Bilgisayardan 12-13 kısa bip geldi

Katılım
15 Temmuz 2020
Mesajlar
2.045
Makaleler
4
Çözümler
2
Yer
Hawkins
Daha fazla  
Cinsiyet
Erkek
Meslek
#1 Hero
Son 1 ayda falan bilgisayarım arada bir "Cihazınız bir sorunla karşılaştı :(" ile kendini kapıyordu. Power tuşuna bastığımda ise bazen 1 saniye sonra kapanıyor, bazen ise de hiç açılmıyordu. Bunu içindeki statik elektriği boşaltarak çözüyordum ama son 2-3 gün içinde sürekli olarak bu olay olmaya başladı. Bugün bilgisayarımda takılıyorken birkaç defa art arda bip sesi geldi. Saymıştım ve yaklaşık 12-13 civarında kısa bip sesleriydi. CS:GO'da skin denemek için oyuna girmiştim ve oyundayken aniden aynı hata ile kapandı ve tekrar açıp oyuna girdiğimde ise tüm ayarlarım silinmişti. Bunu da anlamadım. Yardımlarınız için şimdiden teşekkürler. Edit: Şu anda ise Discord açılmıyor crash veriyor.
 
Son düzenleyen: Moderatör:
Memtest86 ile bellekleri test edin.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

1
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\chest\Desktop\flaxernwagen\020522-42765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`7ac00000 PsLoadedModuleList = 0xfffff801`7b82a2b0
Debug session time: Sat Feb  5 18:46:52.360 2022 (UTC + 3:00)
System Uptime: 0 days 1:22:03.202
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`7aff72e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa908`575383a0=000000000000007a
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffff838ae374ed80, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 000020025fa36860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff801963d6590, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5515

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 24506

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020522-42765-01.dmp

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffff838ae374ed80

BUGCHECK_P2: ffffffffc000000e

BUGCHECK_P3: 20025fa36860

BUGCHECK_P4: fffff801963d6590

ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.

DISK_HARDWARE_ERROR: There was error with disk hardware

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffa90857538740 -- (.trap 0xffffa90857538740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801963d6590 rbx=0000000000000000 rcx=ffff838af2a97b78
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801963d6590 rsp=ffffa908575388d8 rbp=ffffa908575389e0
 r8=0000000000000000  r9=0000000000000000 r10=0000fffff801963d
r11=ffffb2f99e600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         ov up ei pl nz na pe cy
intelppm!ProcLibTraceControlCallback:
fffff801`963d6590 83fa02          cmp     edx,2
Resetting default scope

STACK_TEXT: 
ffffa908`57538398 fffff801`7ae5ddf9     : 00000000`0000007a ffff838a`e374ed80 ffffffff`c000000e 00002002`5fa36860 : nt!KeBugCheckEx
ffffa908`575383a0 fffff801`7ae5bb05     : ffffa908`00007000 ffffa908`57538500 ffffa908`57538530 fffff801`00000000 : nt!MiWaitForInPageComplete+0x7d9
ffffa908`57538490 fffff801`7ae9f538     : 00000000`c0033333 00000000`00000000 fffff801`963d6590 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffa908`575385a0 fffff801`7b00545e     : 00000000`00000001 00000000`00000fff 00000000`00000000 ffffc300`52b40180 : nt!MmAccessFault+0x468
ffffa908`57538740 fffff801`963d6590     : fffff801`7b237140 ffff838a`e2c00100 00000000`00000000 ffff838a`e2c00340 : nt!KiPageFault+0x35e
ffffa908`575388d8 fffff801`7b237140     : ffff838a`e2c00100 00000000`00000000 ffff838a`e2c00340 00000000`000007ff : intelppm!ProcLibTraceControlCallback
ffffa908`575388e0 fffff801`7b2c7998     : 00000000`00000000 ffffa908`57538a99 ffff838a`f2a97b40 ffffaf01`7d8b4b20 : nt!EtwpSendDataBlock+0x13c
ffffa908`57538a30 fffff801`7b2c755a     : fffff780`00000380 fffff780`00000380 ffffaf01`7d8b4b20 ffffaf01`7d6de000 : nt!EtwpClearSessionAndUnreferenceEntry+0x26c
ffffa908`57538b00 fffff801`7b2c737e     : ffffa908`57538bc0 ffffaf01`7d548600 00000000`00000000 00000000`00000004 : nt!EtwpDisableTraceProviders+0x4a
ffffa908`57538b50 fffff801`7b2ca7e6     : ffffaf01`7d548600 00000000`00000000 ffffffff`fffffffd ffffaf01`8592f1c0 : nt!EtwpStopLoggerInstance+0x4e
ffffa908`57538b90 fffff801`7af55995     : ffffffff`fffffffd ffffaf01`7d54c080 00000000`00000080 fffff801`7b2ca460 : nt!EtwpLogger+0x386
ffffa908`57538c10 fffff801`7affe938     : ffffc300`52a66180 ffffaf01`7d54c080 fffff801`7af55940 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa908`57538c60 00000000`00000000     : ffffa908`57539000 ffffa908`57533000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiWaitForInPageComplete+7d9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  7d9

FAILURE_BUCKET_ID:  0x7a_c000000e_nt!MiWaitForInPageComplete

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {329318b9-5fab-73eb-d104-f79603e1bdb3}

