4-5 kez etiket alınca yanlış bir şey yaptım sandım korktumAga adamı niye bin kez etiketliyorsunuz hoş değil cidden.
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffb900007fffc8
Arg3: 00e1000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9043
Key : Analysis.Init.CPU.mSec
Value: 280
Key : Analysis.Init.Elapsed.mSec
Value: 5845
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : MemoryManagement.PFN
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffb900007fffc8
BUGCHECK_P3: e1000000000000
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
STACK_TEXT:
ffffcf80`38453478 fffff805`5be9d0fa : 00000000`0000001a 00000000`00041792 ffffb900`007fffc8 00e10000`00000000 : nt!KeBugCheckEx
ffffcf80`38453480 fffff805`5be9b92f : ffffa20f`b1db6700 00000000`00000000 ffffcf80`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffffcf80`38453580 fffff805`5be6baf0 : 00000000`00000001 ffffcf80`00000000 ffffa20f`b1db6550 ffffa20f`ae6cb080 : nt!MiDeletePagablePteRange+0x48f
ffffcf80`38453890 fffff805`5c2360d9 : ffffa20f`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffcf80`384539a0 fffff805`5c235eb2 : ffffa20f`b3212020 00000000`00000000 ffffa20f`b1db6080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffcf80`384539d0 fffff805`5c235d29 : 00000082`6ceff780 00000082`6ceff700 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffcf80`38453ab0 fffff805`5c0074b8 : ffffa20f`ae6cb080 00000000`ffff0000 ffffcf80`38453b80 ffffa20f`b1db6080 : nt!NtUnmapViewOfSectionEx+0x99
ffffcf80`38453b00 00007ffb`f56aff94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000082`6ceff7b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f56aff94
SYMBOL_NAME: nt!MiDeleteVa+153a
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 153a
FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}
Followup: MachineOwner
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80773d12efc, Address of the instruction which caused the bugcheck
Arg3: ffff80867247c870, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2702
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6261
Key : Analysis.Init.CPU.mSec
Value: 280
Key : Analysis.Init.Elapsed.mSec
Value: 1826
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80773d12efc
BUGCHECK_P3: ffff80867247c870
BUGCHECK_P4: 0
CONTEXT: ffff80867247c870 -- (.cxr 0xffff80867247c870)
rax=8000000000000000 rbx=ffff9404eaab4080 rcx=ffffc70000000000
rdx=064281e32f43f3ff rsi=0a4fc70003375a80 rdi=0000000000000004
rip=fffff80773d12efc rsp=ffff80867247d270 rbp=ffff80867247d329
r8=ffff9404f057a398 r9=ffff9404ef800000 r10=00000000000000a9
r11=fffffd0000000000 r12=ffff9404edea1560 r13=0000000000000000
r14=ffff9404ef8559d8 r15=fffffd0112a86330
iopl=0 nv up ei pl nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050203
nt!MiProcessCrcList+0x13c:
fffff807`73d12efc 8b7e10 mov edi,dword ptr [rsi+10h] ds:002b:0a4fc700`03375a90=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff8086`7247d270 fffff807`73d13a37 : 00000000`00000000 ffffc700`0c5da7d0 00000000`00000080 00000000`00000001 : nt!MiProcessCrcList+0x13c
ffff8086`7247d390 fffff807`73d12b64 : 00000000`00000000 00000000`00000000 ffff8086`7247d5c0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x4e7
ffff8086`7247d4c0 fffff807`73d12942 : 00000000`0000000d 000000e7`2ed7fa50 00000000`00000000 00000000`00000002 : nt!MiCombineIdenticalPages+0x214
ffff8086`7247d730 fffff807`73bd0722 : 00000000`00000000 00000000`00000000 ffffa400`900cf180 00000000`00000001 : nt!MmCombineIdenticalPages+0x42
ffff8086`7247d770 fffff807`73a074b8 : ffff9404`eaab0000 00000000`00000000 ffff8086`7247db80 00000000`00000000 : nt!NtSetSystemInformation+0x13d2
ffff8086`7247db00 00007ffe`9d72fb54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e7`2ed7f9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`9d72fb54
SYMBOL_NAME: nt!MiProcessCrcList+13c
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .cxr 0xffff80867247c870 ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 13c
