Lovebeer24
Kilopat
- Katılım
- 4 Aralık 2015
- Mesajlar
- 161
Daha fazla
- Cinsiyet
- Erkek
Şu dosyaları adam gibi yerlere yükleyin çok rica ediyorum. Site tam 15 dakikadır yükleniyor.
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Şahan\Desktop\dmp\010221-14312-01 - Kopya.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff801`71e00000 PsLoadedModuleList = 0xfffff801`722461b0
Debug session time: Sat Jan 2 15:02:20.846 2021 (UTC + 3:00)
System Uptime: 0 days 0:00:08.603
Loading Kernel Symbols
...............................................................
.................................................
Loading User Symbols
Loading unloaded module list
...
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`71fc3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffef88`b1ae49f0=000000000000007e
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80171e63c19, The address that the exception occurred at
Arg3: ffffef88b1ae5a08, Exception Record Address
Arg4: ffffef88b1ae5250, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-Q19AAHT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21762
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80171e63c19
BUGCHECK_P3: ffffef88b1ae5a08
BUGCHECK_P4: ffffef88b1ae5250
EXCEPTION_RECORD: ffffef88b1ae5a08 -- (.exr 0xffffef88b1ae5a08)
ExceptionAddress: fffff80171e63c19 (nt!RtlRbRemoveNode+0x00000000000003a9)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffef88b1ae5250 -- (.cxr 0xffffef88b1ae5250)
rax=a09d9f05aed94218 rbx=ffffab8aeb000290 rcx=ffffab8aef66c9f8
rdx=ffffab8aefe109f8 rsi=0000000000000000 rdi=a09d9f05aed94218
rip=fffff80171e63c19 rsp=ffffef88b1ae5c48 rbp=ffffef88b1ae5cd9
r8=ffffab8aebf28e58 r9=0000000000000000 r10=ffffab8aeede39f0
r11=ffffab8aebf28e58 r12=0000000000000000 r13=ffffab8aefe02000
r14=0000000000000000 r15=ffffab8aeb000280
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x3a9:
fffff801`71e63c19 488b07 mov rax,qword ptr [rdi] ds:002b:a09d9f05`aed94218=????????????????
Resetting default scope
BLACKBOXNTFS: 1 (!blackboxntfs)
PROCESS_NAME: System
READ_ADDRESS: fffff801723713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801722283b8: Unable to get Flags value from nt!KdVersionBlock
fffff801722283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
LOCK_ADDRESS: fffff80172260a00 -- (!locks fffff80172260a00)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80172260a00) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80172260a00
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
STACK_TEXT:
ffffef88`b1ae5c48 fffff801`71e620e8 : ffffef88`b1ae5cd9 00000000`0000005f ffffab8a`efe109f0 ffffab8a`eb000280 : nt!RtlRbRemoveNode+0x3a9
ffffef88`b1ae5c60 fffff801`71e61fa9 : ffffab8a`eb000280 00000000`00000000 fffff1a2`00000001 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x48
ffffef88`b1ae5d30 fffff801`71e3854a : ffffef88`00000038 ffffef88`00000360 00000000`00000360 00000000`00000000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffffef88`b1ae5da0 fffff801`7216e06d : ffffef88`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!ExAllocateHeapPool+0xc6a
ffffef88`b1ae5ee0 fffff801`72512712 : 00000000`00000348 ffffd904`7b7cd240 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffef88`b1ae5f30 fffff801`7250ea78 : 00000000`00000348 00000000`00000000 ffffd904`7d068790 ffffd904`7d08cc40 : nt!MiCaptureRetpolineImportInfo+0x8a
ffffef88`b1ae5f80 fffff801`7250df00 : 00000000`00000000 ffffef88`b1ae60b0 ffffd904`7d08cc40 00000000`00000000 : nt!MiApplyImportOptimizationToRuntimeDriver+0x98
ffffef88`b1ae5fb0 fffff801`72544186 : ffffef88`b1ae6218 00000000`00000000 00000000`00000000 fffff801`72545d01 : nt!MmLoadSystemImageEx+0x450
ffffef88`b1ae6160 fffff801`7250f040 : 00000000`00000000 00000000`00000000 fffff801`722461b0 ffffef88`b1ae6358 : nt!MiLoadImportDll+0x3a
ffffef88`b1ae61b0 fffff801`7250de3f : fffff801`84e00000 ffffef88`b1ae6338 ffffef88`b1ae6378 00000000`00000000 : nt!MiResolveImageReferences+0x220
ffffef88`b1ae62c0 fffff801`72509866 : ffffef88`b1ae6508 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x38f
ffffef88`b1ae6470 fffff801`72509344 : ffffef88`b1ae65b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffef88`b1ae64b0 fffff801`72533c67 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffef88`00000004 : nt!IopLoadDriver+0x224
ffffef88`b1ae6690 fffff801`7250375a : ffffffff`80000201 00000000`00000000 ffffd904`7b41b9f0 ffffffff`8000029c : nt!PipCallDriverAddDeviceQueryRoutine+0x1c3
ffffef88`b1ae6730 fffff801`72503161 : 00000000`00000000 ffffef88`b1ae6840 00000000`6e657050 00000000`00000012 : nt!PnpCallDriverQueryServiceHelper+0xda
ffffef88`b1ae67e0 fffff801`72502815 : ffffd904`7b1a2010 ffffef88`b1ae6a18 ffffd904`7b1a2010 00000000`00000000 : nt!PipCallDriverAddDevice+0x409
ffffef88`b1ae69a0 fffff801`72589c08 : ffffd904`7bcfe100 ffffef88`b1ae6b01 ffffef88`b1ae6ab0 fffff801`00000000 : nt!PipProcessDevNodeTree+0x1b9
ffffef88`b1ae6a60 fffff801`71f5d99e : 00000001`00000003 ffffd904`7bcfe140 ffff9400`00000000 ffffd904`7bcfe140 : nt!PiProcessStartSystemDevices+0x60
ffffef88`b1ae6ab0 fffff801`71e59d35 : ffffd904`7b7cd240 ffffd904`78890ce0 fffff801`7225f2c0 ffffd904`78890ce0 : nt!PnpDeviceActionWorker+0x45e
ffffef88`b1ae6b70 fffff801`71f33585 : ffffd904`7b7cd240 00000000`00000080 ffffd904`78878040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffef88`b1ae6c10 fffff801`71fcb128 : fffff801`6dce2180 ffffd904`7b7cd240 fffff801`71f33530 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffef88`b1ae6c60 00000000`00000000 : ffffef88`b1ae7000 ffffef88`b1ae1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlRbRemoveNode+3a9
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1256
STACK_COMMAND: .cxr 0xffffef88b1ae5250 ; kb
BUCKET_ID_FUNC_OFFSET: 3a9
FAILURE_BUCKET_ID: AV_nt!RtlRbRemoveNode
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9b43c07a-2da2-b63c-46ab-1c788c8a28c1}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Şahan\Desktop\dmp\010321-16687-01 - Kopya.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff805`0c400000 PsLoadedModuleList = 0xfffff805`0c8461b0
Debug session time: Sun Jan 3 15:21:15.972 2021 (UTC + 3:00)
System Uptime: 0 days 0:00:07.728
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
...
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`0c5c3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffd8c`a8be77a0=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffce0913148b60, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8050c50c74d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3358
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-Q19AAHT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3411
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffce0913148b60
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8050c50c74d
BUGCHECK_P4: 2
READ_ADDRESS: fffff8050c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8050c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffce0913148b60
MM_INTERNAL_CODE: 2
BLACKBOXNTFS: 1 (!blackboxntfs)
PROCESS_NAME: System
TRAP_FRAME: fffffd8ca8be7a40 -- (.trap 0xfffffd8ca8be7a40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000007fffff rbx=0000000000000000 rcx=00000000007fffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050c50c74d rsp=fffffd8ca8be7bd8 rbp=0000000001000000
r8=ffffce090f148b70 r9=0000000000ffffff r10=0000000000000000
r11=ffffce090f148c90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!FsRtlFindLargeIndex+0x3d:
fffff805`0c50c74d 413b5cc8f8 cmp ebx,dword ptr [r8+rcx*8-8] ds:ffffce09`13148b60=????????