Followup:     MachineOwner
---------
2
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\chest\Desktop\flaxernwagen\020522-41453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`80400000 PsLoadedModuleList = 0xfffff804`8102a2b0
Debug session time: Sat Feb  5 17:24:19.940 2022 (UTC + 3:00)
System Uptime: 0 days 0:01:22.781
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`807f72e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff48a`21037260=000000000000000a
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff805011024d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80480615de4, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4217

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12542

    Key  : Analysis.Init.CPU.mSec
    Value: 515

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9781

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020522-41453-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff805011024d0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80480615de4

READ_ADDRESS: fffff804810fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff805011024d0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff48a210373a0 -- (.trap 0xfffff48a210373a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe10ba26b6780
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80480615de4 rsp=fffff48a21037530 rbp=fffff48a21037630
 r8=0000000000000080  r9=0000000000000000 r10=fffff80500400000
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!PpmCheckSnapAllDeliveredPerformance+0x354:
fffff804`80615de4 478b84bad024d000 mov     r8d,dword ptr [r10+r15*4+0D024D0h] ds:fffff805`011024d0=????????
Resetting default scope

STACK_TEXT: 
fffff48a`21037258 fffff804`80809269     : 00000000`0000000a fffff805`011024d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff48a`21037260 fffff804`80805569     : 00000000`00000000 00000000`0000002f 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff48a`210373a0 fffff804`80615de4     : 00000000`00000000 00000000`00000000 00000000`00000003 ffffe10b`a64f64a0 : nt!KiPageFault+0x469
fffff48a`21037530 fffff804`8061f5c0     : 00000000`00000002 fffff48a`21037b30 00000000`00000000 fffff804`8061f337 : nt!PpmCheckSnapAllDeliveredPerformance+0x354
fffff48a`21037700 fffff804`8061f086     : ffffe10b`a73171a0 00000000`00000000 fffff48a`21037960 fffff48a`21037b30 : nt!PpmCheckRun+0x40
fffff48a`21037770 fffff804`8061ff2e     : 00000000`00000002 fffff48a`21037b30 00000000`00000000 00000000`00000f00 : nt!PpmCheckStart+0x106
fffff48a`21037810 fffff804`8069a38e     : 00000000`00000004 ffffe10b`a24de000 00000000`00000000 ffffe10b`00000002 : nt!PpmCheckPeriodicStart+0x3e
fffff48a`21037860 fffff804`80699674     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000c6d : nt!KiExecuteAllDpcs+0x30e
fffff48a`210379d0 fffff804`807fae4e     : ffffffff`00000000 ffff9000`9bd40180 ffff9000`9bd4b140 ffffe10b`a231b080 : nt!KiRetireDpcList+0x1f4
fffff48a`21037c60 00000000`00000000     : fffff48a`21038000 fffff48a`21032000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!PpmCheckSnapAllDeliveredPerformance+354

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  354

FAILURE_BUCKET_ID:  AV_nt!PpmCheckSnapAllDeliveredPerformance

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {365900a2-b10c-816f-7d67-b934a81bb358}

Followup:     MachineOwner
---------
3
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\chest\Desktop\flaxernwagen\020522-53765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`3ac00000 PsLoadedModuleList = 0xfffff801`3b82a2b0
Debug session time: Sat Feb  5 19:34:39.590 2022 (UTC + 3:00)
System Uptime: 0 days 0:06:17.445
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`3aff72e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff60a`85d99d90=00000000000000ef
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffb08d285cc080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5952

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10831

    Key  : Analysis.Init.CPU.mSec
    Value: 624

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11821

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : CriticalProcessDied.ExceptionCode
    Value: 23b1c080

    Key  : CriticalProcessDied.Process
    Value: csrss.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020522-53765-01.dmp

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffb08d285cc080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  ffffb08d285cc7c0 -- (.exr 0xffffb08d285cc7c0)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x23b1c080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT: 
fffff60a`85d99d88 fffff801`3b5079d2     : 00000000`000000ef ffffb08d`285cc080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff60a`85d99d90 fffff801`3b40eb0d     : 00000000`00000001 fffff801`3aefd82d 00000000`00000002 fffff801`3aefce47 : nt!PspCatchCriticalBreak+0x10e
fffff60a`85d99e30 fffff801`3b2b41e4     : ffffb08d`00000000 00000000`00000000 ffffb08d`285cc080 ffffb08d`285cc4b8 : nt!PspTerminateAllThreads+0x15b061
fffff60a`85d99ea0 fffff801`3b2b450c     : ffffb08d`285cc080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff60a`85d99ee0 fffff801`3b008cb8     : ffffb08d`285cc080 ffffb08d`23b1c080 fffff60a`85d99fd0 fffff801`3b3206f2 : nt!NtTerminateProcess+0x9c
fffff60a`85d99f50 fffff801`3affb140     : fffff801`3b05a045 fffff60a`85d9aa58 fffff60a`85d9aa58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffff60a`85d9a0e8 fffff801`3b05a045     : fffff60a`85d9aa58 fffff60a`85d9aa58 ffffffff`ffffffff 00007ffe`01a2f000 : nt!KiServiceLinkage
fffff60a`85d9a0f0 fffff801`3b0093ac     : ffffb08d`285cc7c0 fffff801`3aea1836 00000000`00000800 fffff60a`85d9ab00 : nt!KiDispatchException+0x1746b5
fffff60a`85d9a920 fffff801`3b005543     : 00000000`00000005 00000173`a9c2fdb0 fffff60a`85d9ab80 ffffb08d`285cc001 : nt!KiExceptionDispatch+0x12c
fffff60a`85d9ab00 00007ffe`043c2c62     : 00000000`00000000 00000020`00000000 00000020`9a101580 00007ffe`044320cf : nt!KiPageFault+0x443
00000020`9a101560 00000000`00000000     : 00000020`00000000 00000020`9a101580 00007ffe`044320cf 00007ffe`01a2f000 : 0x00007ffe`043c2c62