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!MiProcessCrcList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d7db7768-4133-3f2f-1a28-ac11cb6d4f46}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80729ec43de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffd92b80111f7c, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2686
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17813
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 2647
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80729ec43de
BUGCHECK_P3: 0
BUGCHECK_P4: ffffd92b80111f7c
READ_ADDRESS: fffff8072a4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd92b80111f7c
EXCEPTION_PARAMETER2: ffffd92b80111f7c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: conhost.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffa501`cc04a768 fffff807`29c914d3 : 00000000`0000001e ffffffff`c0000005 fffff807`29ec43de 00000000`00000000 : nt!KeBugCheckEx
ffffa501`cc04a770 fffff807`29c07bac : 00000000`00001000 ffffa501`cc04b010 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166ad3
ffffa501`cc04ae30 fffff807`29c03d43 : ffff820c`00000640 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffa501`cc04b010 fffff807`29ec43de : fffff807`29e2d9c8 00000000`00000000 00000007`df593950 00000000`00000001 : nt!KiPageFault+0x443
ffffa501`cc04b1a8 fffff807`29e2d9c8 : 00000000`00000000 00000007`df593950 00000000`00000001 00000000`00000001 : nt!MiFindClearVadBitsAligned+0x4e
ffffa501`cc04b1b0 fffff807`29e2d6c4 : 00000000`00000000 ffff820c`190b9080 00000000`00200000 00000000`00000000 : nt!MiFindEmptyAddressRange+0x278
ffffa501`cc04b230 fffff807`29eceab0 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00200000 : nt!MiSelectUserAddress+0x114
ffffa501`cc04b2d0 fffff807`29e39762 : 00000000`00000000 00000000`00000000 00000000`00200000 00000000`00000000 : nt!MiAllocateNewSubAllocatedRegion+0x11c
ffffa501`cc04b3a0 fffff807`29e3953f : ffff820c`00000000 00000000`00001000 ffffa501`cc04b518 00000000`00000000 : nt!MiAllocateFromSubAllocatedRegion+0x1ea
ffffa501`cc04b460 fffff807`29efa130 : 00000000`00000000 ffffa501`cc04bc50 ffff820c`190b9080 00000000`00000000 : nt!MiCreatePebOrTeb+0x43
ffffa501`cc04b490 fffff807`29ef5ad6 : 00000000`001022ae ffffa501`cc04bc50 00000000`00000000 00000000`00000000 : nt!MmCreatePeb+0x178
ffffa501`cc04b660 fffff807`29e6c8b7 : 00000000`00000000 ffffa501`cc04bc50 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x1ed6
ffffa501`cc04bbd0 fffff807`29c074b8 : ffff820c`19a48080 ffff820c`0ae78080 00000000`00000000 00000000`00000000 : nt!NtCreateUserProcess+0xa17
ffffa501`cc04c390 fffff807`29bf98e0 : fffff807`35d2ac74 00000000`00000000 00000000`000001d4 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffa501`cc04c598 fffff807`35d2ac74 : 00000000`00000000 00000000`000001d4 00000000`00000000 ffffa501`cc04c610 : nt!KiServiceLinkage
ffffa501`cc04c5a0 fffff807`35d2a833 : 00000000`004d3e10 00000000`00000000 ffffa501`cc04cb80 00000000`00000000 : condrv+0xac74
ffffa501`cc04c750 fffff807`35d289a8 : ffff820c`19a48080 00000000`00000730 ffff820c`0aef64e0 00000000`004d3e10 : condrv+0xa833
ffffa501`cc04c850 fffff807`35d2ad2d : 00000000`004d3e10 fffff807`35d2acd0 ffff820c`183aec60 ffff820c`1672ae00 : condrv+0x89a8
ffffa501`cc04c890 fffff807`29dfcee2 : 00000000`00500037 00000000`00000000 00000000`00000000 ffff820c`183aec60 : condrv+0xad2d
ffffa501`cc04c8e0 fffff807`29dfcb46 : 00007ff8`8ecc9824 00000000`00000000 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x382
ffffa501`cc04ca20 fffff807`29c074b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000210 : nt!NtDeviceIoControlFile+0x56
ffffa501`cc04ca90 00007ff8`8f48c704 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`001ae258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`8f48c704
SYMBOL_NAME: condrv+ac74
MODULE_NAME: condrv
IMAGE_NAME: condrv.sys
IMAGE_VERSION: 10.0.19041.844
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ac74
FAILURE_BUCKET_ID: 0x1E_c0000005_R_condrv!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec84a084-86ed-9824-a76b-45cee311a9e0}
Followup: MachineOwner