Resetting default scope
STACK_TEXT:
fffffd8c`a8be7798 fffff805`0c60de82 : 00000000`00000050 ffffce09`13148b60 00000000`00000000 fffffd8c`a8be7a40 : nt!KeBugCheckEx
fffffd8c`a8be77a0 fffff805`0c4caaff : ffffce09`0fed6000 00000000`00000000 00000000`00000000 ffffce09`13148b60 : nt!MiSystemFault+0x198d62
fffffd8c`a8be78a0 fffff805`0c5d1b5e : fffffd8c`a8be7b50 fffff805`0c4384d0 00000000`00000000 ffffce09`0a801b40 : nt!MmAccessFault+0x34f
fffffd8c`a8be7a40 fffff805`0c50c74d : fffff805`0c50c25a 00000000`00000000 00000000`00000001 ce090f14`8cd88cb0 : nt!KiPageFault+0x35e
fffffd8c`a8be7bd8 fffff805`0c50c25a : 00000000`00000000 00000000`00000001 ce090f14`8cd88cb0 00000000`00000001 : nt!FsRtlFindLargeIndex+0x3d
fffffd8c`a8be7be0 fffff805`10343da9 : 00000000`00000000 ffffce09`0f148a10 00000000`00000000 fffff805`10435355 : nt!FsRtlAddBaseMcbEntryEx+0x2a
fffffd8c`a8be7c40 fffff805`10342bc3 : ffffce09`0f148cf0 ffffce09`0f148b70 00000000`00000177 00000000`00000000 : Ntfs!NtfsAddNtfsMcbEntry+0x179
fffffd8c`a8be7d10 fffff805`1034247e : ffffa28e`2b7d5b28 ffffce09`0f148b70 ffffa28e`00000000 00000000`00000000 : Ntfs!NtfsLookupRealAllocationInternal+0x4c3
fffffd8c`a8be7eb0 fffff805`10341c5e : ffffa28e`2b7d5b28 ffffce09`0f148b70 00000000`00000000 fffffd8c`a8be8028 : Ntfs!NtfsLookupAllocation+0x62
fffffd8c`a8be7f60 fffff805`10341355 : ffffa28e`2b7d5b28 ffffa28e`2bbd1820 fffffd8c`a8be8180 ffffa28e`2bbd1820 : Ntfs!NtfsPrepareSimpleBuffers+0x19e
fffffd8c`a8be80d0 fffff805`10340196 : fffffd8c`a8be8180 fffffd8c`a8be8240 ffffa28e`2b7d5b28 00000000`00000000 : Ntfs!NtfsPrepareBuffers+0xc5
fffffd8c`a8be8140 fffff805`10346ed8 : fffffd8c`a8be85e0 00000000`00008000 00000000`00000001 ffffa28e`2bbd1820 : Ntfs!NtfsNonCachedIo+0x2e6
fffffd8c`a8be83f0 fffff805`1034649c : fffffd8c`a8be85f0 ffffa28e`2bbd1820 fffffd8c`a8be85f0 ffffa28e`2b7d5b28 : Ntfs!NtfsCommonRead+0x828
fffffd8c`a8be85b0 fffff805`0c437159 : 00000000`00000000 ffffa28e`2bbd1820 ffffa28e`2bbd1bc0 00000000`00000400 : Ntfs!NtfsFsdRead+0x20c
fffffd8c`a8be8670 fffff805`0f75ce4e : fffffd8c`a8be8fa0 ffffce09`0fed87b0 fffffd8c`a8be8f00 00000000`00000000 : nt!IofCallDriver+0x59
fffffd8c`a8be86b0 fffff805`0f75c893 : ffffce09`0fed87b0 ffffa28e`2d0602d0 00000000`00000000 fffffd8c`a8be87a8 : CLFS!CClfsContainer::ReadSector+0x31e
fffffd8c`a8be8760 fffff805`0f76ad0c : ffffa28e`2d1a1000 fffff805`00000000 00000000`00000002 00000000`00000000 : CLFS!CClfsBaseFilePersisted::ReadMetadataBlock+0x123
fffffd8c`a8be8800 fffff805`0f76ac83 : ffffa28e`2d1a1000 00000000`00000000 00000000`00000002 00000000`00000006 : CLFS!CClfsBaseFile::AcquireMetadataBlock+0x44
fffffd8c`a8be8830 fffff805`0f76a9a7 : ffffa28e`2d1a1000 fffffd8c`a8be8fa0 fffffd8c`a8be8918 ffffa28e`00000000 : CLFS!CClfsBaseFile::GetControlRecord+0x1b
fffffd8c`a8be8860 fffff805`0f769841 : ffffa28e`2d1a1000 fffffd8c`a8be8918 ffffa28e`2d1a1001 ffffa28e`00000000 : CLFS!CClfsBaseFilePersisted::ReadImage+0x133
fffffd8c`a8be88d0 fffff805`0f737efd : ffffa28e`2d1a1000 fffffd8c`a8be89d0 00000000`00000000 00000000`73666c43 : CLFS!CClfsBaseFilePersisted::OpenImage+0x2f9
fffffd8c`a8be8950 fffff805`0f76340d : ffffa28e`2d08b000 00000000`00000000 ffffa28e`2b7888c0 ffffa28e`0013019f : CLFS!CClfsLogFcbPhysical::Initialize+0x315
fffffd8c`a8be8a90 fffff805`0f761f2b : ffffa28e`2baf8e90 fffff805`0c9f2f01 00000000`00000007 fffff805`0f760000 : CLFS!CClfsRequest::Create+0x729
fffffd8c`a8be8bd0 fffff805`0f761cf7 : ffffa28e`2baf8e90 fffffd8c`a8be8d98 ffffa28e`2b6c19f0 00000000`00000000 : CLFS!CClfsRequest::Dispatch+0x97
fffffd8c`a8be8c20 fffff805`0f761c47 : ffffa28e`2baf96e0 ffffa28e`2baf96e0 00000000`00000000 00000000`00000000 : CLFS!ClfsDispatchIoRequest+0x87
fffffd8c`a8be8c70 fffff805`0c437159 : 00000000`00000005 00000000`00000000 ffffa28e`2baf96e0 00000000`0013019f : CLFS!CClfsDriver::LogIoDispatch+0x27
fffffd8c`a8be8ca0 fffff805`0c50a404 : 00000000`00000003 00000000`00000000 00000000`00000001 fffff805`0c443e63 : nt!IofCallDriver+0x59
fffffd8c`a8be8ce0 fffff805`0ca010be : fffffd8c`a8be8fa0 00000000`00000005 00000000`00000000 ffffa28e`2baf97b0 : nt!IoCallDriverWithTracing+0x34
fffffd8c`a8be8d30 fffff805`0c9f666f : ffffa28e`2b6c19f0 ffffa28e`2b6c1905 ffffa28e`2b7888a0 00000000`00000000 : nt!IopParseDevice+0x121e
fffffd8c`a8be8ea0 fffff805`0c9f4ad1 : ffffa28e`2b788800 fffffd8c`a8be90e8 fffffd8c`00000242 ffffa28e`28af5980 : nt!ObpLookupObjectName+0x78f
fffffd8c`a8be9060 fffff805`0ca177a6 : 00000000`00000001 fffffd8c`a8be94d0 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x201
fffffd8c`a8be91a0 fffff805`0ca1706d : fffffd8c`a8be9428 fffffd8c`c0010000 fffffd8c`a8be94d0 fffffd8c`a8be94c0 : nt!IopCreateFile+0x606
fffffd8c`a8be9240 fffff805`0cae699a : 00000000`00000000 fffffd8c`a8be99c9 00000000`00008001 00000000`04000000 : nt!IoCreateFileEx+0x11d
fffffd8c`a8be92e0 fffff805`0f76125f : 00000000`00000010 fffffd8c`a8be99c9 00000000`c0000000 00000000`04000000 : nt!IoCreateFileSpecifyDeviceObjectHint+0xba
fffffd8c`a8be93a0 fffff805`1049f4bd : ffffa28e`2d0c2180 fffffd8c`a8be99c9 ffffce09`0fe4d000 ffffa28e`2d0c39d8 : CLFS!ClfsCreateLogFile+0x74f
fffffd8c`a8be9580 fffff805`1049b131 : ffffce09`0b602730 ffffa28e`2d0c3fe0 ffffa28e`2d0c3fe0 fffff805`10393a04 : Ntfs!TxfStartRm+0x5a1
fffffd8c`a8be9810 fffff805`10460e4b : ffffa28e`2d0c2180 fffff805`0c400001 ffffe400`88482100 ffffe400`88493140 : Ntfs!TxfInitializeVolume+0x685
fffffd8c`a8be9950 fffff805`10351c50 : ffffa28e`2b7b5d38 fffff805`10351890 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b
fffffd8c`a8be9a30 fffff805`0c459d35 : ffffa28e`28a90ce0 ffffa28e`2b96b080 ffffa28e`28a90ce0 ffffa28e`2b7b5dc8 : Ntfs!NtfsFspDispatch+0x3c0
fffffd8c`a8be9b70 fffff805`0c533585 : ffffa28e`2b96b080 00000000`00000080 ffffa28e`28a78040 00000000`00000001 : nt!ExpWorkerThread+0x105
fffffd8c`a8be9c10 fffff805`0c5cb128 : ffffe400`8859d180 ffffa28e`2b96b080 fffff805`0c533530 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd8c`a8be9c60 00000000`00000000 : fffffd8c`a8bea000 fffffd8c`a8be4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: CLFS!CClfsContainer::ReadSector+31e
MODULE_NAME: CLFS
IMAGE_NAME: CLFS.SYS
IMAGE_VERSION: 10.0.18362.1198
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 31e
FAILURE_BUCKET_ID: AV_R_INVALID_CLFS!CClfsContainer::ReadSector
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {61101626-a5cb-942e-d24a-59bd6b360bed}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\baris\Desktop\dmp\010421-23093-01 - Kopya.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff807`38800000 PsLoadedModuleList = 0xfffff807`38c461b0
Debug session time: Mon Jan 4 13:53:47.545 2021 (UTC + 3:00)
System Uptime: 0 days 0:01:35.302
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`389c3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff585`a4ce5da0=00000000000000ef
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffe58163ed8240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8J3G4RH
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4667
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffe58163ed8240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: ffffe58163ed8800 -- (.exr 0xffffe58163ed8800)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x67ae9080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
EXCEPTION_STR: 0x0
TRAP_FRAME: ffffbbddeef77000 -- (.trap 0xffffbbddeef77000)
Unable to read trap frame at ffffbbdd`eef77000
STACK_TEXT:
fffff585`a4ce5d98 fffff807`390c9a59 : 00000000`000000ef ffffe581`63ed8240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff585`a4ce5da0 fffff807`38fda511 : ffffe581`63ed8240 fffff807`38920d35 ffffe581`63ed8240 fffff807`388e9438 : nt!PspCatchCriticalBreak+0x115