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_23b1c080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f0fa8ae4-6328-86f2-b05a-50f2c718ad9a}

Followup:     MachineOwner
---------
3
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\chest\Desktop\flaxernwagen\020522-43046-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`1d800000 PsLoadedModuleList = 0xfffff804`1e42a2b0
Debug session time: Sat Feb  5 13:46:32.126 2022 (UTC + 3:00)
System Uptime: 0 days 16:41:52.905
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
......................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`1dbf72e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffffed8b`e5d751c0=0000000000000154
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff8b821bfab000, Pointer to the store context or data manager
Arg2: ffffed8be5d75270, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5733

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 23324

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 14781

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020522-43046-01.dmp

BUGCHECK_CODE:  154

BUGCHECK_P1: ffff8b821bfab000

BUGCHECK_P2: ffffed8be5d75270

BUGCHECK_P3: 2

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffed8be5d761f8 -- (.exr 0xffffed8be5d761f8)
ExceptionAddress: fffff8041db31770 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
   ExceptionCode: c0000006 (In-page I/O error)
  ExceptionFlags: 00000000
NumberParameters: 3
   Parameter[0]: 0000000000000000
   Parameter[1]: 000002af000a3f40
   Parameter[2]: 00000000c000000e
Inpage operation failed at 000002af000a3f40, due to I/O error 00000000c000000e

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000002af000a3f40

CONTEXT:  ffffed8be5d75a30 -- (.cxr 0xffffed8be5d75a30)
rax=fffff8041db31720 rbx=ffffc6000c16e000 rcx=ffffc6000c16e000
rdx=ffffc6000c16e000 rsi=0000000000000002 rdi=000002af000a3f40
rip=fffff8041db31770 rsp=ffffed8be5d76438 rbp=000002af000a432e
 r8=000002af000a3f40  r9=0000000000000444 r10=ffffc6000c16eea0
r11=000002af000a4384 r12=ffffed8be5d766a8 r13=ffff8b8224d19000
r14=ffffc6000c16f000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!RtlDecompressBufferXpressLz+0x50:
fffff804`1db31770 418b08          mov     ecx,dword ptr [r8] ds:002b:000002af`000a3f40=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/  hata durumu y z nden belle e yerle tirilmedi.

EXCEPTION_CODE_STR:  c0000006

EXCEPTION_PARAMETER3:  00000000c000000e

EXCEPTION_STR:  0xc0000006

TRAP_FRAME:  ffffed8be5d76d40 -- (.trap 0xffffed8be5d76d40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb04f539f000 rbx=0000000000000000 rcx=ffffdb04f539f000
rdx=ffff9f06af739fe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804211d366f rsp=ffffed8be5d76ed8 rbp=0000000000000000
 r8=0000000000000018  r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
Ntfs!memcpy+0x2f:
fffff804`211d366f 0f1101          movups  xmmword ptr [rcx],xmm0 ds:ffffdb04`f539f000=000000000000000100000000000003e8
Resetting default scope

