1) Corsair yazılımını kaldırın.
2) Ses sürücünüzü DDU ile kaldırıp aşağıdan indireceğiniz ses sürücüsünü kurun.
3) Sanal belleğinizi kapatın. Kapatma ve açma işlemleri sonrasında sisteminizi yeniden başlatmalısınız, bilgilendireyim.
Selam, bugün sizlerle akıllarda soru işareti bırakan sanal bellek konusunu ele alacağız. Öncelikle sanal bellek nedir ve ne işe yarar bunu bir görelim. Sanal bellek; sisteminizde bulunan fiziksel RAM’in yetmediği durumlarda devreye giren ve RAM’i taklit eden bir yapıdır. Tabii bu yapı bizim...
www.technopat.net
Ek olarak BIOS sürümünüz beta sürümünde, yani 4203 sürümünde. Onu da beta olmayan bir önceki sürüme döndürebilirseniz fena olmaz.
Sorun çözülürse ya da çözülmezse belirtirseniz sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff9bfffec8c00
Arg3: 0000a10000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4764
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9726
Key : Analysis.Init.CPU.mSec
Value: 952
Key : Analysis.Init.Elapsed.mSec
Value: 9920
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : MemoryManagement.PFN
Value: a10000000
FILE_IN_CAB: 030522-6937-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff9bfffec8c00
BUGCHECK_P3: a10000000000
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WerFault.exe
STACK_TEXT:
fffffa87`ecc76128 fffff806`584440ca : 00000000`0000001a 00000000`00041792 fffff9bf`ffec8c00 0000a100`00000000 : nt!KeBugCheckEx
fffffa87`ecc76130 fffff806`5849e5c6 : 00000000`00000000 fffff9fc`dffff640 00000000`0000000b fffff9bf`ffec8c00 : nt!MiDeleteVa+0x153a
fffffa87`ecc76230 fffff806`5849e6db : fffff9fc`dffff640 ffffdb09`68d9d700 fffffa87`00000000 fffffa87`ecc766a0 : nt!MiWalkPageTablesRecursively+0x776
fffffa87`ecc762d0 fffff806`5849e6db : fffff9fc`fe6ffff8 ffffdb09`68d9d700 fffffa87`00000001 fffffa87`ecc766b0 : nt!MiWalkPageTablesRecursively+0x88b
fffffa87`ecc76370 fffff806`5849e6db : fffff9fc`fe6ff000 ffffdb09`68d9d700 fffffa87`00000002 fffffa87`ecc766c0 : nt!MiWalkPageTablesRecursively+0x88b
fffffa87`ecc76410 fffff806`58404f4b : 00000000`00000000 ffffdb09`68d9d700 00000000`00000003 fffffa87`ecc766d0 : nt!MiWalkPageTablesRecursively+0x88b
fffffa87`ecc764b0 fffff806`58442961 : fffffa87`ecc76650 00000000`00000000 fffff9be`00000002 fffff9fc`00000000 : nt!MiWalkPageTables+0x36b
fffffa87`ecc765b0 fffff806`58412aa0 : 00000000`00000001 fffffa87`00000000 ffffdb09`68d9d550 ffffdb09`66fc7040 : nt!MiDeletePagablePteRange+0x4f1
fffffa87`ecc768c0 fffff806`588011b9 : ffffdb09`6aea48a0 00000000`00000000 ffffdb09`00000000 ffffdb09`00000000 : nt!MiDeleteVad+0x360
fffffa87`ecc769d0 fffff806`58800850 : ffffdb09`6aea48a0 ffffdb09`6650a010 ffffdb09`66fc7040 00000000`00000000 : nt!MiUnmapVad+0x49
fffffa87`ecc76a00 fffff806`587feb1f : ffffdb09`6aea44e0 ffffdb09`6aea44e0 ffffdb09`6aea48a0 ffffdb09`68d9d080 : nt!MiCleanVad+0x30
fffffa87`ecc76a30 fffff806`5885c6e8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdb09`68d9d080 : nt!MmCleanProcessAddressSpace+0x137
fffffa87`ecc76ab0 fffff806`58b07b92 : ffffdb09`66136080 ffffdb09`68d9d080 fffff806`58b07b60 00000000`00000100 : nt!PspRundownSingleProcess+0x20c
fffffa87`ecc76b40 fffff806`584b86c5 : ffffdb09`66fc7040 fffff806`58898cd0 ffffdb09`596888e0 ffffdb09`00000000 : nt!PspProcessRundownWorkerSingle+0x32
fffffa87`ecc76b70 fffff806`58555a05 : ffffdb09`66fc7040 00000000`00000080 ffffdb09`59692200 f4547360`00000001 : nt!ExpWorkerThread+0x105
fffffa87`ecc76c10 fffff806`585fea08 : ffffa301`625c0180 ffffdb09`66fc7040 fffff806`585559b0 c16c0c5d`000c6e00 : nt!PspSystemThreadStartup+0x55
fffffa87`ecc76c60 00000000`00000000 : fffffa87`ecc77000 fffffa87`ecc71000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiDeleteVa+153a
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1526
