ThinkPad L480 mavi ekran hatası

RAM arızası diyorum. Test ediniz:



BIOS sürümünüz eski, günceller misiniz?




Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa5bffbe2d288
Arg3: 0000020000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3780

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7273

    Key  : Analysis.Init.CPU.mSec
    Value: 655

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1594

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : MemoryManagement.PFN
    Value: 20000000

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020922-8093-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffa5bffbe2d288

BUGCHECK_P3: 20000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Teams.exe

STACK_TEXT:  
ffff888a`189d6e78 fffff803`1ba440ca     : 00000000`0000001a 00000000`00041792 ffffa5bf`fbe2d288 00000200`00000000 : nt!KeBugCheckEx
ffff888a`189d6e80 fffff803`1ba9e556     : 00000000`00000000 00000000`00000000 00000000`00000b34 ffffa5bf`fbe2d288 : nt!MiDeleteVa+0x153a
ffff888a`189d6f80 fffff803`1ba9e66b     : ffffa5d2`00000000 ffffbf05`e54c3700 ffff888a`00000000 ffff888a`189d73f0 : nt!MiWalkPageTablesRecursively+0x776
ffff888a`189d7020 fffff803`1ba9e66b     : ffffa5d2`e96ffef8 ffffbf05`e54c3700 ffff888a`00000001 ffff888a`189d7400 : nt!MiWalkPageTablesRecursively+0x88b
ffff888a`189d70c0 fffff803`1ba9e66b     : ffffa5d2`e96ff000 ffffbf05`e54c3700 ffff888a`00000002 ffff888a`189d7410 : nt!MiWalkPageTablesRecursively+0x88b
ffff888a`189d7160 fffff803`1ba04f4b     : 00000000`00000000 ffffbf05`e54c3700 ffffe380`00000003 ffff888a`189d7420 : nt!MiWalkPageTablesRecursively+0x88b
ffff888a`189d7200 fffff803`1ba42961     : ffff888a`189d73a0 ffffbf05`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff888a`189d7300 fffff803`1ba12aa0     : 00000000`00000001 ffff888a`00000000 ffffbf05`e54c3550 ffffbf05`dd45b500 : nt!MiDeletePagablePteRange+0x4f1
ffff888a`189d7610 fffff803`1be01149     : ffffbf05`e2a70720 00000000`00000000 ffffbf05`00000000 ffffbf05`00000000 : nt!MiDeleteVad+0x360
ffff888a`189d7720 fffff803`1be007e0     : ffffbf05`e2a70720 ffffbf05`e4321d00 ffffbf05`dd45b500 00000000`00000000 : nt!MiUnmapVad+0x49
ffff888a`189d7750 fffff803`1bdfeaaf     : ffffbf05`e5b65280 ffffbf05`e5b65280 ffffbf05`e2a70720 ffffbf05`e54c3080 : nt!MiCleanVad+0x30
ffff888a`189d7780 fffff803`1be5c5a8     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffbf05`e54c3080 : nt!MmCleanProcessAddressSpace+0x137
ffff888a`189d7800 fffff803`1beb0fe6     : ffffbf05`e54c3080 ffffaa82`3bb70060 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff888a`189d7890 fffff803`1beb454e     : ffffbf05`00000000 00000000`00000001 00000000`00000000 000000a4`f150e000 : nt!PspExitThread+0x5f6
ffff888a`189d7990 fffff803`1bc08cb5     : ffffbf05`e54c3080 ffffbf05`dd45b500 ffff888a`189d7a80 ffffbf05`e54c3080 : nt!NtTerminateProcess+0xde
ffff888a`189d7a00 00007ff8`e28ed2f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000a4`f1dffc98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e28ed2f4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffeec005b04aa8, Virtual address for the attempted write.
Arg2: 8a00000000200021, PTE contents.
Arg3: ffffc08202b09c80, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3561

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6257

    Key  : Analysis.Init.CPU.mSec
    Value: 656

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1613

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020822-8234-01.dmp

BUGCHECK_CODE:  be

BUGCHECK_P1: ffffeec005b04aa8

BUGCHECK_P2: 8a00000000200021

BUGCHECK_P3: ffffc08202b09c80

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  OUTLOOK.EXE

TRAP_FRAME:  ffffc08202b09c80 -- (.trap 0xffffc08202b09c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffeec005b04a90
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000b314eb1 rsp=ffffc08202b09e10 rbp=ffffeec005b04a90
 r8=ffffadd6eb75b7f8  r9=ffffadd6eb75b000 r10=fffff8000b244550
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff800`0b314eb1 f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffffeec0`05b04aa8=????????????????
Resetting default scope

STACK_TEXT:  
ffffc082`02b09a88 fffff800`0b4754ee     : 00000000`000000be ffffeec0`05b04aa8 8a000000`00200021 ffffc082`02b09c80 : nt!KeBugCheckEx
ffffc082`02b09a90 fffff800`0b29f55f     : 8a000000`00200021 00000000`00000003 ffffc082`02b09d00 00000000`00000000 : nt!MiRaisedIrqlFault+0x142232
ffffc082`02b09ae0 fffff800`0b40525e     : ffffc301`18fe7078 fffff800`0647d088 ffffc082`02b09db1 00000000`00000001 : nt!MmAccessFault+0x4ef
ffffc082`02b09c80 fffff800`0b314eb1     : ffffd80f`38811700 00000000`00000001 ffffc082`02b0a360 ffffadbf`ff0adcc8 : nt!KiPageFault+0x35e
ffffc082`02b09e10 fffff800`0b244c41     : ffffee00`00000000 ffffd80f`00000000 fffff800`00000000 fffff800`0b23a780 : nt!MiLockSetPfnPriority+0x11
ffffc082`02b09e40 fffff800`0b244a6f     : ffffc082`02b0a460 ffffadbf`ff0adcd0 ffffeec0`05b04a90 00000000`00000000 : nt!MiAgePteWorker+0x1a1
ffffc082`02b09ea0 fffff800`0b29e4f6     : ffffc082`02b0a460 ffffadbf`ff0adcd0 00000000`00000000 80004001`e56e3025 : nt!MiAgePte+0x51f
ffffc082`02b09f40 fffff800`0b29e60b     : ffffadd6`00000000 ffffd80f`38811700 00000000`00000000 ffffc082`02b0a4b0 : nt!MiWalkPageTablesRecursively+0x776
ffffc082`02b09fe0 fffff800`0b29e60b     : ffffadd6`eb6fffc0 ffffd80f`38811700 00000000`00000001 ffffc082`02b0a4c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc082`02b0a080 fffff800`0b29e60b     : ffffadd6`eb6ff000 ffffd80f`38811700 00000000`00000002 ffffc082`02b0a4d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc082`02b0a120 fffff800`0b204f4b     : 00000000`00000002 ffffd80f`38811700 ffffc082`00000003 ffffc082`02b0a4e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffc082`02b0a1c0 fffff800`0b2049e1     : ffffc082`02b0a460 00000000`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffc082`02b0a2c0 fffff800`0b2040e9     : 00000000`00000000 00000000`00000000 ffffc301`1b7d61c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffc082`02b0a7d0 fffff800`0b2038f7     : 00000000`00000000 ffffc082`02b0a980 ffffc082`02b0a940 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffc082`02b0a8c0 fffff800`0b2f3860     : fffff800`0bc50b80 ffffc082`02b0a980 00000000`000000da fffff800`00020200 : nt!MiProcessWorkingSets+0x227
ffffc082`02b0a960 fffff800`0b3b5d97     : 00000000`00000008 00000000`00000008 00000000`ffffffff ffffc301`19679180 : nt!MiWorkingSetManager+0x110
ffffc082`02b0aa20 fffff800`0b355935     : ffffd80f`296fa040 00000000`00000080 fffff800`0b3b5c40 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffc082`02b0ab10 fffff800`0b3fe728     : ffffc301`19341180 ffffd80f`296fa040 fffff800`0b3558e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc082`02b0ab60 00000000`00000000     : ffffc082`02b0b000 ffffc082`02b04000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiRaisedIrqlFault+142232

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1415

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  142232

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the BugCheck.
Arg2: 0000359000f5aa50
Arg3: 000000000000000d
Arg4: ffffbe0c57a4fa00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8271

    Key  : Analysis.Init.CPU.mSec
    Value: 639

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1577

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020922-7734-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 359000f5aa50

BUGCHECK_P3: d

BUGCHECK_P4: ffffbe0c57a4fa00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:  
ffffbe0c`57a4f858 fffff802`6c244454     : 00000000`0000001a 00000000`00061941 00003590`00f5aa50 00000000`0000000d : nt!KeBugCheckEx
ffffbe0c`57a4f860 fffff802`6c20545e     : 00000000`80000000 00000000`00000001 00000000`00000000 ffffd68c`00000000 : nt!MmAccessFault+0x1a5384
ffffbe0c`57a4fa00 00007fff`f8a3ec52     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000cf`67dfe090 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`f8a3ec52


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the BugCheck.
Arg2: 0000000020141ad7
Arg3: 0000000000000001
Arg4: 0000000020141ad7

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6587

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1506

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020922-8625-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61948

BUGCHECK_P2: 20141ad7

BUGCHECK_P3: 1

BUGCHECK_P4: 20141ad7

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SDXHelper.exe

STACK_TEXT:  
fffff685`d0dbeca8 fffff806`6d87744a     : 00000000`0000001a 00000000`00061948 00000000`20141ad7 00000000`00000001 : nt!KeBugCheckEx
fffff685`d0dbecb0 fffff806`6d641180     : 00000000`0039cf02 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x13fbd2
fffff685`d0dbed40 fffff806`6d641d3e     : 00000000`00000000 fffff685`d0dbf450 fffff2bf`fdc44000 fffff685`d0dbf3a0 : nt!MiDeletePteRun+0x13b0
fffff685`d0dbef50 fffff806`6d69ea4d     : 00000000`00000000 ffff8007`6fb9d700 fffff685`d0dbf3a0 fffff2bf`fdc43ff8 : nt!MiDeleteVaTail+0x6e
fffff685`d0dbef80 fffff806`6d69e66b     : fffff2f9`00000000 ffff8007`6fb9d700 fffff685`00000000 fffff685`d0dbf3f0 : nt!MiWalkPageTablesRecursively+0xc6d
fffff685`d0dbf020 fffff806`6d69e66b     : fffff2f9`7cafff70 ffff8007`6fb9d700 fffff685`00000001 fffff685`d0dbf400 : nt!MiWalkPageTablesRecursively+0x88b
fffff685`d0dbf0c0 fffff806`6d69e66b     : fffff2f9`7caff000 ffff8007`6fb9d700 fffff685`00000002 fffff685`d0dbf410 : nt!MiWalkPageTablesRecursively+0x88b
fffff685`d0dbf160 fffff806`6d604f4b     : 00000000`00000000 ffff8007`6fb9d700 00000000`00000003 fffff685`d0dbf420 : nt!MiWalkPageTablesRecursively+0x88b
fffff685`d0dbf200 fffff806`6d642961     : fffff685`d0dbf3a0 ffff8007`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff685`d0dbf300 fffff806`6d612aa0     : 00000000`00000001 fffff685`00000000 ffff8007`6fb9d550 ffff8007`6d491080 : nt!MiDeletePagablePteRange+0x4f1
fffff685`d0dbf610 fffff806`6da01149     : ffff8007`7168fc00 00000000`00000000 ffff8007`00000000 ffff8007`00000000 : nt!MiDeleteVad+0x360
fffff685`d0dbf720 fffff806`6da007e0     : ffff8007`7168fc00 ffff8007`6d5a3ab0 ffff8007`6d491080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff685`d0dbf750 fffff806`6d9feaaf     : ffff8007`71699200 ffff8007`71699200 ffff8007`7168fc00 ffff8007`6fb9d080 : nt!MiCleanVad+0x30
fffff685`d0dbf780 fffff806`6da5c5a8     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8007`6fb9d080 : nt!MmCleanProcessAddressSpace+0x137
fffff685`d0dbf800 fffff806`6dab0fe6     : ffff8007`6fb9d080 ffffca85`0b526060 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffff685`d0dbf890 fffff806`6dab454e     : ffff8007`00000000 00000000`00000001 00000000`00000000 000000dd`f3b60000 : nt!PspExitThread+0x5f6
fffff685`d0dbf990 fffff806`6d808cb5     : ffff8007`6fb9d080 ffff8007`6d491080 fffff685`d0dbfa80 fffff685`d0dbfa80 : nt!NtTerminateProcess+0xde
fffff685`d0dbfa00 00007ffb`8aaad2f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000dd`f3cff758 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8aaad2f4


SYMBOL_NAME:  nt!MiDereferenceIoPages+13fbd2

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  13fbd2

FAILURE_BUCKET_ID:  0x1a_61948_nt!MiDereferenceIoPages

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {16899f95-043e-78ea-0aba-e664d76c4fc5}

Followup:     MachineOwner
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff806210082b6, Address of the instruction which caused the BugCheck
Arg3: ffff920668afe7e0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4140

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11565

    Key  : Analysis.Init.CPU.mSec
    Value: 671

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1444

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020922-9906-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff806210082b6