STACK_TEXT: 
ffffed8b`e5d76438 fffff804`1db065e0     : ffffc600`0c16e000 ffffc600`0c16e000 00000000`00000002 000002af`000a3f40 : nt!RtlDecompressBufferXpressLz+0x50
ffffed8b`e5d76450 fffff804`1db06328     : fffff54f`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDecompressBufferEx+0x60
ffffed8b`e5d764a0 fffff804`1db061b5     : 00000000`00000004 fffff804`1db05d1e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffed8b`e5d76560 fffff804`1db059ec     : 00000000`00000001 00000000`00003f40 ffff8b82`1bfab000 ffff8b82`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffed8b`e5d765b0 fffff804`1db0581c     : 00000003`ffffffff ffff8b82`24d19000 ffffed8b`e5d76690 ffff8b82`24b674d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffed8b`e5d76650 fffff804`1db05669     : ffffc600`0a608730 00000000`00000002 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffed8b`e5d76700 fffff804`1db05521     : ffff8b82`1bfab000 ffff8b82`24b674d0 ffff8b82`24d19000 ffff8b82`1bfac9c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffed8b`e5d76780 fffff804`1daf8598     : ffff8b82`14f06080 ffff8b82`1bfab000 00000000`00000000 ffff8b82`1eda37a0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffed8b`e5d767b0 fffff804`1db0307f     : fffff804`1db05500 ffffed8b`e5d76850 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffed8b`e5d76820 fffff804`1dad0f44     : ffffed8b`e5d76920 00000000`31526d73 00000000`000003ff fffff804`1e5239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffed8b`e5d768f0 fffff804`1dad0978     : 00000000`0000000c 00000000`000003ff ffffed8b`e5d769a0 fffff804`1e5239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffed8b`e5d76940 fffff804`1db03b07     : 00000000`0000000c 00000000`00000001 ffff8b82`24b674d0 ffff8b82`1eda37a0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffed8b`e5d769d0 fffff804`1db5af4b     : ffff8b82`00000001 ffff8b82`1eda3860 00000000`00000000 ffff8b82`1bfab000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffed8b`e5d76a40 fffff804`1da5df30     : ffffed8b`00000100 00000000`00000000 ffffed8b`e5d76c98 fffff804`1da5be80 : nt!SmPageRead+0x33
ffffed8b`e5d76a90 fffff804`1da5b9dd     : 00000000`00000002 ffffed8b`e5d76b20 ffffed8b`e5d76c98 ffff8b82`1eda3750 : nt!MiIssueHardFaultIo+0x10c
ffffed8b`e5d76ae0 fffff804`1da9f538     : 00000000`c0033333 00000000`00000000 ffffdb04`f539f000 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffed8b`e5d76ba0 fffff804`1dc0545e     : 00000000`0000001c ffff8b82`14f06080 00000000`00000001 fffff804`1da2f95d : nt!MmAccessFault+0x468
ffffed8b`e5d76d40 fffff804`211d366f     : fffff804`2134e6b9 ffffdb04`f53eac70 00000000`00000000 fffff804`00001000 : nt!KiPageFault+0x35e
ffffed8b`e5d76ed8 fffff804`2134e6b9     : ffffdb04`f53eac70 00000000`00000000 fffff804`00001000 fffff804`1da0acd0 : Ntfs!memcpy+0x2f
ffffed8b`e5d76ee0 fffff804`2131467b     : 00000006`70237300 ffff9f06`af739000 00000000`00000000 ffffed8b`e5d77160 : Ntfs!LfsCopyReadLogRecord+0xed
ffffed8b`e5d76f90 fffff804`21313da0     : ffffdb04`f53eac70 ffffed8b`e5d77160 ffffdb04`f53eac70 ffffed8b`e5d77160 : Ntfs!LfsFindLogRecord+0x127
ffffed8b`e5d77000 fffff804`21313b16     : ffffdb04`f52e9010 ffffed8b`e5d77160 ffffed8b`e5d77158 ffffed8b`e5d77570 : Ntfs!LfsReadNextLogRecord+0x19c
ffffed8b`e5d770c0 fffff804`211c0749     : ffffed8b`e5d773b0 ffff8b82`15a38180 00000000`00000028 00000000`00000000 : Ntfs!NtfsAbortTransaction+0x3c6
ffffed8b`e5d77210 fffff804`21285518     : ffffed8b`e5d773b0 ffff8b82`2f48b010 00000000`00000000 ffffed8b`e5d77380 : Ntfs!NtfsProcessException+0x315
ffffed8b`e5d77310 fffff804`1da8f825     : ffff8b82`21ee18c0 fffff804`1b1848e6 ffff8b82`2f48b010 ffff8b82`15a37040 : Ntfs!NtfsFsdCleanup+0x2a8
ffffed8b`e5d77660 fffff804`1b186c5f     : 00000000`00000000 fffff804`1da06167 ffff8b82`14f06080 ffff8b82`19d74810 : nt!IofCallDriver+0x55
ffffed8b`e5d776a0 fffff804`1b184673     : ffffed8b`e5d77730 00000000`00000000 00000000`00000000 ffff8b82`14ea4040 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffed8b`e5d77710 fffff804`1da8f825     : ffff8b82`19d74810 fffff804`1da8fd3d ffffed8b`e5d77b18 ffff8b82`15769601 : FLTMGR!FltpDispatch+0xa3
ffffed8b`e5d77770 fffff804`1de75faa     : 00000000`00000001 ffff8b82`19d74810 00000000`00000000 00000000`000c100a : nt!IofCallDriver+0x55
ffffed8b`e5d777b0 fffff804`1ddf39cf     : ffff8b82`14ea4040 00000000`00000001 ffffdb04`00000000 ffff8b82`19d747e0 : nt!IopCloseFile+0x17a
ffffed8b`e5d77840 fffff804`1ddf79ac     : 00000000`00000650 00000000`00000000 ffffed8b`e5d77b29 fffff804`1da89732 : nt!ObCloseHandleTableEntry+0x51f
ffffed8b`e5d77980 fffff804`1dc08cb8     : 00000000`c0000000 00000000`00000000 ffffed8b`e5d77a70 00000000`c0000001 : nt!NtClose+0xec
ffffed8b`e5d779f0 fffff804`1dbfb140     : fffff804`1deca89b ffff8b82`14f65040 ffff8b82`14f65040 ffffffff`fffffffd : nt!KiSystemServiceCopyEnd+0x28
ffffed8b`e5d77b88 fffff804`1deca89b     : ffff8b82`14f65040 ffff8b82`14f65040 ffffffff`fffffffd 00000000`c000000e : nt!KiServiceLinkage
ffffed8b`e5d77b90 fffff804`1db55995     : ffffffff`fffffffd ffff8b82`14f06080 00000000`00000080 fffff804`1deca460 : nt!EtwpLogger+0x43b
ffffed8b`e5d77c10 fffff804`1dbfe938     : ffffc600`0a600180 ffff8b82`14f06080 fffff804`1db55940 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffed8b`e5d77c60 00000000`00000000     : ffffed8b`e5d78000 ffffed8b`e5d72000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!RtlDecompressBufferXpressLz+50