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 153a
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132909464804802135
PnpEventInformation: 2
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : PCI\VEN_1002&DEV_AAF0&SUBSYS_AAF01DA2&REV_00\4&2ae1b128&0&0119
VetoString :
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb60d76c00000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80113223fa3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 6983
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9236
Key : Analysis.Init.CPU.mSec
Value: 905
Key : Analysis.Init.Elapsed.mSec
Value: 14431
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
FILE_IN_CAB: 030522-8546-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffb60d76c00000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80113223fa3
BUGCHECK_P4: 2
READ_ADDRESS: fffff801116fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb60d76c00000
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff18629794bf0 -- (.trap 0xfffff18629794bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb60d769028e8 rbx=0000000000000000 rcx=ffffb60d76c00040
rdx=ffffffffffffff58 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80113223fa3 rsp=fffff18629794d88 rbp=fffff18629795be0
r8=0000000000000008 r9=03ffffffffff40a1 r10=fffff80111031980
r11=ffffb60d769027e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
Ntfs+0x33fa3:
fffff801`13223fa3 0f2b49c0 movntps xmmword ptr [rcx-40h],xmm1 ds:ffffb60d`76c00000=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff186`29794948 fffff801`10e1ecf1 : 00000000`00000050 ffffb60d`76c00000 00000000`00000002 fffff186`29794bf0 : nt!KeBugCheckEx
fffff186`29794950 fffff801`10c0c960 : 00000000`00000114 00000000`00000002 fffff186`29794c70 00000000`00000000 : nt!MiSystemFault+0x1f44e1
fffff186`29794a50 fffff801`10e03f5e : fffff186`29794fa0 ffffdf84`c6be6920 00000000`00000000 ffff8d84`1f91a6c0 : nt!MmAccessFault+0x400
fffff186`29794bf0 fffff801`13223fa3 : fffff801`133056c8 fffff186`29794fa0 ffff8d84`3d1b2bf0 00000000`00182000 : nt!KiPageFault+0x35e
fffff186`29794d88 fffff801`133056c8 : fffff186`29794fa0 ffff8d84`3d1b2bf0 00000000`00182000 00000001`00000000 : Ntfs+0x33fa3
fffff186`29794d90 fffff801`1330f0b9 : ffff8d84`3f7f4170 fffff186`297951f0 ffff8d84`3d1b2bf0 00000000`00000000 : Ntfs+0x1156c8
fffff186`29794e40 fffff801`1330eea1 : 00000000`00000030 ffff8d84`3f7f4170 fffff186`29794fa0 00000000`00004000 : Ntfs+0x11f0b9
fffff186`29794f10 fffff801`1343f631 : fffff186`29795840 fffff186`297965d1 fffff801`00000000 ffff8d84`3f7ac010 : Ntfs+0x11eea1
fffff186`29795180 fffff801`134353a1 : ffff8d84`3f7f4170 ffff8d84`3f7f4010 fffff186`29795840 fffff801`13258030 : Ntfs+0x24f631
fffff186`297953c0 fffff801`1343ba3c : fffff186`29795840 00000000`00000000 fffff801`13261cb0 00000000`000007e6 : Ntfs+0x2453a1
fffff186`29795600 fffff801`13241b43 : fffff801`132418a0 ffffdf84`c6c2a180 ffffdf84`c6c2a180 00000000`00000000 : Ntfs+0x24ba3c
fffff186`29795b80 fffff801`10d17e85 : ffffdf84`d4af6080 ffffdf84`d4af6080 fffff801`132418a0 ffffdf84`c6c2a180 : Ntfs+0x51b43
fffff186`29795c10 fffff801`10dfd498 : ffff9d80`9aee6180 ffffdf84`d4af6080 fffff801`10d17e30 fffff186`29795ec0 : nt!PspSystemThreadStartup+0x55
fffff186`29795c60 00000000`00000000 : fffff186`29796000 fffff186`29790000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Ntfs+33fa3
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 33fa3
FAILURE_BUCKET_ID: AV_W_(null)_Ntfs!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {41fb6853-8c2a-bd88-5d70-a56f176592ca}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa33ffdc0a1c0
Arg3: 0000f70000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5608