fffff585`a4ce5e40 fffff807`38e72898 : ffffe581`00000000 00000000`00000000 ffffe581`63ed8240 ffffe581`63ed8240 : nt!PspTerminateAllThreads+0x165a45
fffff585`a4ce5eb0 fffff807`38ed6db9 : ffffffff`ffffffff fffff585`a4ce5fe0 ffffe581`63ed8240 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff585`a4ce5ef0 fffff807`389d5358 : 00000000`00000350 ffffe581`67ae9080 ffffe581`63ed8240 fffff585`a4ce6130 : nt!NtTerminateProcess+0xa9
fffff585`a4ce5f60 fffff807`389c7940 : fffff807`389e9220 fffff585`a4ce6a58 fffff585`a4ce6a58 fffff585`a4ce6130 : nt!KiSystemServiceCopyEnd+0x28
fffff585`a4ce60f8 fffff807`389e9220 : fffff585`a4ce6a58 fffff585`a4ce6a58 fffff585`a4ce6130 00000000`00000000 : nt!KiServiceLinkage
fffff585`a4ce6100 fffff807`389d5d64 : ffffe581`63ed8800 fffff807`388ccb06 ffffbbdd`eef77000 00007ffe`08b447a0 : nt!KiDispatchException+0x1d3470
fffff585`a4ce6920 fffff807`389d40e3 : ffffe581`67ae9080 0000024c`0d84ce00 00000064`445fe270 ffffe581`6832c500 : nt!KiFastFailDispatch+0xe4
fffff585`a4ce6b00 00007ffe`08b447d8 : 00000000`00000088 00007ffe`08b3bf4e 00000000`00000000 00007ffe`08aedc7a : nt!KiRaiseSecurityCheckFailure+0x323
00000064`445fd5a0 00000000`00000088 : 00007ffe`08b3bf4e 00000000`00000000 00007ffe`08aedc7a 00000000`0003a9fc : 0x00007ffe`08b447d8
00000064`445fd5a8 00007ffe`08b3bf4e : 00000000`00000000 00007ffe`08aedc7a 00000000`0003a9fc 00007ffe`08b2ccd6 : 0x88
00000064`445fd5b0 00000000`00000000 : 00007ffe`08aedc7a 00000000`0003a9fc 00007ffe`08b2ccd6 00000000`00000000 : 0x00007ffe`08b3bf4e
SYMBOL_NAME: nt!PspCatchCriticalBreak+115
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1256
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 115
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_67ae9080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b3abb7df-8311-d858-3571-9c6559dcf5e5}
Followup: MachineOwner
---------
3: kd> lm
start end module name
ffffc09b`71a70000 ffffc09b`71afc000 win32k (deferred)
ffffc09b`71c00000 ffffc09b`71ea5000 win32kbase (deferred)
ffffc09b`71eb0000 ffffc09b`71ef8000 cdd (deferred)
ffffc09b`722d0000 ffffc09b`72672000 win32kfull (deferred)
fffff807`38800000 fffff807`392b5000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\808491FFD53A33DDE6F2613F332E887D1\ntkrnlmp.pdb
fffff807`392b5000 fffff807`39359000 hal (deferred)
fffff807`3bc00000 fffff807`3bc0b000 kd (deferred)
fffff807`3bc10000 fffff807`3bc32000 mcupdate_AuthenticAMD (deferred)
fffff807`3bc40000 fffff807`3bc51000 werkernel (deferred)
fffff807`3bc60000 fffff807`3bc89000 ksecdd (deferred)
fffff807`3bc90000 fffff807`3bcf0000 msrpc (deferred)
fffff807`3bd00000 fffff807`3bd27000 tm (deferred)
fffff807`3bd30000 fffff807`3bd98000 CLFS (deferred)
fffff807`3bda0000 fffff807`3bdba000 PSHED (deferred)
fffff807`3bdc0000 fffff807`3bdcb000 BOOTVID (deferred)
fffff807`3bdd0000 fffff807`3bed5000 clipsp (deferred)
fffff807`3bee0000 fffff807`3bf51000 FLTMGR (deferred)
fffff807`3bf60000 fffff807`3bf6e000 cmimcext (deferred)
fffff807`3bf70000 fffff807`3bf7c000 ntosext (deferred)
fffff807`3bf80000 fffff807`3bf93000 WDFLDR (deferred)
fffff807`3bfa0000 fffff807`3bfaf000 SleepStudyHelper (deferred)
fffff807`3bfb0000 fffff807`3bfc0000 WppRecorder (deferred)
fffff807`3bfd0000 fffff807`3bff5000 acpiex (deferred)
fffff807`3c000000 fffff807`3c0de000 CI (deferred)
fffff807`3c0e0000 fffff807`3c19b000 cng (deferred)
fffff807`3c1a0000 fffff807`3c275000 Wdf01000 (deferred)
fffff807`3c280000 fffff807`3c2c8000 mssecflt (deferred)
fffff807`3c2d0000 fffff807`3c2ea000 SgrmAgent (deferred)
fffff807`3c2f0000 fffff807`3c3bc000 ACPI (deferred)
fffff807`3c3c0000 fffff807`3c3cc000 WMILIB (deferred)
fffff807`3c3f0000 fffff807`3c44b000 intelpep (deferred)
fffff807`3c450000 fffff807`3c467000 WindowsTrustedRT (deferred)
fffff807`3c470000 fffff807`3c47b000 WindowsTrustedRTProxy (deferred)
fffff807`3c480000 fffff807`3c495000 pcw (deferred)
fffff807`3c4a0000 fffff807`3c4ab000 msisadrv (deferred)
fffff807`3c4b0000 fffff807`3c51e000 pci (deferred)
fffff807`3c520000 fffff807`3c533000 vdrvroot (deferred)
fffff807`3c540000 fffff807`3c557000 amdkmpfd (deferred)
fffff807`3c560000 fffff807`3c593000 pdc (deferred)
fffff807`3c5a0000 fffff807`3c5b9000 CEA (deferred)
fffff807`3c5c0000 fffff807`3c5f0000 partmgr (deferred)
fffff807`3c600000 fffff807`3c6a5000 spaceport (deferred)
fffff807`3c6b0000 fffff807`3c6ca000 volmgr (deferred)
fffff807`3c6d0000 fffff807`3c733000 volmgrx (deferred)
fffff807`3c740000 fffff807`3c75f000 mountmgr (deferred)
fffff807`3c760000 fffff807`3c78e000 storahci (deferred)
fffff807`3c790000 fffff807`3c832000 storport (deferred)
fffff807`3c840000 fffff807`3c85b000 EhStorClass (deferred)
fffff807`3c860000 fffff807`3c87a000 fileinfo (deferred)
fffff807`3c880000 fffff807`3c8bd000 Wof (deferred)
fffff807`3c8c0000 fffff807`3c92c000 WdFilter (deferred)
fffff807`3c930000 fffff807`3cbcd000 Ntfs (deferred)
fffff807`3cbd0000 fffff807`3cbdd000 Fs_Rec (deferred)
fffff807`3cbe0000 fffff807`3cbeb000 volume (deferred)
fffff807`3cc00000 fffff807`3d78b000 FACEIT (deferred)
fffff807`3d790000 fffff807`3d901000 ndis (deferred)
fffff807`3d910000 fffff807`3d9a4000 NETIO (deferred)
fffff807`3d9b0000 fffff807`3d9e2000 ksecpkg (deferred)
fffff807`3d9f0000 fffff807`3dcdb000 tcpip (deferred)
fffff807`3dce0000 fffff807`3dd5a000 fwpkclnt (deferred)
fffff807`3dd60000 fffff807`3dd90000 wfplwfs (deferred)
fffff807`3dda0000 fffff807`3de69000 fvevol (deferred)
fffff807`3de70000 fffff807`3dedd000 volsnap (deferred)
fffff807`3dee0000 fffff807`3df2e000 rdyboost (deferred)
fffff807`3df30000 fffff807`3df56000 mup (deferred)
fffff807`3df60000 fffff807`3df72000 iorate (deferred)
fffff807`3dfb0000 fffff807`3dfcc000 disk (deferred)
fffff807`3dfd0000 fffff807`3e03b000 CLASSPNP (deferred)
fffff807`46600000 fffff807`46630000 cdrom (deferred)
fffff807`46640000 fffff807`46655000 filecrypt (deferred)
fffff807`46660000 fffff807`4666e000 tbs (deferred)
fffff807`46670000 fffff807`4667a000 Null (deferred)
fffff807`46680000 fffff807`4668a000 Beep (deferred)
fffff807`46690000 fffff807`46a01000 dxgkrnl (deferred)
fffff807`46a10000 fffff807`46a26000 watchdog (deferred)
fffff807`46a30000 fffff807`46a46000 BasicDisplay (deferred)
fffff807`46a50000 fffff807`46a61000 BasicRender (deferred)
fffff807`46a70000 fffff807`46a8c000 Npfs (deferred)
fffff807`46a90000 fffff807`46aa1000 Msfs (deferred)
fffff807`46ab0000 fffff807`46aed000 amdpsp (deferred)
fffff807`46af0000 fffff807`46b16000 tdx (deferred)
fffff807`46b20000 fffff807`46b30000 TDI (deferred)
fffff807`46b40000 fffff807`46b99000 netbt (deferred)
fffff807`46ba0000 fffff807`46bb3000 afunix (deferred)
fffff807`46bc0000 fffff807`46c67000 afd (deferred)
fffff807`46c70000 fffff807`46c8a000 vwififlt (deferred)
fffff807`46c90000 fffff807`46cbb000 pacer (deferred)
fffff807`46cc0000 fffff807`46cd4000 netbios (deferred)
fffff807`46ce0000 fffff807`46d5b000 rdbss (deferred)
fffff807`46d60000 fffff807`46df4000 csc (deferred)
fffff807`46e00000 fffff807`46e12000 nsiproxy (deferred)
fffff807`46e20000 fffff807`46e2d000 npsvctrig (deferred)
fffff807`46e30000 fffff807`46e40000 mssmbios (deferred)
fffff807`46e50000 fffff807`46e5a000 gpuenergydrv (deferred)
fffff807`46e60000 fffff807`46e8c000 dfsc (deferred)
fffff807`46e90000 fffff807`46ef7000 portcls (deferred)
fffff807`46f20000 fffff807`46f3d000 crashdmp (deferred)
fffff807`46f40000 fffff807`46fcf000 mrxsmb (deferred)
fffff807`47000000 fffff807`47016000 bam (deferred)
fffff807`47020000 fffff807`4706f000 ahcache (deferred)
fffff807`47070000 fffff807`4707e000 amdxe (deferred)