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr 0xffffed8be5d75a30 ; kb

BUCKET_ID_FUNC_OFFSET:  50

FAILURE_BUCKET_ID:  0x154_c0000006_c000000e_nt!RtlDecompressBufferXpressLz

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {04bbc5ba-a28a-9efe-b2fd-8956bfd9dd67}

Followup:     MachineOwner
---------
 
Memtest86 ile bellekleri test edin.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

1
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\chest\Desktop\flaxernwagen\020522-42765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`7ac00000 PsLoadedModuleList = 0xfffff801`7b82a2b0
Debug session time: Sat Feb  5 18:46:52.360 2022 (UTC + 3:00)
System Uptime: 0 days 1:22:03.202
Loading Kernel Symbols
...............................................................
................................................................
.............................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`7aff72e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa908`575383a0=000000000000007a
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffff838ae374ed80, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 000020025fa36860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff801963d6590, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5515

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 24506

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6815

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020522-42765-01.dmp

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffff838ae374ed80

BUGCHECK_P2: ffffffffc000000e

BUGCHECK_P3: 20025fa36860

BUGCHECK_P4: fffff801963d6590

ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.

DISK_HARDWARE_ERROR: There was error with disk hardware

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffa90857538740 -- (.trap 0xffffa90857538740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801963d6590 rbx=0000000000000000 rcx=ffff838af2a97b78
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801963d6590 rsp=ffffa908575388d8 rbp=ffffa908575389e0
 r8=0000000000000000  r9=0000000000000000 r10=0000fffff801963d
r11=ffffb2f99e600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         ov up ei pl nz na pe cy
intelppm!ProcLibTraceControlCallback:
fffff801`963d6590 83fa02          cmp     edx,2
Resetting default scope

STACK_TEXT:
ffffa908`57538398 fffff801`7ae5ddf9     : 00000000`0000007a ffff838a`e374ed80 ffffffff`c000000e 00002002`5fa36860 : nt!KeBugCheckEx
ffffa908`575383a0 fffff801`7ae5bb05     : ffffa908`00007000 ffffa908`57538500 ffffa908`57538530 fffff801`00000000 : nt!MiWaitForInPageComplete+0x7d9
ffffa908`57538490 fffff801`7ae9f538     : 00000000`c0033333 00000000`00000000 fffff801`963d6590 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffa908`575385a0 fffff801`7b00545e     : 00000000`00000001 00000000`00000fff 00000000`00000000 ffffc300`52b40180 : nt!MmAccessFault+0x468
ffffa908`57538740 fffff801`963d6590     : fffff801`7b237140 ffff838a`e2c00100 00000000`00000000 ffff838a`e2c00340 : nt!KiPageFault+0x35e
ffffa908`575388d8 fffff801`7b237140     : ffff838a`e2c00100 00000000`00000000 ffff838a`e2c00340 00000000`000007ff : intelppm!ProcLibTraceControlCallback
ffffa908`575388e0 fffff801`7b2c7998     : 00000000`00000000 ffffa908`57538a99 ffff838a`f2a97b40 ffffaf01`7d8b4b20 : nt!EtwpSendDataBlock+0x13c
ffffa908`57538a30 fffff801`7b2c755a     : fffff780`00000380 fffff780`00000380 ffffaf01`7d8b4b20 ffffaf01`7d6de000 : nt!EtwpClearSessionAndUnreferenceEntry+0x26c
ffffa908`57538b00 fffff801`7b2c737e     : ffffa908`57538bc0 ffffaf01`7d548600 00000000`00000000 00000000`00000004 : nt!EtwpDisableTraceProviders+0x4a
ffffa908`57538b50 fffff801`7b2ca7e6     : ffffaf01`7d548600 00000000`00000000 ffffffff`fffffffd ffffaf01`8592f1c0 : nt!EtwpStopLoggerInstance+0x4e
ffffa908`57538b90 fffff801`7af55995     : ffffffff`fffffffd ffffaf01`7d54c080 00000000`00000080 fffff801`7b2ca460 : nt!EtwpLogger+0x386
ffffa908`57538c10 fffff801`7affe938     : ffffc300`52a66180 ffffaf01`7d54c080 fffff801`7af55940 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa908`57538c60 00000000`00000000     : ffffa908`57539000 ffffa908`57533000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiWaitForInPageComplete+7d9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  7d9

FAILURE_BUCKET_ID:  0x7a_c000000e_nt!MiWaitForInPageComplete

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {329318b9-5fab-73eb-d104-f79603e1bdb3}

Followup:     MachineOwner
---------
2
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\chest\Desktop\flaxernwagen\020522-41453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`80400000 PsLoadedModuleList = 0xfffff804`8102a2b0
Debug session time: Sat Feb  5 17:24:19.940 2022 (UTC + 3:00)
System Uptime: 0 days 0:01:22.781
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`807f72e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff48a`21037260=000000000000000a
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff805011024d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80480615de4, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4217

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12542

    Key  : Analysis.Init.CPU.mSec
    Value: 515

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9781

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020522-41453-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff805011024d0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80480615de4

READ_ADDRESS: fffff804810fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff805011024d0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff48a210373a0 -- (.trap 0xfffff48a210373a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe10ba26b6780
rdx=0000000000000004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80480615de4 rsp=fffff48a21037530 rbp=fffff48a21037630
 r8=0000000000000080  r9=0000000000000000 r10=fffff80500400000
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!PpmCheckSnapAllDeliveredPerformance+0x354:
fffff804`80615de4 478b84bad024d000 mov     r8d,dword ptr [r10+r15*4+0D024D0h] ds:fffff805`011024d0=????????
Resetting default scope

STACK_TEXT:
fffff48a`21037258 fffff804`80809269     : 00000000`0000000a fffff805`011024d0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff48a`21037260 fffff804`80805569     : 00000000`00000000 00000000`0000002f 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff48a`210373a0 fffff804`80615de4     : 00000000`00000000 00000000`00000000 00000000`00000003 ffffe10b`a64f64a0 : nt!KiPageFault+0x469
fffff48a`21037530 fffff804`8061f5c0     : 00000000`00000002 fffff48a`21037b30 00000000`00000000 fffff804`8061f337 : nt!PpmCheckSnapAllDeliveredPerformance+0x354
fffff48a`21037700 fffff804`8061f086     : ffffe10b`a73171a0 00000000`00000000 fffff48a`21037960 fffff48a`21037b30 : nt!PpmCheckRun+0x40
fffff48a`21037770 fffff804`8061ff2e     : 00000000`00000002 fffff48a`21037b30 00000000`00000000 00000000`00000f00 : nt!PpmCheckStart+0x106
fffff48a`21037810 fffff804`8069a38e     : 00000000`00000004 ffffe10b`a24de000 00000000`00000000 ffffe10b`00000002 : nt!PpmCheckPeriodicStart+0x3e
fffff48a`21037860 fffff804`80699674     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000c6d : nt!KiExecuteAllDpcs+0x30e
fffff48a`210379d0 fffff804`807fae4e     : ffffffff`00000000 ffff9000`9bd40180 ffff9000`9bd4b140 ffffe10b`a231b080 : nt!KiRetireDpcList+0x1f4
fffff48a`21037c60 00000000`00000000     : fffff48a`21038000 fffff48a`21032000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!PpmCheckSnapAllDeliveredPerformance+354

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  354

FAILURE_BUCKET_ID:  AV_nt!PpmCheckSnapAllDeliveredPerformance

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {365900a2-b10c-816f-7d67-b934a81bb358}

Followup:     MachineOwner
---------
3
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\chest\Desktop\flaxernwagen\020522-53765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`3ac00000 PsLoadedModuleList = 0xfffff801`3b82a2b0
Debug session time: Sat Feb  5 19:34:39.590 2022 (UTC + 3:00)
System Uptime: 0 days 0:06:17.445
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`3aff72e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff60a`85d99d90=00000000000000ef
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffb08d285cc080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5952

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10831

    Key  : Analysis.Init.CPU.mSec
    Value: 624

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11821

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : CriticalProcessDied.ExceptionCode
    Value: 23b1c080

    Key  : CriticalProcessDied.Process
    Value: csrss.exe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020522-53765-01.dmp

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffb08d285cc080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  ffffb08d285cc7c0 -- (.exr 0xffffb08d285cc7c0)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x23b1c080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT:
fffff60a`85d99d88 fffff801`3b5079d2     : 00000000`000000ef ffffb08d`285cc080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff60a`85d99d90 fffff801`3b40eb0d     : 00000000`00000001 fffff801`3aefd82d 00000000`00000002 fffff801`3aefce47 : nt!PspCatchCriticalBreak+0x10e
fffff60a`85d99e30 fffff801`3b2b41e4     : ffffb08d`00000000 00000000`00000000 ffffb08d`285cc080 ffffb08d`285cc4b8 : nt!PspTerminateAllThreads+0x15b061
fffff60a`85d99ea0 fffff801`3b2b450c     : ffffb08d`285cc080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff60a`85d99ee0 fffff801`3b008cb8     : ffffb08d`285cc080 ffffb08d`23b1c080 fffff60a`85d99fd0 fffff801`3b3206f2 : nt!NtTerminateProcess+0x9c
fffff60a`85d99f50 fffff801`3affb140     : fffff801`3b05a045 fffff60a`85d9aa58 fffff60a`85d9aa58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffff60a`85d9a0e8 fffff801`3b05a045     : fffff60a`85d9aa58 fffff60a`85d9aa58 ffffffff`ffffffff 00007ffe`01a2f000 : nt!KiServiceLinkage
fffff60a`85d9a0f0 fffff801`3b0093ac     : ffffb08d`285cc7c0 fffff801`3aea1836 00000000`00000800 fffff60a`85d9ab00 : nt!KiDispatchException+0x1746b5
fffff60a`85d9a920 fffff801`3b005543     : 00000000`00000005 00000173`a9c2fdb0 fffff60a`85d9ab80 ffffb08d`285cc001 : nt!KiExceptionDispatch+0x12c
fffff60a`85d9ab00 00007ffe`043c2c62     : 00000000`00000000 00000020`00000000 00000020`9a101580 00007ffe`044320cf : nt!KiPageFault+0x443
00000020`9a101560 00000000`00000000     : 00000020`00000000 00000020`9a101580 00007ffe`044320cf 00007ffe`01a2f000 : 0x00007ffe`043c2c62


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_23b1c080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f0fa8ae4-6328-86f2-b05a-50f2c718ad9a}

Followup:     MachineOwner
---------
3
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\chest\Desktop\flaxernwagen\020522-43046-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`1d800000 PsLoadedModuleList = 0xfffff804`1e42a2b0
Debug session time: Sat Feb  5 13:46:32.126 2022 (UTC + 3:00)
System Uptime: 0 days 16:41:52.905
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
......................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`1dbf72e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffffed8b`e5d751c0=0000000000000154
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff8b821bfab000, Pointer to the store context or data manager
Arg2: ffffed8be5d75270, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5733

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 23324

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 14781

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  020522-43046-01.dmp

BUGCHECK_CODE:  154

BUGCHECK_P1: ffff8b821bfab000

BUGCHECK_P2: ffffed8be5d75270

BUGCHECK_P3: 2

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffed8be5d761f8 -- (.exr 0xffffed8be5d761f8)
ExceptionAddress: fffff8041db31770 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
   ExceptionCode: c0000006 (In-page I/O error)
  ExceptionFlags: 00000000
NumberParameters: 3
   Parameter[0]: 0000000000000000
   Parameter[1]: 000002af000a3f40
   Parameter[2]: 00000000c000000e
Inpage operation failed at 000002af000a3f40, due to I/O error 00000000c000000e

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000002af000a3f40

CONTEXT:  ffffed8be5d75a30 -- (.cxr 0xffffed8be5d75a30)
rax=fffff8041db31720 rbx=ffffc6000c16e000 rcx=ffffc6000c16e000
rdx=ffffc6000c16e000 rsi=0000000000000002 rdi=000002af000a3f40
rip=fffff8041db31770 rsp=ffffed8be5d76438 rbp=000002af000a432e
 r8=000002af000a3f40  r9=0000000000000444 r10=ffffc6000c16eea0
r11=000002af000a4384 r12=ffffed8be5d766a8 r13=ffff8b8224d19000
r14=ffffc6000c16f000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!RtlDecompressBufferXpressLz+0x50:
fffff804`1db31770 418b08          mov     ecx,dword ptr [r8] ds:002b:000002af`000a3f40=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/  hata durumu y z nden belle e yerle tirilmedi.

EXCEPTION_CODE_STR:  c0000006

EXCEPTION_PARAMETER3:  00000000c000000e

EXCEPTION_STR:  0xc0000006

TRAP_FRAME:  ffffed8be5d76d40 -- (.trap 0xffffed8be5d76d40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdb04f539f000 rbx=0000000000000000 rcx=ffffdb04f539f000
rdx=ffff9f06af739fe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804211d366f rsp=ffffed8be5d76ed8 rbp=0000000000000000
 r8=0000000000000018  r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
Ntfs!memcpy+0x2f:
fffff804`211d366f 0f1101          movups  xmmword ptr [rcx],xmm0 ds:ffffdb04`f539f000=000000000000000100000000000003e8
Resetting default scope

STACK_TEXT:
ffffed8b`e5d76438 fffff804`1db065e0     : ffffc600`0c16e000 ffffc600`0c16e000 00000000`00000002 000002af`000a3f40 : nt!RtlDecompressBufferXpressLz+0x50
ffffed8b`e5d76450 fffff804`1db06328     : fffff54f`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlDecompressBufferEx+0x60
ffffed8b`e5d764a0 fffff804`1db061b5     : 00000000`00000004 fffff804`1db05d1e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffffed8b`e5d76560 fffff804`1db059ec     : 00000000`00000001 00000000`00003f40 ffff8b82`1bfab000 ffff8b82`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffed8b`e5d765b0 fffff804`1db0581c     : 00000003`ffffffff ffff8b82`24d19000 ffffed8b`e5d76690 ffff8b82`24b674d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffed8b`e5d76650 fffff804`1db05669     : ffffc600`0a608730 00000000`00000002 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffed8b`e5d76700 fffff804`1db05521     : ffff8b82`1bfab000 ffff8b82`24b674d0 ffff8b82`24d19000 ffff8b82`1bfac9c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffed8b`e5d76780 fffff804`1daf8598     : ffff8b82`14f06080 ffff8b82`1bfab000 00000000`00000000 ffff8b82`1eda37a0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffed8b`e5d767b0 fffff804`1db0307f     : fffff804`1db05500 ffffed8b`e5d76850 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffed8b`e5d76820 fffff804`1dad0f44     : ffffed8b`e5d76920 00000000`31526d73 00000000`000003ff fffff804`1e5239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffed8b`e5d768f0 fffff804`1dad0978     : 00000000`0000000c 00000000`000003ff ffffed8b`e5d769a0 fffff804`1e5239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffed8b`e5d76940 fffff804`1db03b07     : 00000000`0000000c 00000000`00000001 ffff8b82`24b674d0 ffff8b82`1eda37a0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffed8b`e5d769d0 fffff804`1db5af4b     : ffff8b82`00000001 ffff8b82`1eda3860 00000000`00000000 ffff8b82`1bfab000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffed8b`e5d76a40 fffff804`1da5df30     : ffffed8b`00000100 00000000`00000000 ffffed8b`e5d76c98 fffff804`1da5be80 : nt!SmPageRead+0x33
ffffed8b`e5d76a90 fffff804`1da5b9dd     : 00000000`00000002 ffffed8b`e5d76b20 ffffed8b`e5d76c98 ffff8b82`1eda3750 : nt!MiIssueHardFaultIo+0x10c
ffffed8b`e5d76ae0 fffff804`1da9f538     : 00000000`c0033333 00000000`00000000 ffffdb04`f539f000 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffed8b`e5d76ba0 fffff804`1dc0545e     : 00000000`0000001c ffff8b82`14f06080 00000000`00000001 fffff804`1da2f95d : nt!MmAccessFault+0x468
ffffed8b`e5d76d40 fffff804`211d366f     : fffff804`2134e6b9 ffffdb04`f53eac70 00000000`00000000 fffff804`00001000 : nt!KiPageFault+0x35e
ffffed8b`e5d76ed8 fffff804`2134e6b9     : ffffdb04`f53eac70 00000000`00000000 fffff804`00001000 fffff804`1da0acd0 : Ntfs!memcpy+0x2f
ffffed8b`e5d76ee0 fffff804`2131467b     : 00000006`70237300 ffff9f06`af739000 00000000`00000000 ffffed8b`e5d77160 : Ntfs!LfsCopyReadLogRecord+0xed
ffffed8b`e5d76f90 fffff804`21313da0     : ffffdb04`f53eac70 ffffed8b`e5d77160 ffffdb04`f53eac70 ffffed8b`e5d77160 : Ntfs!LfsFindLogRecord+0x127
ffffed8b`e5d77000 fffff804`21313b16     : ffffdb04`f52e9010 ffffed8b`e5d77160 ffffed8b`e5d77158 ffffed8b`e5d77570 : Ntfs!LfsReadNextLogRecord+0x19c
ffffed8b`e5d770c0 fffff804`211c0749     : ffffed8b`e5d773b0 ffff8b82`15a38180 00000000`00000028 00000000`00000000 : Ntfs!NtfsAbortTransaction+0x3c6
ffffed8b`e5d77210 fffff804`21285518     : ffffed8b`e5d773b0 ffff8b82`2f48b010 00000000`00000000 ffffed8b`e5d77380 : Ntfs!NtfsProcessException+0x315
ffffed8b`e5d77310 fffff804`1da8f825     : ffff8b82`21ee18c0 fffff804`1b1848e6 ffff8b82`2f48b010 ffff8b82`15a37040 : Ntfs!NtfsFsdCleanup+0x2a8
ffffed8b`e5d77660 fffff804`1b186c5f     : 00000000`00000000 fffff804`1da06167 ffff8b82`14f06080 ffff8b82`19d74810 : nt!IofCallDriver+0x55
ffffed8b`e5d776a0 fffff804`1b184673     : ffffed8b`e5d77730 00000000`00000000 00000000`00000000 ffff8b82`14ea4040 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffed8b`e5d77710 fffff804`1da8f825     : ffff8b82`19d74810 fffff804`1da8fd3d ffffed8b`e5d77b18 ffff8b82`15769601 : FLTMGR!FltpDispatch+0xa3
ffffed8b`e5d77770 fffff804`1de75faa     : 00000000`00000001 ffff8b82`19d74810 00000000`00000000 00000000`000c100a : nt!IofCallDriver+0x55
ffffed8b`e5d777b0 fffff804`1ddf39cf     : ffff8b82`14ea4040 00000000`00000001 ffffdb04`00000000 ffff8b82`19d747e0 : nt!IopCloseFile+0x17a
ffffed8b`e5d77840 fffff804`1ddf79ac     : 00000000`00000650 00000000`00000000 ffffed8b`e5d77b29 fffff804`1da89732 : nt!ObCloseHandleTableEntry+0x51f
ffffed8b`e5d77980 fffff804`1dc08cb8     : 00000000`c0000000 00000000`00000000 ffffed8b`e5d77a70 00000000`c0000001 : nt!NtClose+0xec
ffffed8b`e5d779f0 fffff804`1dbfb140     : fffff804`1deca89b ffff8b82`14f65040 ffff8b82`14f65040 ffffffff`fffffffd : nt!KiSystemServiceCopyEnd+0x28
ffffed8b`e5d77b88 fffff804`1deca89b     : ffff8b82`14f65040 ffff8b82`14f65040 ffffffff`fffffffd 00000000`c000000e : nt!KiServiceLinkage
ffffed8b`e5d77b90 fffff804`1db55995     : ffffffff`fffffffd ffff8b82`14f06080 00000000`00000080 fffff804`1deca460 : nt!EtwpLogger+0x43b
ffffed8b`e5d77c10 fffff804`1dbfe938     : ffffc600`0a600180 ffff8b82`14f06080 fffff804`1db55940 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffed8b`e5d77c60 00000000`00000000     : ffffed8b`e5d78000 ffffed8b`e5d72000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!RtlDecompressBufferXpressLz+50

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1466

STACK_COMMAND:  .cxr 0xffffed8be5d75a30 ; kb

BUCKET_ID_FUNC_OFFSET:  50

FAILURE_BUCKET_ID:  0x154_c0000006_c000000e_nt!RtlDecompressBufferXpressLz

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {04bbc5ba-a28a-9efe-b2fd-8956bfd9dd67}

Followup:     MachineOwner
---------

Kontrol ettim, RAM'lerde sorun var.
 
Gider ama Memtest ile RAM testi yapın. Garantisi devam ediyorsa, RAM'leri garantiye verebilirsiniz.
Elimdeki bilgisayar 8 senelik ve uğraşmak istemiyorum pek. Yaz tatili gelsin yeni bir bilgisayar alacağım zaten :)
 

Technopat Haberler

Yeni konular

Yeni mesajlar

Geri
Yukarı