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8618
Key : Analysis.Init.CPU.mSec
Value: 983
Key : Analysis.Init.Elapsed.mSec
Value: 9053
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : MemoryManagement.PFN
Value: f70000000
FILE_IN_CAB: 030522-6562-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffa33ffdc0a1c0
BUGCHECK_P3: f70000000000
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WmiPrvSE.exe
STACK_TEXT:
ffff8a0c`622ba0c8 fffff802`5369d0fa : 00000000`0000001a 00000000`00041792 ffffa33f`fdc0a1c0 0000f700`00000000 : nt!KeBugCheckEx
ffff8a0c`622ba0d0 fffff802`5360b9e6 : 00000000`00000000 00000000`00000000 00000000`00000044 ffffa33f`fdc0a1c0 : nt!MiDeleteVa+0x153a
ffff8a0c`622ba1d0 fffff802`5360bafb : ffffa351`9ffee050 ffffb38b`1a51c700 ffff8a0c`00000000 ffff8a0c`622ba640 : nt!MiWalkPageTablesRecursively+0x776
ffff8a0c`622ba270 fffff802`5360bafb : ffffa351`a8cfff70 ffffb38b`1a51c700 ffff8a0c`00000001 ffff8a0c`622ba650 : nt!MiWalkPageTablesRecursively+0x88b
ffff8a0c`622ba310 fffff802`5360bafb : ffffa351`a8cff000 ffffb38b`1a51c700 ffff8a0c`00000002 ffff8a0c`622ba660 : nt!MiWalkPageTablesRecursively+0x88b
ffff8a0c`622ba3b0 fffff802`5365de6b : ffff59c1`10ec8a00 ffffb38b`1a51c700 ffff8a0c`00000003 ffff8a0c`622ba670 : nt!MiWalkPageTablesRecursively+0x88b
ffff8a0c`622ba450 fffff802`5369b991 : ffff8a0c`622ba5f0 ffffb38b`00000000 ffffa351`00000002 ffffffff`00000000 : nt!MiWalkPageTables+0x36b
ffff8a0c`622ba550 fffff802`5366baf0 : 00000000`00000001 ffff8a0c`00000000 ffffb38b`1a51c550 ffffb38b`1a5200c0 : nt!MiDeletePagablePteRange+0x4f1
ffff8a0c`622ba860 fffff802`53a36189 : ffffb38b`0fffa570 00000000`00000000 00000000`00000000 ffffb38b`00000000 : nt!MiDeleteVad+0x360
ffff8a0c`622ba970 fffff802`53a35f62 : ffffb38b`1d5cc0e0 00007ffb`81130000 ffffb38b`1a51c080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8a0c`622ba9a0 fffff802`53a35dd9 : ffffb38b`1a5200c0 fffff802`538077b8 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffff8a0c`622baa80 fffff802`53ad94fc : ffffb38b`1a5200c0 000001f8`aa43c920 00000000`00000001 ffffb38b`1a51c080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8a0c`622baad0 fffff802`538077b8 : ffffb38b`1a5200c0 00000000`00000000 ffff8a0c`00000001 ffffb38b`00000000 : nt!NtUnmapViewOfSection+0xc
ffff8a0c`622bab00 00007ffb`818ed264 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000b`534fc548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`818ed264
SYMBOL_NAME: nt!MiDeleteVa+153a
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 153a
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbc86d30c02a8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8017cc3867b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 6265
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9984
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 13536
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
FILE_IN_CAB: 030522-8625-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffbc86d30c02a8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8017cc3867b
BUGCHECK_P4: 2
READ_ADDRESS: fffff80180afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffbc86d30c02a8
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffec89015bf280 -- (.trap 0xffffec89015bf280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc86d30c0288 rbx=0000000000000000 rcx=ffff97075ddcfa60
rdx=ffff97075e20bc90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017cc3867b rsp=ffffec89015bf410 rbp=ffffec89015bf589
r8=ffffffffffffffff r9=7fff97075ddcfa48 r10=fffff801800609e0
r11=ffff9707531b4040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
FLTMGR!TreeUnlinkMulti+0x4b:
fffff801`7cc3867b 483b7020 cmp rsi,qword ptr [rax+20h] ds:ffffbc86`d30c02a8=????????????????
Resetting default scope
STACK_TEXT:
ffffec89`015befd8 fffff801`8021ecf1 : 00000000`00000050 ffffbc86`d30c02a8 00000000`00000000 ffffec89`015bf280 : nt!KeBugCheckEx
ffffec89`015befe0 fffff801`8000c960 : 00000000`00000000 00000000`00000000 ffffec89`015bf300 00000000`00000000 : nt!MiSystemFault+0x1f44e1
ffffec89`015bf0e0 fffff801`80203f5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000014 : nt!MmAccessFault+0x400
ffffec89`015bf280 fffff801`7cc3867b : ffff9707`531b4690 fffff801`80060ace ffff9707`531b4040 ffff9707`5ddcfa48 : nt!KiPageFault+0x35e
ffffec89`015bf410 fffff801`7cc6c437 : ffff9707`5ddcf9e0 ffff9707`00000000 ffffec89`00000000 ffff9707`531e10a0 : FLTMGR!TreeUnlinkMulti+0x4b
ffffec89`015bf460 fffff801`7cc365be : ffff9707`5c2eda20 ffff9707`5e20bc90 ffffec89`015bf589 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject+0xb7
ffffec89`015bf4d0 fffff801`7cc35b37 : ffffec89`015bf700 ffff9707`00000002 ffff9707`5311fd00 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x89e
ffffec89`015bf5f0 fffff801`7cc34b46 : ffffec89`015c0000 ffffec89`015ba000 ffff9707`5b6e1b20 ffffec89`015bf710 : FLTMGR!FltpPassThroughInternal+0xc7
ffffec89`015bf640 fffff801`7cc348bb : ffffffff`fffe7960 00000000`00000000 00000000`00000000 00000000`00000080 : FLTMGR!FltpPassThrough+0x1d6
ffffec89`015bf6e0 fffff801`80052f55 : ffff9707`5e20bc90 fffff801`80055758 ffff9707`531ef1f0 005000d0`00000000 : FLTMGR!FltpDispatch+0x8b
ffffec89`015bf740 fffff801`80400f9a : ffff9707`5e20bc90 ffffc386`c8b9e3b0 ffff9707`5311fd60 ffff9707`5311fd60 : nt!IofCallDriver+0x55
ffffec89`015bf780 fffff801`803fb300 : ffffc386`c8b9e3b0 00000000`00000000 ffff9707`4d964a60 fffff801`807b1019 : nt!IopDeleteFile+0x13a
ffffec89`015bf800 fffff801`80061277 : 00000000`00000000 00000000`00000000 ffffc386`c8b9e3b0 ffff9707`5e20bc90 : nt!ObpRemoveObjectRoutine+0x80
ffffec89`015bf860 fffff801`8006119e : 00000000`00000000 ffff9707`5c68dc70 ffff9707`5c68dc70 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffffec89`015bf8a0 fffff801`8043e459 : 00000000`00000017 00000000`000800a1 fffff801`80a50c80 ffffc386`c8b9e3b0 : nt!HalPutDmaAdapter+0xe
ffffec89`015bf8d0 fffff801`801843bd : 00000000`00000001 00000000`00000000 ffffec89`015bf9a0 ffff9707`5c68dc78 : nt!MiSegmentDelete+0x155
ffffec89`015bf920 fffff801`801b9259 : 00000000`00000000 fffff801`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
ffffec89`015bf9e0 fffff801`80117e85 : ffff9707`531b4040 ffff9707`531b4040 00000000`00000080 fffff801`801b9130 : nt!MiDereferenceSegmentThread+0x129
ffffec89`015bfc10 fffff801`801fd498 : ffffae80`40240180 ffff9707`531b4040 fffff801`80117e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffec89`015bfc60 00000000`00000000 : ffffec89`015c0000 ffffec89`015ba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: FLTMGR!TreeUnlinkMulti+4b
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b
FAILURE_BUCKET_ID: AV_R_(null)_FLTMGR!TreeUnlinkMulti
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {19d2f5d5-fdf4-c5b2-f8ec-915b9de0c51b}
Followup: MachineOwner
---------[/CODE]