustHiveFilePagesBeKeptLocal+4e (+0x54)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800684da85e-fffff800684da863 6 bytes - nt!CmpAllocate+5e (+0x2420)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800684da8b6-fffff800684da8bb 6 bytes - nt!CmpClaimGlobalQuota+52 (+0x58)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800684da8e6-fffff800684da8eb 6 bytes - nt!CmpUpdateGlobalQuotaAllowed+2a (+0x30)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800686ca0da-fffff800686ca0df 6 bytes - nt!PspProcessRundownWorker+aa (+0x1ef7f4)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff800686ca142-fffff800686ca147 6 bytes - nt!PspProcessRundownWorkerSingle+62 (+0x68)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
241 errors : !nt (fffff80067e9201a-fffff800686ca147)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.