BUGCHECK_P3: ffff920668afe7e0

BUGCHECK_P4: 0

CONTEXT:  ffff920668afe7e0 -- (.cxr 0xffff920668afe7e0)
rax=ffffba84dc346598 rbx=ffffffffffffffff rcx=0000200000000000
rdx=00000000746c6644 rsi=0000200000000000 rdi=ffffe28b59b2ada0
rip=fffff806210082b6 rsp=ffff920668aff1e0 rbp=ffff920668aff499
 r8=00000000ffffffff  r9=7ffff80621a48338 r10=7ffffffffffffffc
r11=ffff920668aff110 r12=0000000000000000 r13=0000000000000000
r14=ffffe28b59b2ad00 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ObfDereferenceObjectWithTag+0x26:
fffff806`210082b6 f0480fc15ed0    lock xadd qword ptr [rsi-30h],rbx ds:002b:00001fff`ffffffd0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RuntimeBroker.exe

STACK_TEXT: 
ffff9206`68aff1e0 fffff806`2100827e     : ffffba84`dc346550 00000000`00000000 00000000`0000000e ffff9206`68aff2e0 : nt!ObfDereferenceObjectWithTag+0x26
ffff9206`68aff220 fffff806`2145390d     : 00000000`00000019 ffffba84`dc346550 ffff9206`68aff2c0 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffff9206`68aff250 fffff806`213ed69e     : 00000000`00000000 ffffba84`dc3461c0 00000000`00000000 00000000`00000000 : nt!CmpTransDereferenceTransaction+0xd
ffff9206`68aff280 fffff806`214733e0     : ffffe28b`59b2ada0 ffffba84`dc346520 00000000`00000000 00000000`00000000 : nt!CmpDeleteKeyObject+0x1ee
ffff9206`68aff310 fffff806`21008357     : 00000000`00000000 00000000`00000000 ffff9206`68aff499 ffffba84`dc346550 : nt!ObpRemoveObjectRoutine+0x80
ffff9206`68aff370 fffff806`213f3b79     : ffffba84`dc346520 00000000`00000000 00000000`00000000 ffffe28b`69a0d080 : nt!ObfDereferenceObjectWithTag+0xc7
ffff9206`68aff3b0 fffff806`2145c855     : ffffe28b`65b4e098 fffff806`21008649 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
ffff9206`68aff4f0 fffff806`2145e6ad     : ffffe28b`65b4e060 ffffe28b`69659080 ffffffff`ffffff01 ffffe28b`69a0d4d8 : nt!ExSweepHandleTable+0xd5
ffff9206`68aff5a0 fffff806`2145c5a0     : ffffffff`ffffffff ffffe28b`69a0d080 ffff9206`68aff5f0 fffff806`214203ac : nt!ObKillProcess+0x35
ffff9206`68aff5d0 fffff806`214b0fe6     : ffffe28b`69a0d080 ffffba84`dc4c67b0 ffff9206`68aff820 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffff9206`68aff660 fffff806`214f5b88     : 00000000`40010004 00000000`00000001 00000000`00000000 00000072`f2645000 : nt!PspExitThread+0x5f6
ffff9206`68aff760 fffff806`2100ef67     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff9206`68aff7a0 fffff806`211fb880     : 00000000`00000000 ffff9206`68aff850 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff9206`68aff850 fffff806`21208d5f     : ffff9206`00000000 00000000`00000001 ffffe28b`69659080 ffff9206`68affa80 : nt!KiInitiateUserApc+0x70
ffff9206`68aff990 00007ff8`5d02d8c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000072`f287f788 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`5d02d8c4


SYMBOL_NAME:  nt!ObfDereferenceObjectWithTag+26

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr 0xffff920668afe7e0 ; kb

BUCKET_ID_FUNC_OFFSET:  26

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObfDereferenceObjectWithTag

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7ebf58a2-0210-7815-d6f6-0e4124026922}

Kod:
Machine ID Information [From Smbios 3.0, DMIVersion 0, Size=2893]
BiosMajorRelease = 1
BiosMinorRelease = 34
FirmwareMajorRelease = 1
FirmwareMinorRelease = 34
BiosVendor = LENOVO
BiosVersion = R0QET57W (1.34 )
BiosReleaseDate = 06/03/2019
SystemManufacturer = LENOVO
SystemProductName = 20LSS11F00
SystemFamily = ThinkPad L480
SystemVersion = ThinkPad L480
SystemSKU = LENOVO_MT_20LS_BU_Think_FM_ThinkPad L480
BaseBoardManufacturer = LENOVO
BaseBoardProduct = 20LSS11F00
BaseBoardVersion = SDK0J40697 WIN
 

Yeni konular

Geri
Yukarı