fffff807`47080000 fffff807`4709a000 amdfendr (deferred)
fffff807`470a0000 fffff807`4712d000 Vid (deferred)
fffff807`47130000 fffff807`4714f000 winhvr (deferred)
fffff807`47150000 fffff807`47161000 CompositeBus (deferred)
fffff807`47170000 fffff807`4717d000 kdnic (deferred)
fffff807`47180000 fffff807`47195000 umbus (deferred)
fffff807`471a0000 fffff807`47229000 USBXHCI (deferred)
fffff807`47230000 fffff807`47271000 ucx01000 (deferred)
fffff807`47280000 fffff807`47372000 rt640x64 (deferred)
fffff807`47380000 fffff807`473eb000 fastfat (deferred)
fffff807`47400000 fffff807`47430000 msgpioclx (deferred)
fffff807`47440000 fffff807`4744c000 wmiacpi (deferred)
fffff807`47450000 fffff807`4748a000 amdppm (deferred)
fffff807`47490000 fffff807`4749a000 amdgpio3 (deferred)
fffff807`474a0000 fffff807`474ae000 UEFI (deferred)
fffff807`474b0000 fffff807`474bd000 NdisVirtualBus (deferred)
fffff807`474c0000 fffff807`474cc000 swenum (deferred)
fffff807`474d0000 fffff807`474db000 logi_joy_bus_enum (deferred)
fffff807`474e0000 fffff807`474f2000 logi_joy_xlcore (deferred)
fffff807`47500000 fffff807`4750e000 rdpbus (deferred)
fffff807`47510000 fffff807`4751c000 droidcamvideo (deferred)
fffff807`47520000 fffff807`4753c000 STREAM (deferred)
fffff807`47540000 fffff807`4754f000 ksthunk (deferred)
fffff807`47550000 fffff807`4755a000 droidcam (deferred)
fffff807`47560000 fffff807`47600000 UsbHub3 (deferred)
fffff807`47610000 fffff807`4761e000 USBD (deferred)
fffff807`47620000 fffff807`4763d000 AtihdWT6 (deferred)
fffff807`47640000 fffff807`47d6e000 RTKVHD64 (deferred)
fffff807`47d70000 fffff807`47da3000 usbccgp (deferred)
fffff807`47db0000 fffff807`47dc2000 hidusb (deferred)
fffff807`47dd0000 fffff807`47e0b000 HIDCLASS (deferred)
fffff807`47e10000 fffff807`47e23000 HIDPARSE (deferred)
fffff807`47e30000 fffff807`47e40000 mouhid (deferred)
fffff807`47e50000 fffff807`47e63000 mouclass (deferred)
fffff807`47e70000 fffff807`47e81000 kbdhid (deferred)
fffff807`47e90000 fffff807`47ea4000 kbdclass (deferred)
fffff807`47eb0000 fffff807`47f8a000 dxgmms2 (deferred)
fffff807`47f90000 fffff807`47fa8000 monitor (deferred)
fffff807`47fb0000 fffff807`47fbd000 rdpvideominiport (deferred)
fffff807`47fc0000 fffff807`47fea000 luafv (deferred)
fffff807`47ff0000 fffff807`48027000 wcifs (deferred)
fffff807`48030000 fffff807`4805f000 rdpdr (deferred)
fffff807`48060000 fffff807`480d7000 cldflt (deferred)
fffff807`480e0000 fffff807`480fa000 storqosflt (deferred)
fffff807`48100000 fffff807`48127000 tsusbhub (deferred)
fffff807`48130000 fffff807`48149000 mslldp (deferred)
fffff807`48170000 fffff807`4817e000 dump_diskdump (deferred)
fffff807`481b0000 fffff807`481de000 dump_storahci (deferred)
fffff807`48200000 fffff807`4821d000 dump_dumpfve (deferred)
fffff807`48220000 fffff807`48245000 bowser (deferred)
fffff807`48250000 fffff807`48288000 winquic (deferred)
fffff807`482d0000 fffff807`482f1000 drmk (deferred)
fffff807`48300000 fffff807`48378000 ks (deferred)
fffff807`48380000 fffff807`4838b000 AMDPCIDev (deferred)
fffff807`48390000 fffff807`483ac000 serial (deferred)
fffff807`483b0000 fffff807`483bf000 serenum (deferred)
fffff807`483c0000 fffff807`483cd000 amdgpio2 (deferred)
fffff807`4c000000 fffff807`50baf000 amdkmdag (deferred)
fffff807`50bb0000 fffff807`50bd2000 HDAudBus (deferred)
fffff807`88a00000 fffff807`88b44000 HTTP (deferred)
fffff807`88b50000 fffff807`88b6a000 mpsdrv (deferred)
fffff807`88b70000 fffff807`88ba4000 AMDRyzenMasterDriver (deferred)
fffff807`88bb0000 fffff807`88be3000 AMDRyzenMasterDriver_fffff80788bb0000 (deferred)
fffff807`88bf0000 fffff807`88bf8000 logi_core_temp (deferred)
fffff807`88c00000 fffff807`88c14000 mmcss (deferred)
fffff807`88c20000 fffff807`88c73000 srvnet (deferred)
fffff807`88c80000 fffff807`88ca7000 Ndu (deferred)
fffff807`88cb0000 fffff807`88d86000 peauth (deferred)
fffff807`88d90000 fffff807`88da4000 tcpipreg (deferred)
fffff807`88db0000 fffff807`88e75000 srv2 (deferred)
fffff807`88e80000 fffff807`88e9d000 rassstp (deferred)
fffff807`88ea0000 fffff807`88ee1000 NDProxy (deferred)
fffff807`88ef0000 fffff807`88f17000 AgileVpn (deferred)
fffff807`88f20000 fffff807`88f42000 rasl2tp (deferred)
fffff807`88f50000 fffff807`88f70000 raspptp (deferred)
fffff807`88f80000 fffff807`88f9c000 raspppoe (deferred)
fffff807`88fa0000 fffff807`88faf000 ndistapi (deferred)
fffff807`88fb0000 fffff807`88fea000 ndiswan (deferred)
fffff807`88ff0000 fffff807`890b5000 xvdd (deferred)
fffff807`890c0000 fffff807`890d3000 condrv (deferred)
fffff807`890e0000 fffff807`890f5000 gameflt (deferred)
fffff807`89100000 fffff807`89116000 WdNisDrv (deferred)
fffff807`89120000 fffff807`89141000 bindflt (deferred)
fffff807`89150000 fffff807`89160000 MSKSSRV (deferred)
fffff807`895c0000 fffff807`89605000 mrxsmb20 (deferred)
fffff807`89610000 fffff807`89628000 lltdio (deferred)
fffff807`89630000 fffff807`8964b000 rspndr (deferred)
fffff807`89650000 fffff807`8966d000 wanarp (deferred)
fffff807`89670000 fffff807`89722000 nwifi (deferred)
fffff807`89730000 fffff807`89748000 ndisuio (deferred)
Unloaded modules:
fffff807`46f50000 fffff807`46f5f000 dump_storpor
fffff807`46f90000 fffff807`46fbf000 dump_storahc
fffff807`46fe0000 fffff807`46ffe000 dump_dumpfve
fffff807`46e90000 fffff807`46eae000 dam.sys
fffff807`3c3d0000 fffff807`3c3e1000 WdBoot.sys
fffff807`3df90000 fffff807`3dfa1000 hwpolicy.sys
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2260]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 1.7U
BiosReleaseDate = 12/02/2019
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7B84
SystemFamily = To be filled by O.E.M.
SystemVersion = 1.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = A320M PRO-M2 (MS-7B84)
BaseBoardVersion = 1.0
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\baris\Desktop\dmp\010221-14312-01 - Kopya.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff801`71e00000 PsLoadedModuleList = 0xfffff801`722461b0
Debug session time: Sat Jan 2 15:02:20.846 2021 (UTC + 3:00)
System Uptime: 0 days 0:00:08.603
Loading Kernel Symbols
...............................................................
.................................................
Loading User Symbols
Loading unloaded module list
...
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`71fc3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffef88`b1ae49f0=000000000000007e
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80171e63c19, The address that the exception occurred at
Arg3: ffffef88b1ae5a08, Exception Record Address
Arg4: ffffef88b1ae5250, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6781
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8J3G4RH
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17860
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80171e63c19
BUGCHECK_P3: ffffef88b1ae5a08
BUGCHECK_P4: ffffef88b1ae5250
EXCEPTION_RECORD: ffffef88b1ae5a08 -- (.exr 0xffffef88b1ae5a08)
ExceptionAddress: fffff80171e63c19 (nt!RtlRbRemoveNode+0x00000000000003a9)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffef88b1ae5250 -- (.cxr 0xffffef88b1ae5250)
rax=a09d9f05aed94218 rbx=ffffab8aeb000290 rcx=ffffab8aef66c9f8
rdx=ffffab8aefe109f8 rsi=0000000000000000 rdi=a09d9f05aed94218
rip=fffff80171e63c19 rsp=ffffef88b1ae5c48 rbp=ffffef88b1ae5cd9
r8=ffffab8aebf28e58 r9=0000000000000000 r10=ffffab8aeede39f0
r11=ffffab8aebf28e58 r12=0000000000000000 r13=ffffab8aefe02000
r14=0000000000000000 r15=ffffab8aeb000280
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlRbRemoveNode+0x3a9:
fffff801`71e63c19 488b07 mov rax,qword ptr [rdi] ds:002b:a09d9f05`aed94218=????????????????
Resetting default scope
BLACKBOXNTFS: 1 (!blackboxntfs)
PROCESS_NAME: System
READ_ADDRESS: fffff801723713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801722283b8: Unable to get Flags value from nt!KdVersionBlock
fffff801722283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
LOCK_ADDRESS: fffff80172260a00 -- (!locks fffff80172260a00)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff80172260a00) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80172260a00
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
STACK_TEXT:
ffffef88`b1ae5c48 fffff801`71e620e8 : ffffef88`b1ae5cd9 00000000`0000005f ffffab8a`efe109f0 ffffab8a`eb000280 : nt!RtlRbRemoveNode+0x3a9
ffffef88`b1ae5c60 fffff801`71e61fa9 : ffffab8a`eb000280 00000000`00000000 fffff1a2`00000001 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x48
ffffef88`b1ae5d30 fffff801`71e3854a : ffffef88`00000038 ffffef88`00000360 00000000`00000360 00000000`00000000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffffef88`b1ae5da0 fffff801`7216e06d : ffffef88`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!ExAllocateHeapPool+0xc6a
ffffef88`b1ae5ee0 fffff801`72512712 : 00000000`00000348 ffffd904`7b7cd240 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffffef88`b1ae5f30 fffff801`7250ea78 : 00000000`00000348 00000000`00000000 ffffd904`7d068790 ffffd904`7d08cc40 : nt!MiCaptureRetpolineImportInfo+0x8a
ffffef88`b1ae5f80 fffff801`7250df00 : 00000000`00000000 ffffef88`b1ae60b0 ffffd904`7d08cc40 00000000`00000000 : nt!MiApplyImportOptimizationToRuntimeDriver+0x98
ffffef88`b1ae5fb0 fffff801`72544186 : ffffef88`b1ae6218 00000000`00000000 00000000`00000000 fffff801`72545d01 : nt!MmLoadSystemImageEx+0x450
ffffef88`b1ae6160 fffff801`7250f040 : 00000000`00000000 00000000`00000000 fffff801`722461b0 ffffef88`b1ae6358 : nt!MiLoadImportDll+0x3a
ffffef88`b1ae61b0 fffff801`7250de3f : fffff801`84e00000 ffffef88`b1ae6338 ffffef88`b1ae6378 00000000`00000000 : nt!MiResolveImageReferences+0x220
ffffef88`b1ae62c0 fffff801`72509866 : ffffef88`b1ae6508 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MmLoadSystemImageEx+0x38f
ffffef88`b1ae6470 fffff801`72509344 : ffffef88`b1ae65b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x26
ffffef88`b1ae64b0 fffff801`72533c67 : 00000000`00000000 00000000`00000000 00000000`00000004 ffffef88`00000004 : nt!IopLoadDriver+0x224
ffffef88`b1ae6690 fffff801`7250375a : ffffffff`80000201 00000000`00000000 ffffd904`7b41b9f0 ffffffff`8000029c : nt!PipCallDriverAddDeviceQueryRoutine+0x1c3
ffffef88`b1ae6730 fffff801`72503161 : 00000000`00000000 ffffef88`b1ae6840 00000000`6e657050 00000000`00000012 : nt!PnpCallDriverQueryServiceHelper+0xda
ffffef88`b1ae67e0 fffff801`72502815 : ffffd904`7b1a2010 ffffef88`b1ae6a18 ffffd904`7b1a2010 00000000`00000000 : nt!PipCallDriverAddDevice+0x409
ffffef88`b1ae69a0 fffff801`72589c08 : ffffd904`7bcfe100 ffffef88`b1ae6b01 ffffef88`b1ae6ab0 fffff801`00000000 : nt!PipProcessDevNodeTree+0x1b9
ffffef88`b1ae6a60 fffff801`71f5d99e : 00000001`00000003 ffffd904`7bcfe140 ffff9400`00000000 ffffd904`7bcfe140 : nt!PiProcessStartSystemDevices+0x60
ffffef88`b1ae6ab0 fffff801`71e59d35 : ffffd904`7b7cd240 ffffd904`78890ce0 fffff801`7225f2c0 ffffd904`78890ce0 : nt!PnpDeviceActionWorker+0x45e
ffffef88`b1ae6b70 fffff801`71f33585 : ffffd904`7b7cd240 00000000`00000080 ffffd904`78878040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffef88`b1ae6c10 fffff801`71fcb128 : fffff801`6dce2180 ffffd904`7b7cd240 fffff801`71f33530 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffef88`b1ae6c60 00000000`00000000 : ffffef88`b1ae7000 ffffef88`b1ae1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlRbRemoveNode+3a9
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1256
STACK_COMMAND: .cxr 0xffffef88b1ae5250 ; kb
BUCKET_ID_FUNC_OFFSET: 3a9
FAILURE_BUCKET_ID: AV_nt!RtlRbRemoveNode
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9b43c07a-2da2-b63c-46ab-1c788c8a28c1}
Followup: MachineOwner
---------
2: kd> lm
start end module name
fffff801`71e00000 fffff801`728b5000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\808491FFD53A33DDE6F2613F332E887D1\ntkrnlmp.pdb
fffff801`728b5000 fffff801`72959000 hal (deferred)
fffff801`73e00000 fffff801`73e0b000 kd (deferred)
fffff801`73e10000 fffff801`73e32000 mcupdate_AuthenticAMD (deferred)
fffff801`73e40000 fffff801`73e51000 werkernel (deferred)
fffff801`73e60000 fffff801`73e89000 ksecdd (deferred)
fffff801`73e90000 fffff801`73ef0000 msrpc (deferred)
fffff801`73f00000 fffff801`73f27000 tm (deferred)
fffff801`73f30000 fffff801`73f98000 CLFS (deferred)
fffff801`73fa0000 fffff801`73fba000 PSHED (deferred)
fffff801`73fc0000 fffff801`73fcb000 BOOTVID (deferred)
fffff801`73fd0000 fffff801`740d5000 clipsp (deferred)
fffff801`740e0000 fffff801`74151000 FLTMGR (deferred)
fffff801`74160000 fffff801`7416e000 cmimcext (deferred)
fffff801`74170000 fffff801`7417c000 ntosext (deferred)
fffff801`74180000 fffff801`74193000 WDFLDR (deferred)
fffff801`741a0000 fffff801`741af000 SleepStudyHelper (deferred)
fffff801`741b0000 fffff801`741c0000 WppRecorder (deferred)
fffff801`741d0000 fffff801`741f5000 acpiex (deferred)
fffff801`74200000 fffff801`742de000 CI (deferred)
fffff801`742e0000 fffff801`7439b000 cng (deferred)
fffff801`743a0000 fffff801`74475000 Wdf01000 (deferred)
fffff801`74480000 fffff801`744c8000 mssecflt (deferred)
fffff801`744d0000 fffff801`744ea000 SgrmAgent (deferred)
fffff801`744f0000 fffff801`745bc000 ACPI (deferred)
fffff801`745c0000 fffff801`745cc000 WMILIB (deferred)
fffff801`745f0000 fffff801`7464b000 intelpep (deferred)
fffff801`74650000 fffff801`74667000 WindowsTrustedRT (deferred)
fffff801`74670000 fffff801`7467b000 WindowsTrustedRTProxy (deferred)
fffff801`74680000 fffff801`74695000 pcw (deferred)
fffff801`746a0000 fffff801`746ab000 msisadrv (deferred)
fffff801`746b0000 fffff801`7471e000 pci (deferred)
fffff801`74720000 fffff801`74733000 vdrvroot (deferred)
fffff801`74740000 fffff801`74757000 amdkmpfd (deferred)
fffff801`74760000 fffff801`74793000 pdc (deferred)
fffff801`747a0000 fffff801`747b9000 CEA (deferred)
fffff801`747c0000 fffff801`747f0000 partmgr (deferred)
fffff801`74800000 fffff801`748a5000 spaceport (deferred)
fffff801`748b0000 fffff801`748ca000 volmgr (deferred)
fffff801`748d0000 fffff801`74933000 volmgrx (deferred)
fffff801`74940000 fffff801`7495f000 mountmgr (deferred)
fffff801`74960000 fffff801`7498e000 storahci (deferred)
fffff801`74990000 fffff801`74a32000 storport (deferred)
fffff801`74a40000 fffff801`74a5b000 EhStorClass (deferred)
fffff801`74a60000 fffff801`74a7a000 fileinfo (deferred)
fffff801`74a80000 fffff801`74abd000 Wof (deferred)
fffff801`74ac0000 fffff801`74b2c000 WdFilter (deferred)
fffff801`74b30000 fffff801`74dcd000 Ntfs (deferred)
fffff801`74dd0000 fffff801`74ddd000 Fs_Rec (deferred)
fffff801`74de0000 fffff801`74deb000 volume (deferred)
fffff801`74e00000 fffff801`7598b000 FACEIT (deferred)
fffff801`75990000 fffff801`75b01000 ndis (deferred)
fffff801`75b10000 fffff801`75ba4000 NETIO (deferred)
fffff801`75bb0000 fffff801`75be2000 ksecpkg (deferred)
fffff801`75bf0000 fffff801`75edb000 tcpip (deferred)
fffff801`75ee0000 fffff801`75f5a000 fwpkclnt (deferred)
fffff801`75f60000 fffff801`75f90000 wfplwfs (deferred)
fffff801`75fa0000 fffff801`76069000 fvevol (deferred)
fffff801`76070000 fffff801`760dd000 volsnap (deferred)
fffff801`760e0000 fffff801`7612e000 rdyboost (deferred)
fffff801`76130000 fffff801`76156000 mup (deferred)
fffff801`76160000 fffff801`76172000 iorate (deferred)
fffff801`761b0000 fffff801`761cc000 disk (deferred)
fffff801`761d0000 fffff801`7623b000 CLASSPNP (deferred)
fffff801`7e830000 fffff801`7e85e000 dump_storahci (deferred)
fffff801`7e880000 fffff801`7e89d000 dump_dumpfve (deferred)
fffff801`7e8a0000 fffff801`7e8d0000 cdrom (deferred)
fffff801`7e8e0000 fffff801`7e8f5000 filecrypt (deferred)
fffff801`7e900000 fffff801`7e90e000 tbs (deferred)
fffff801`7e910000 fffff801`7e91a000 Null (deferred)
fffff801`7e920000 fffff801`7e92a000 Beep (deferred)
fffff801`7e930000 fffff801`7e95b000 pacer (deferred)
fffff801`7e960000 fffff801`7e974000 netbios (deferred)
fffff801`7e980000 fffff801`7e9fb000 rdbss (deferred)
fffff801`7ea00000 fffff801`7ea94000 csc (deferred)
fffff801`7eaa0000 fffff801`7eab2000 nsiproxy (deferred)
fffff801`7eac0000 fffff801`7eacd000 npsvctrig (deferred)
fffff801`7ead0000 fffff801`7eae0000 mssmbios # (pdb symbols) C:\ProgramData\Dbg\sym\mssmbios.pdb\7CE0C1D2DD53B809A668DE8F5F91012E1\mssmbios.pdb
fffff801`7eaf0000 fffff801`7eafa000 gpuenergydrv (deferred)
fffff801`7eb00000 fffff801`7eb2c000 dfsc (deferred)
fffff801`7ebb0000 fffff801`7ebcd000 crashdmp (deferred)
fffff801`7ebe0000 fffff801`7ebee000 dump_diskdump (deferred)
fffff801`7f000000 fffff801`7f0a7000 afd (deferred)
fffff801`7f0b0000 fffff801`7f421000 dxgkrnl (deferred)
fffff801`7f430000 fffff801`7f446000 watchdog (deferred)
fffff801`7f450000 fffff801`7f466000 BasicDisplay (deferred)
fffff801`7f470000 fffff801`7f481000 BasicRender (deferred)
fffff801`7f490000 fffff801`7f4ac000 Npfs (deferred)
fffff801`7f4b0000 fffff801`7f4c1000 Msfs (deferred)
fffff801`7f4d0000 fffff801`7f50d000 amdpsp (deferred)
fffff801`7f510000 fffff801`7f536000 tdx (deferred)
fffff801`7f540000 fffff801`7f550000 TDI (deferred)
fffff801`7f560000 fffff801`7f5b9000 netbt (deferred)
fffff801`7f5c0000 fffff801`7f5d3000 afunix (deferred)
fffff801`7f5e0000 fffff801`7f5fa000 vwififlt (deferred)
fffff801`7f600000 fffff801`7f689000 USBXHCI (deferred)
fffff801`7f690000 fffff801`7f6d1000 ucx01000 (deferred)
fffff801`7f6e0000 fffff801`7f7d2000 rt640x64 (deferred)
fffff801`7ffa0000 fffff801`8000b000 fastfat (deferred)
fffff801`80010000 fffff801`80026000 bam (deferred)
fffff801`80030000 fffff801`8007f000 ahcache (deferred)
fffff801`80080000 fffff801`8008e000 amdxe (deferred)
fffff801`80090000 fffff801`800aa000 amdfendr (deferred)
fffff801`800b0000 fffff801`8013d000 Vid (deferred)
fffff801`80140000 fffff801`8015f000 winhvr (deferred)
fffff801`80160000 fffff801`80171000 CompositeBus (deferred)
fffff801`80180000 fffff801`8018d000 kdnic (deferred)
fffff801`80190000 fffff801`801a5000 umbus (deferred)
fffff801`84e00000 fffff801`84e22000 HDAudBus (deferred)
fffff801`84e30000 fffff801`84e97000 portcls (deferred)
fffff801`84ea0000 fffff801`84ec1000 drmk (deferred)
fffff801`84ed0000 fffff801`84f48000 ks (deferred)
fffff801`85830000 fffff801`8a3df000 amdkmdag (deferred)
Unloaded modules:
fffff801`7eb30000 fffff801`7eb4e000 dam.sys
fffff801`745d0000 fffff801`745e1000 WdBoot.sys
fffff801`76190000 fffff801`761a1000 hwpolicy.sys
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\baris\Desktop\dmp\010321-16687-01 - Kopya.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff805`0c400000 PsLoadedModuleList = 0xfffff805`0c8461b0
Debug session time: Sun Jan 3 15:21:15.972 2021 (UTC + 3:00)
System Uptime: 0 days 0:00:07.728
Loading Kernel Symbols
...............................................................
............................................
Loading User Symbols
Loading unloaded module list
...
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`0c5c3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffd8c`a8be77a0=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffce0913148b60, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8050c50c74d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3328
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-8J3G4RH
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3333
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffce0913148b60
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8050c50c74d
BUGCHECK_P4: 2
READ_ADDRESS: fffff8050c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8050c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffce0913148b60
MM_INTERNAL_CODE: 2
BLACKBOXNTFS: 1 (!blackboxntfs)
PROCESS_NAME: System
TRAP_FRAME: fffffd8ca8be7a40 -- (.trap 0xfffffd8ca8be7a40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000007fffff rbx=0000000000000000 rcx=00000000007fffff
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050c50c74d rsp=fffffd8ca8be7bd8 rbp=0000000001000000
r8=ffffce090f148b70 r9=0000000000ffffff r10=0000000000000000
r11=ffffce090f148c90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!FsRtlFindLargeIndex+0x3d:
fffff805`0c50c74d 413b5cc8f8 cmp ebx,dword ptr [r8+rcx*8-8] ds:ffffce09`13148b60=????????
Resetting default scope
STACK_TEXT:
fffffd8c`a8be7798 fffff805`0c60de82 : 00000000`00000050 ffffce09`13148b60 00000000`00000000 fffffd8c`a8be7a40 : nt!KeBugCheckEx
fffffd8c`a8be77a0 fffff805`0c4caaff : ffffce09`0fed6000 00000000`00000000 00000000`00000000 ffffce09`13148b60 : nt!MiSystemFault+0x198d62
fffffd8c`a8be78a0 fffff805`0c5d1b5e : fffffd8c`a8be7b50 fffff805`0c4384d0 00000000`00000000 ffffce09`0a801b40 : nt!MmAccessFault+0x34f
fffffd8c`a8be7a40 fffff805`0c50c74d : fffff805`0c50c25a 00000000`00000000 00000000`00000001 ce090f14`8cd88cb0 : nt!KiPageFault+0x35e
fffffd8c`a8be7bd8 fffff805`0c50c25a : 00000000`00000000 00000000`00000001 ce090f14`8cd88cb0 00000000`00000001 : nt!FsRtlFindLargeIndex+0x3d
fffffd8c`a8be7be0 fffff805`10343da9 : 00000000`00000000 ffffce09`0f148a10 00000000`00000000 fffff805`10435355 : nt!FsRtlAddBaseMcbEntryEx+0x2a
fffffd8c`a8be7c40 fffff805`10342bc3 : ffffce09`0f148cf0 ffffce09`0f148b70 00000000`00000177 00000000`00000000 : Ntfs!NtfsAddNtfsMcbEntry+0x179
fffffd8c`a8be7d10 fffff805`1034247e : ffffa28e`2b7d5b28 ffffce09`0f148b70 ffffa28e`00000000 00000000`00000000 : Ntfs!NtfsLookupRealAllocationInternal+0x4c3
fffffd8c`a8be7eb0 fffff805`10341c5e : ffffa28e`2b7d5b28 ffffce09`0f148b70 00000000`00000000 fffffd8c`a8be8028 : Ntfs!NtfsLookupAllocation+0x62
fffffd8c`a8be7f60 fffff805`10341355 : ffffa28e`2b7d5b28 ffffa28e`2bbd1820 fffffd8c`a8be8180 ffffa28e`2bbd1820 : Ntfs!NtfsPrepareSimpleBuffers+0x19e
fffffd8c`a8be80d0 fffff805`10340196 : fffffd8c`a8be8180 fffffd8c`a8be8240 ffffa28e`2b7d5b28 00000000`00000000 : Ntfs!NtfsPrepareBuffers+0xc5
fffffd8c`a8be8140 fffff805`10346ed8 : fffffd8c`a8be85e0 00000000`00008000 00000000`00000001 ffffa28e`2bbd1820 : Ntfs!NtfsNonCachedIo+0x2e6
fffffd8c`a8be83f0 fffff805`1034649c : fffffd8c`a8be85f0 ffffa28e`2bbd1820 fffffd8c`a8be85f0 ffffa28e`2b7d5b28 : Ntfs!NtfsCommonRead+0x828
fffffd8c`a8be85b0 fffff805`0c437159 : 00000000`00000000 ffffa28e`2bbd1820 ffffa28e`2bbd1bc0 00000000`00000400 : Ntfs!NtfsFsdRead+0x20c
fffffd8c`a8be8670 fffff805`0f75ce4e : fffffd8c`a8be8fa0 ffffce09`0fed87b0 fffffd8c`a8be8f00 00000000`00000000 : nt!IofCallDriver+0x59
fffffd8c`a8be86b0 fffff805`0f75c893 : ffffce09`0fed87b0 ffffa28e`2d0602d0 00000000`00000000 fffffd8c`a8be87a8 : CLFS!CClfsContainer::ReadSector+0x31e
fffffd8c`a8be8760 fffff805`0f76ad0c : ffffa28e`2d1a1000 fffff805`00000000 00000000`00000002 00000000`00000000 : CLFS!CClfsBaseFilePersisted::ReadMetadataBlock+0x123
fffffd8c`a8be8800 fffff805`0f76ac83 : ffffa28e`2d1a1000 00000000`00000000 00000000`00000002 00000000`00000006 : CLFS!CClfsBaseFile::AcquireMetadataBlock+0x44
fffffd8c`a8be8830 fffff805`0f76a9a7 : ffffa28e`2d1a1000 fffffd8c`a8be8fa0 fffffd8c`a8be8918 ffffa28e`00000000 : CLFS!CClfsBaseFile::GetControlRecord+0x1b
fffffd8c`a8be8860 fffff805`0f769841 : ffffa28e`2d1a1000 fffffd8c`a8be8918 ffffa28e`2d1a1001 ffffa28e`00000000 : CLFS!CClfsBaseFilePersisted::ReadImage+0x133
fffffd8c`a8be88d0 fffff805`0f737efd : ffffa28e`2d1a1000 fffffd8c`a8be89d0 00000000`00000000 00000000`73666c43 : CLFS!CClfsBaseFilePersisted::OpenImage+0x2f9
fffffd8c`a8be8950 fffff805`0f76340d : ffffa28e`2d08b000 00000000`00000000 ffffa28e`2b7888c0 ffffa28e`0013019f : CLFS!CClfsLogFcbPhysical::Initialize+0x315
fffffd8c`a8be8a90 fffff805`0f761f2b : ffffa28e`2baf8e90 fffff805`0c9f2f01 00000000`00000007 fffff805`0f760000 : CLFS!CClfsRequest::Create+0x729
fffffd8c`a8be8bd0 fffff805`0f761cf7 : ffffa28e`2baf8e90 fffffd8c`a8be8d98 ffffa28e`2b6c19f0 00000000`00000000 : CLFS!CClfsRequest::Dispatch+0x97
fffffd8c`a8be8c20 fffff805`0f761c47 : ffffa28e`2baf96e0 ffffa28e`2baf96e0 00000000`00000000 00000000`00000000 : CLFS!ClfsDispatchIoRequest+0x87
fffffd8c`a8be8c70 fffff805`0c437159 : 00000000`00000005 00000000`00000000 ffffa28e`2baf96e0 00000000`0013019f : CLFS!CClfsDriver::LogIoDispatch+0x27
fffffd8c`a8be8ca0 fffff805`0c50a404 : 00000000`00000003 00000000`00000000 00000000`00000001 fffff805`0c443e63 : nt!IofCallDriver+0x59
fffffd8c`a8be8ce0 fffff805`0ca010be : fffffd8c`a8be8fa0 00000000`00000005 00000000`00000000 ffffa28e`2baf97b0 : nt!IoCallDriverWithTracing+0x34
fffffd8c`a8be8d30 fffff805`0c9f666f : ffffa28e`2b6c19f0 ffffa28e`2b6c1905 ffffa28e`2b7888a0 00000000`00000000 : nt!IopParseDevice+0x121e
fffffd8c`a8be8ea0 fffff805`0c9f4ad1 : ffffa28e`2b788800 fffffd8c`a8be90e8 fffffd8c`00000242 ffffa28e`28af5980 : nt!ObpLookupObjectName+0x78f
fffffd8c`a8be9060 fffff805`0ca177a6 : 00000000`00000001 fffffd8c`a8be94d0 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x201
fffffd8c`a8be91a0 fffff805`0ca1706d : fffffd8c`a8be9428 fffffd8c`c0010000 fffffd8c`a8be94d0 fffffd8c`a8be94c0 : nt!IopCreateFile+0x606
fffffd8c`a8be9240 fffff805`0cae699a : 00000000`00000000 fffffd8c`a8be99c9 00000000`00008001 00000000`04000000 : nt!IoCreateFileEx+0x11d
fffffd8c`a8be92e0 fffff805`0f76125f : 00000000`00000010 fffffd8c`a8be99c9 00000000`c0000000 00000000`04000000 : nt!IoCreateFileSpecifyDeviceObjectHint+0xba
fffffd8c`a8be93a0 fffff805`1049f4bd : ffffa28e`2d0c2180 fffffd8c`a8be99c9 ffffce09`0fe4d000 ffffa28e`2d0c39d8 : CLFS!ClfsCreateLogFile+0x74f
fffffd8c`a8be9580 fffff805`1049b131 : ffffce09`0b602730 ffffa28e`2d0c3fe0 ffffa28e`2d0c3fe0 fffff805`10393a04 : Ntfs!TxfStartRm+0x5a1
fffffd8c`a8be9810 fffff805`10460e4b : ffffa28e`2d0c2180 fffff805`0c400001 ffffe400`88482100 ffffe400`88493140 : Ntfs!TxfInitializeVolume+0x685
fffffd8c`a8be9950 fffff805`10351c50 : ffffa28e`2b7b5d38 fffff805`10351890 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x16b
fffffd8c`a8be9a30 fffff805`0c459d35 : ffffa28e`28a90ce0 ffffa28e`2b96b080 ffffa28e`28a90ce0 ffffa28e`2b7b5dc8 : Ntfs!NtfsFspDispatch+0x3c0
fffffd8c`a8be9b70 fffff805`0c533585 : ffffa28e`2b96b080 00000000`00000080 ffffa28e`28a78040 00000000`00000001 : nt!ExpWorkerThread+0x105
fffffd8c`a8be9c10 fffff805`0c5cb128 : ffffe400`8859d180 ffffa28e`2b96b080 fffff805`0c533530 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffd8c`a8be9c60 00000000`00000000 : fffffd8c`a8bea000 fffffd8c`a8be4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: CLFS!CClfsContainer::ReadSector+31e
MODULE_NAME: CLFS
IMAGE_NAME: CLFS.SYS
IMAGE_VERSION: 10.0.18362.1198
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 31e
FAILURE_BUCKET_ID: AV_R_INVALID_CLFS!CClfsContainer::ReadSector
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {61101626-a5cb-942e-d24a-59bd6b360bed}
Followup: MachineOwner
---------
2: kd> lm
start end module name
fffff805`0c400000 fffff805`0ceb5000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\808491FFD53A33DDE6F2613F332E887D1\ntkrnlmp.pdb
fffff805`0ceb5000 fffff805`0cf59000 hal (deferred)
fffff805`0f600000 fffff805`0f60b000 kd (deferred)
fffff805`0f610000 fffff805`0f632000 mcupdate_AuthenticAMD (deferred)
fffff805`0f640000 fffff805`0f651000 werkernel (deferred)
fffff805`0f660000 fffff805`0f689000 ksecdd (deferred)
fffff805`0f690000 fffff805`0f6f0000 msrpc (deferred)
fffff805`0f700000 fffff805`0f727000 tm (deferred)
fffff805`0f730000 fffff805`0f798000 CLFS (pdb symbols) C:\ProgramData\Dbg\sym\clfs.pdb\A1CB404B4E8B1EF00479986B63F484DA1\clfs.pdb
fffff805`0f7a0000 fffff805`0f7ba000 PSHED (deferred)
fffff805`0f7c0000 fffff805`0f7cb000 BOOTVID (deferred)
fffff805`0f7d0000 fffff805`0f8d5000 clipsp (deferred)
fffff805`0f8e0000 fffff805`0f951000 FLTMGR (deferred)
fffff805`0f960000 fffff805`0f96e000 cmimcext (deferred)
fffff805`0f970000 fffff805`0f97c000 ntosext (deferred)
fffff805`0f980000 fffff805`0f993000 WDFLDR (deferred)
fffff805`0f9a0000 fffff805`0f9af000 SleepStudyHelper (deferred)
fffff805`0f9b0000 fffff805`0f9c0000 WppRecorder (deferred)
fffff805`0f9d0000 fffff805`0f9f5000 acpiex (deferred)
fffff805`0fa00000 fffff805`0fade000 CI (deferred)
fffff805`0fae0000 fffff805`0fb9b000 cng (deferred)
fffff805`0fba0000 fffff805`0fc75000 Wdf01000 (deferred)
fffff805`0fc80000 fffff805`0fcc8000 mssecflt (deferred)
fffff805`0fcd0000 fffff805`0fcea000 SgrmAgent (deferred)
fffff805`0fcf0000 fffff805`0fdbc000 ACPI (deferred)
fffff805`0fdc0000 fffff805`0fdcc000 WMILIB (deferred)
fffff805`0fdf0000 fffff805`0fe4b000 intelpep (deferred)
fffff805`0fe50000 fffff805`0fe67000 WindowsTrustedRT (deferred)
fffff805`0fe70000 fffff805`0fe7b000 WindowsTrustedRTProxy (deferred)
fffff805`0fe80000 fffff805`0fe95000 pcw (deferred)
fffff805`0fea0000 fffff805`0feab000 msisadrv (deferred)
fffff805`0feb0000 fffff805`0ff1e000 pci (deferred)
fffff805`0ff20000 fffff805`0ff33000 vdrvroot (deferred)
fffff805`0ff40000 fffff805`0ff57000 amdkmpfd (deferred)
fffff805`0ff60000 fffff805`0ff93000 pdc (deferred)
fffff805`0ffa0000 fffff805`0ffb9000 CEA (deferred)
fffff805`0ffc0000 fffff805`0fff0000 partmgr (deferred)
fffff805`10000000 fffff805`100a5000 spaceport (deferred)
fffff805`100b0000 fffff805`100ca000 volmgr (deferred)
fffff805`100d0000 fffff805`10133000 volmgrx (deferred)
fffff805`10140000 fffff805`1015f000 mountmgr (deferred)
fffff805`10160000 fffff805`1018e000 storahci (deferred)
fffff805`10190000 fffff805`10232000 storport (deferred)
fffff805`10240000 fffff805`1025b000 EhStorClass (deferred)
fffff805`10260000 fffff805`1027a000 fileinfo (deferred)
fffff805`10280000 fffff805`102bd000 Wof (deferred)
fffff805`102c0000 fffff805`1032c000 WdFilter (deferred)
fffff805`10330000 fffff805`105cd000 Ntfs (pdb symbols) C:\ProgramData\Dbg\sym\ntfs.pdb\D305814C733454428D61F40EA1CEECE91\ntfs.pdb
fffff805`105d0000 fffff805`105dd000 Fs_Rec (deferred)
fffff805`105e0000 fffff805`105eb000 volume (deferred)
fffff805`10600000 fffff805`1118b000 FACEIT (deferred)
fffff805`11190000 fffff805`11301000 ndis (deferred)
fffff805`11310000 fffff805`113a4000 NETIO (deferred)
fffff805`113b0000 fffff805`113e2000 ksecpkg (deferred)
fffff805`113f0000 fffff805`116db000 tcpip (deferred)
fffff805`116e0000 fffff805`1175a000 fwpkclnt (deferred)
fffff805`11760000 fffff805`11790000 wfplwfs (deferred)
fffff805`117a0000 fffff805`11869000 fvevol (deferred)
fffff805`11870000 fffff805`118dd000 volsnap (deferred)
fffff805`118e0000 fffff805`1192e000 rdyboost (deferred)
fffff805`11930000 fffff805`11956000 mup (deferred)
fffff805`11960000 fffff805`11972000 iorate (deferred)
fffff805`119b0000 fffff805`119cc000 disk (deferred)
fffff805`119d0000 fffff805`11a3b000 CLASSPNP (deferred)
fffff805`1a000000 fffff805`1a00a000 Null (deferred)
fffff805`1a010000 fffff805`1a01a000 Beep (deferred)
fffff805`1a020000 fffff805`1a391000 dxgkrnl (deferred)
fffff805`1a3a0000 fffff805`1a3b6000 watchdog (deferred)
fffff805`1a3c0000 fffff805`1a3d6000 BasicDisplay (deferred)
fffff805`1a3e0000 fffff805`1a3f1000 BasicRender (deferred)
fffff805`1a400000 fffff805`1a41c000 Npfs (deferred)
fffff805`1a420000 fffff805`1a431000 Msfs (deferred)
fffff805`1a440000 fffff805`1a47d000 amdpsp (deferred)
fffff805`1a480000 fffff805`1a4a6000 tdx (deferred)
fffff805`1a4b0000 fffff805`1a4c0000 TDI (deferred)
fffff805`1a4d0000 fffff805`1a529000 netbt (deferred)
fffff805`1a530000 fffff805`1a543000 afunix (deferred)
fffff805`1a550000 fffff805`1a5f7000 afd (deferred)
fffff805`1a600000 fffff805`1a61a000 vwififlt (deferred)
fffff805`1a620000 fffff805`1a64b000 pacer (deferred)
fffff805`1a650000 fffff805`1a664000 netbios (deferred)
fffff805`1a6b0000 fffff805`1a6cd000 crashdmp (deferred)
fffff805`1a6e0000 fffff805`1a6ee000 dump_diskdump (deferred)
fffff805`1a720000 fffff805`1a74e000 dump_storahci (deferred)
fffff805`1a770000 fffff805`1a78d000 dump_dumpfve (deferred)
fffff805`1a790000 fffff805`1a7c0000 cdrom (deferred)
fffff805`1a7d0000 fffff805`1a7e5000 filecrypt (deferred)
fffff805`1a7f0000 fffff805`1a7fe000 tbs (deferred)
fffff805`1a800000 fffff805`1a894000 csc (deferred)
fffff805`1a8a0000 fffff805`1a8b2000 nsiproxy (deferred)
fffff805`1a8c0000 fffff805`1a8cd000 npsvctrig (deferred)
fffff805`1a8d0000 fffff805`1a8e0000 mssmbios # (pdb symbols) C:\ProgramData\Dbg\sym\mssmbios.pdb\7CE0C1D2DD53B809A668DE8F5F91012E1\mssmbios.pdb
fffff805`1a8f0000 fffff805`1a8fa000 gpuenergydrv (deferred)
fffff805`1a900000 fffff805`1a97b000 rdbss (deferred)
fffff805`1a980000 fffff805`1a9ac000 dfsc (deferred)
fffff805`1aa00000 fffff805`1aa89000 USBXHCI (deferred)
fffff805`1aa90000 fffff805`1aad1000 ucx01000 (deferred)
fffff805`1aae0000 fffff805`1abd2000 rt640x64 (deferred)
fffff805`1abe0000 fffff805`1ac4b000 fastfat (deferred)
fffff805`1ac50000 fffff805`1ac66000 bam (deferred)
fffff805`1ac70000 fffff805`1acbf000 ahcache (deferred)
fffff805`1acc0000 fffff805`1acce000 amdxe (deferred)
fffff805`1acd0000 fffff805`1acea000 amdfendr (deferred)
fffff805`1acf0000 fffff805`1ad7d000 Vid (deferred)
fffff805`1ad80000 fffff805`1ad9f000 winhvr (deferred)
fffff805`1ada0000 fffff805`1adb1000 CompositeBus (deferred)
fffff805`1adc0000 fffff805`1adcd000 kdnic (deferred)
fffff805`1add0000 fffff805`1ade5000 umbus (deferred)
Unloaded modules:
fffff805`1a9b0000 fffff805`1a9ce000 dam.sys
fffff805`0fdd0000 fffff805`0fde1000 WdBoot.sys
fffff805`11990000 fffff805`119a1000 hwpolicy.sys
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Şahan\Desktop\dmp\010421-23093-01 - Kopya.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff807`38800000 PsLoadedModuleList = 0xfffff807`38c461b0
Debug session time: Mon Jan 4 13:53:47.545 2021 (UTC + 3:00)
System Uptime: 0 days 0:01:35.302
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`389c3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff585`a4ce5da0=00000000000000ef
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffe58163ed8240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-Q19AAHT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4540
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffe58163ed8240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: ffffe58163ed8800 -- (.exr 0xffffe58163ed8800)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x67ae9080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
EXCEPTION_STR: 0x0
TRAP_FRAME: ffffbbddeef77000 -- (.trap 0xffffbbddeef77000)
Unable to read trap frame at ffffbbdd`eef77000
STACK_TEXT:
fffff585`a4ce5d98 fffff807`390c9a59 : 00000000`000000ef ffffe581`63ed8240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff585`a4ce5da0 fffff807`38fda511 : ffffe581`63ed8240 fffff807`38920d35 ffffe581`63ed8240 fffff807`388e9438 : nt!PspCatchCriticalBreak+0x115
fffff585`a4ce5e40 fffff807`38e72898 : ffffe581`00000000 00000000`00000000 ffffe581`63ed8240 ffffe581`63ed8240 : nt!PspTerminateAllThreads+0x165a45
fffff585`a4ce5eb0 fffff807`38ed6db9 : ffffffff`ffffffff fffff585`a4ce5fe0 ffffe581`63ed8240 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff585`a4ce5ef0 fffff807`389d5358 : 00000000`00000350 ffffe581`67ae9080 ffffe581`63ed8240 fffff585`a4ce6130 : nt!NtTerminateProcess+0xa9
fffff585`a4ce5f60 fffff807`389c7940 : fffff807`389e9220 fffff585`a4ce6a58 fffff585`a4ce6a58 fffff585`a4ce6130 : nt!KiSystemServiceCopyEnd+0x28
fffff585`a4ce60f8 fffff807`389e9220 : fffff585`a4ce6a58 fffff585`a4ce6a58 fffff585`a4ce6130 00000000`00000000 : nt!KiServiceLinkage
fffff585`a4ce6100 fffff807`389d5d64 : ffffe581`63ed8800 fffff807`388ccb06 ffffbbdd`eef77000 00007ffe`08b447a0 : nt!KiDispatchException+0x1d3470
fffff585`a4ce6920 fffff807`389d40e3 : ffffe581`67ae9080 0000024c`0d84ce00 00000064`445fe270 ffffe581`6832c500 : nt!KiFastFailDispatch+0xe4
fffff585`a4ce6b00 00007ffe`08b447d8 : 00000000`00000088 00007ffe`08b3bf4e 00000000`00000000 00007ffe`08aedc7a : nt!KiRaiseSecurityCheckFailure+0x323
00000064`445fd5a0 00000000`00000088 : 00007ffe`08b3bf4e 00000000`00000000 00007ffe`08aedc7a 00000000`0003a9fc : 0x00007ffe`08b447d8
00000064`445fd5a8 00007ffe`08b3bf4e : 00000000`00000000 00007ffe`08aedc7a 00000000`0003a9fc 00007ffe`08b2ccd6 : 0x88
00000064`445fd5b0 00000000`00000000 : 00007ffe`08aedc7a 00000000`0003a9fc 00007ffe`08b2ccd6 00000000`00000000 : 0x00007ffe`08b3bf4e
SYMBOL_NAME: nt!PspCatchCriticalBreak+115
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1256
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 115
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_67ae9080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b3abb7df-8311-d858-3571-9c6559dcf5e5}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.