Tekrar yaşarsanız dosyayı paylaşırsınız.
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`67e00000 PsLoadedModuleList = 0xfffff800`68a2a2b0
Debug session time: Tue May 9 14:25:13.726 2023 (UTC + 3:00)
System Uptime: 1 days 0:00:47.321
Loading Kernel Symbols
...............................................................
...........................................................Page 7f59fd not present in the dump file. Type ".hh dbgerr004" for details
.....
..............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000003e`d12ff018). Type ".hh dbgerr001" for details
Loading unloaded module list
.............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`681fbca0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9384`6f5025c0=000000000000001a
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff9200d3337808
Arg3: 810000044ed41867
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1702
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1711
Key : Analysis.IO.Other.Mb
Value: 15
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 20
Key : Analysis.Init.CPU.mSec
Value: 531
Key : Analysis.Init.Elapsed.mSec
Value: 25591
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: MEMORY.DMP
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff9200d3337808
BUGCHECK_P3: 810000044ed41867
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: NisSrv.exe
STACK_TEXT:
ffff9384`6f5025b8 fffff800`680c6c39 : 00000000`0000001a 00000000`00000403 ffff9200`d3337808 81000004`4ed41867 : nt!KeBugCheckEx
ffff9384`6f5025c0 fffff800`680bf71e : 00000000`00000000 ffff9384`6f502cd0 ffff9200`d3338000 ffff9384`6f502c20 : nt!MiDeletePteRun+0x17b9
ffff9384`6f5027d0 fffff800`6806dd2d : 00000000`00000000 ffffab84`b4b38740 ffff9384`6f502c20 ffff9200`d3337ff8 : nt!MiDeleteVaTail+0x6e
ffff9384`6f502800 fffff800`6806d94b : ffff9249`00000000 ffffab84`b4b38740 ffff9384`00000000 ffff9384`6f502c70 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9384`6f5028a0 fffff800`6806d94b : ffff9249`248034c8 ffffab84`b4b38740 ffff9384`00000001 ffff9384`6f502c80 : nt!MiWalkPageTablesRecursively+0x88b
ffff9384`6f502940 fffff800`6806d94b : ffff9249`24803000 ffffab84`b4b38740 ffff9384`00000002 ffff9384`6f502c90 : nt!MiWalkPageTablesRecursively+0x88b
ffff9384`6f5029e0 fffff800`6806a94b : ffff9249`24924920 ffffab84`b4b38740 000001a6`00000003 ffff9384`6f502ca0 : nt!MiWalkPageTablesRecursively+0x88b
ffff9384`6f502a80 fffff800`680bad31 : ffff9384`6f502c20 ffffab84`00000000 000001a6`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9384`6f502b80 fffff800`6807e830 : 00000000`00000001 ffff9384`00000000 ffffab84`b4b38590 ffffab84`b885d080 : nt!MiDeletePagablePteRange+0x4f1
ffff9384`6f502e90 fffff800`6848555f : ffffab84`b885d080 00000000`00000000 ffffab84`00000000 ffffab84`00000000 : nt!MiDeleteVad+0x360
ffff9384`6f502fa0 fffff800`6842441f : ffffab84`b6a7f290 ffffab84`b6a7f290 ffffab84`c6ab0920 ffffab84`b4b380c0 : nt!MiCleanVad+0x43
ffff9384`6f502fd0 fffff800`68431550 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffab84`b4b380c0 : nt!MmCleanProcessAddressSpace+0x137
ffff9384`6f503050 fffff800`68483f02 : ffffab84`b4b380c0 ffffc201`7b88b060 ffff9384`6f5032a0 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9384`6f5030e0 fffff800`684c8578 : 00000000`000000ff ffffab84`ca436d01 00000000`00000000 0000003e`d1308000 : nt!PspExitThread+0x5f6
ffff9384`6f5031e0 fffff800`680ddf37 : 00000000`00000101 00000000`00000010 00000000`00000010 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff9384`6f503220 fffff800`682010f0 : 000001a6`6642bf10 ffff9384`6f5032d0 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff9384`6f5032d0 fffff800`6820f59f : ffffab84`b885d080 0000003e`d16ff728 00000000`00000000 000001a6`6642cf98 : nt!KiInitiateUserApc+0x70
ffff9384`6f503410 00007ffe`9f930ad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000003e`d16ff888 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`9f930ad4
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner