UNEXPECTED_STORE_EXCEPTION Mavi Ekran

Hata devam ederse SATA kablosunu değiştirmeyi bir dene.

Hocam bilgisayarı kapattım yaklaşık yarım saat duş alıp geldim açtığımda diskten garip sesler geliyordu. Ve mavi ekran verdi. Bilgisayar reset atınca Windows açılmadı ASUS logosunda bir mavi ekran daha verdi. Ardından bilgisayarın içini açıp tüm kabloları çıkar tak yaptım. Şu an bekliyorum diğerlerinin minudump dosyası oluşmamış. Neden olmuş olabilir?
 
Hocam, uzun süre sonra yeniden Mavi Ekran verdi ama, hiç vermezken verdi.
Oyun Kolu USB ye takılıydı düşecekken tutup refleks ile Bilgisayarın USB takılan, Power düğmesi olan kısmına kol ile vurdum. bir kaç saniye sonra mavi ekran verdi.


Merhabalar, ben aylardır mavi ekran hatası alıyordum, harddiskimin kablolarını söküp tekrar taktım. 1 ay boyunca kesildi fakat şu an tekrar başladı.
Minidump dosyalarını buraya koyuyorum, sizce neden veriyor?

1: PES 2020 Oynarken oyun kolu düşecekken tutup refleks ile Power tuşunun olduğu yere vurdum. Birkaç saniye sonra verdi.
UNEXPECTED_STORE EXPECTİON

2: Twitter'da video izliyordum video bitince verdi.
KERNEL_DATA_İNPAGE_ERROR
@claus
@MayCrasH Hocam, Siz aktif değilsiniz diye yeni konu açtım kusura bakmayın.
 
Bilgizayar masaüstümü laptop mu?
Laptop ise RAM, HDD, veya ısınmadan dolayı.
Masaüstü ise PSU yetmediği içindir.
RAM veya HDD'den dolayı da olabilir.
Eğer masaüstü ise son dönemde bilgisayarda ne değişiklik yaptınız?
Ekran kartı değiştirmek gibi mesela.
 
Memtest86 testi yapar mısın?

 
Memtest86 testi yapar mısın?


Hocam aylardır var bu sorun. Aylar önce yaptım bir sıkıntı çıkmadı. Önceki konularıma bakabilirsiniz.
 
Son düzenleyen: Moderatör:

DDU ile sürücüleri kaldırıp tekrar yükledin mi?
 

DDU ile sürücüleri kaldırıp tekrar yükledin mi?
Evet hocam.
 
Bilgisayarının özelliklerini yaz, RAM de dahil.

Yeni bir RAM testi yap:


Kod:
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffffdfd7c6c80158, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc00000c0, error status (normally i/o status code)
Arg3: 00000001941de880, current process (virtual address for lock type 3, or PTE)
Arg4: ffffaf8d9002bee0, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffffdfd7c6c80158

BUGCHECK_P2: ffffffffc00000c0

BUGCHECK_P3: 1941de880

BUGCHECK_P4: ffffaf8d9002bee0

ERROR_CODE: (NTSTATUS) 0xc00000c0 - Bu ayg t, yok.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXDISK: 1

DISKSEC_ORG_ID:

DISKSEC_MODEL:  -0E21P20                      CC

DISKSEC_MANUFACTURING_ID:  34                            

DISKSEC_ISSUE_DESC_STR:                                        

DISKSEC_TOTAL_SIZE: 0

DISKSEC_REASON: 0

DISKSEC_PUBLIC_TOTAL_SECTION_SIZE: 0

DISKSEC_PUBLIC_OFFSET: 0

DISKSEC_PUBLIC_DATA_SIZE: 0

DISKSEC_PRIVATE_TOTAL_SECTION_SIZE: 0

DISKSEC_PRIVATE_OFFSET: 0

DISKSEC_PRIVATE_DATA_SIZE: 0

BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffb609ad8ac3b0 -- (.trap 0xffffb609ad8ac3b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff850667470248 rbx=0000000000000000 rcx=ffffaf8d90000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80166e917bf rsp=ffffb609ad8ac540 rbp=000000000015f734
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffff850667470010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiCommitPageTablesForVad+0x15f:
fffff801`66e917bf 480fa319        bt      qword ptr [rcx],rbx ds:ffffaf8d`90000000=????????????????
Resetting default scope

STACK_TEXT:
ffffb609`ad8abff8 fffff801`66a5d1aa : 00000000`0000007a ffffdfd7`c6c80158 ffffffff`c00000c0 00000001`941de880 : nt!KeBugCheckEx
ffffb609`ad8ac000 fffff801`6690516d : 00000000`00000002 ffffb609`00000000 ffffb609`ad8ac1b8 fffff801`00000000 : nt!MiWaitForInPageComplete+0x15870a
ffffb609`ad8ac110 fffff801`668c926b : 00000000`c0033333 00000000`00000000 ffffaf8d`9002bee0 ffffaf8d`9002bee0 : nt!MiIssueHardFault+0x1ad
ffffb609`ad8ac210 fffff801`669d041e : 00000000`00000002 ffffdfef`ebe36420 00000000`00000000 ffff8506`68e5b8f0 : nt!MmAccessFault+0x40b
ffffb609`ad8ac3b0 fffff801`66e917bf : ffffb609`00000000 00000000`00000000 ffff8506`6748c060 00000000`00000001 : nt!KiPageFault+0x35e
ffffb609`ad8ac540 fffff801`668eb2a8 : ffff8506`6d6257a0 ffff8506`708dc3f8 ffffdf81`00000001 00000000`00000000 : nt!MiCommitPageTablesForVad+0x15f
ffffb609`ad8ac5e0 fffff801`66e90dd6 : ffff8506`6d6257a0 000002be`e68ae000 ffffb609`ad8ac860 00000000`00000004 : nt!MiCommitExistingVad+0x288
ffffb609`ad8ac760 fffff801`66e74a06 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAllocateVirtualMemory+0x286
ffffb609`ad8ac8f0 fffff801`669d3c18 : ffffffff`ffffffff ffff8506`71446040 00000000`00000000 000000cd`601fdac8 : nt!NtAllocateVirtualMemory+0x196
ffffb609`ad8aca90 00007ff9`a179c374 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cd`601fdaa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a179c374


SYMBOL_NAME:  nt!MiWaitForInPageComplete+15870a

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.815

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  15870a

FAILURE_BUCKET_ID:  0x7a_c00000c0_nt!MiWaitForInPageComplete

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7d19656d-a91b-a228-4ebb-5edd525642eb}

Followup:     MachineOwner
---------

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffa009d6bb3000, Pointer to the store context or data manager
Arg2: ffff820a653c5650, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 4

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  154

BUGCHECK_P1: ffffa009d6bb3000

BUGCHECK_P2: ffff820a653c5650

BUGCHECK_P3: 2

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffff820a653c65f8 -- (.exr 0xffff820a653c65f8)
ExceptionAddress: fffff8072255e310 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
   ExceptionCode: c0000006 (In-page I/O error)
  ExceptionFlags: 00000000
NumberParameters: 3
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000012b15b53a50
   Parameter[2]: 00000000c00000c0
Inpage operation failed at 0000012b15b53a50, due to I/O error 00000000c00000c0

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000012b15b53a50

CONTEXT:  ffff820a653c5e40 -- (.cxr 0xffff820a653c5e40)
rax=fffff8072255e2c0 rbx=0000000000000000 rcx=ffffe701797be000
rdx=ffffe701797be000 rsi=0000000000000002 rdi=0000012b15b53a50
rip=fffff8072255e310 rsp=ffff820a653c6838 rbp=ffffe701797be000
r8=0000012b15b53a50  r9=000000000000032f r10=ffffe701797beea0
r11=0000012b15b53d7f r12=ffff820a653c6ac8 r13=ffffa009d6d57000
r14=0000012b15b53d29 r15=ffffe701797bf000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlDecompressBufferXpressLz+0x50:
fffff807`2255e310 418b08          mov     ecx,dword ptr [r8] ds:002b:0000012b`15b53a50=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/  hata durumu y z nden belle e yerle tirilmedi.

EXCEPTION_CODE_STR:  c0000006

EXCEPTION_PARAMETER3:  00000000c00000c0

EXCEPTION_STR:  0xc0000006

STACK_TEXT:
ffff820a`653c6838 fffff807`224527b0 : ffffe701`797be000 ffffe701`797be000 00000000`00000002 0000012b`15b53a50 : nt!RtlDecompressBufferXpressLz+0x50
ffff820a`653c6850 fffff807`22560099 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa009`d6bb4788 : nt!RtlDecompressBufferEx+0x60
ffff820a`653c68a0 fffff807`2255ff24 : 00000000`00000004 ffff820a`653c6ab0 00000000`00000000 00000000`00002c92 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x155
ffff820a`653c6980 fffff807`2255fda2 : 00000000`00000001 00000000`00013a50 ffffa009`00013a50 ffffa009`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
ffff820a`653c69d0 fffff807`2255fbcb : 00000000`ffffffff ffffa009`d6d57000 ffff820a`653c6ab0 ffffa009`de564590 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
ffff820a`653c6a70 fffff807`2255fa11 : ffffa009`d6d57000 fffff807`00000000 00000000`00000000 ffffa009`d6bb4788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
ffff820a`653c6b20 fffff807`22450420 : ffffa009`d6bb3000 ffffa009`de564590 ffffa009`d6d57000 ffffa009`d6bb49b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff820a`653c6ba0 fffff807`2246bcd5 : ffffa009`d6d4b080 00000000`00000080 fffff807`224502d0 ffff820a`651a3278 : nt!SMKM_STORE<SM_TRAITS>::SmStReadThread+0x150
ffff820a`653c6c10 fffff807`225c9998 : ffffe701`79600180 ffffa009`d6d4b080 fffff807`2246bc80 00a66000`003a5400 : nt!PspSystemThreadStartup+0x55
ffff820a`653c6c60 00000000`00000000 : ffff820a`653c7000 ffff820a`653c1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!RtlDecompressBufferXpressLz+50

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffff820a653c5e40 ; kb

BUCKET_ID_FUNC_OFFSET:  50

FAILURE_BUCKET_ID:  0x154_c0000006_c00000c0_nt!RtlDecompressBufferXpressLz

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4f688397-d249-e636-ec74-114488b98434}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff8032d9d7f42, Address of the instruction which caused the bugcheck
Arg3: ffff8584268834f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 23

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff8032d9d7f42

BUGCHECK_P3: ffff8584268834f0

BUGCHECK_P4: 0

CONTEXT:  ffff8584268834f0 -- (.cxr 0xffff8584268834f0)
rax=0000000000000000 rbx=ffff858426883f40 rcx=0000000000000007
rdx=0000000001746d18 rsi=000000000000035e rdi=ffffa20826083000
rip=fffff8032d9d7f42 rsp=ffff858426883ee8 rbp=ffffa20826083000
r8=000000000000001c  r9=ffffc38e0787e080 r10=0000021236e57d18
r11=0000000000000d18 r12=00000000ce4cf905 r13=ffff8584268841a0
r14=000000000000035e r15=0000021239cba024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff803`2d9d7f42 418b02          mov     eax,dword ptr [r10] ds:002b:00000212`36e57d18=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT:
ffff8584`26883ee8 fffff803`2dacb09f : 00000000`7f147a21 ffff8584`26884270 00000000`00000000 ffff8584`26884009 : nt!HvpGetCellPaged+0xa2
ffff8584`26883ef0 fffff803`2dac9999 : 00000001`ffffffff 00000000`ce4cf905 ffffa208`00000001 ffffa208`45951740 : nt!CmpDoCompareKeyName+0x2f
ffff8584`26883f40 fffff803`2dabb8ca : ffffa208`45951740 00000000`00000006 ffff8584`26884138 ffff8584`268841c0 : nt!CmpWalkOneLevel+0x709
ffff8584`26884050 fffff803`2dab8934 : ffff8584`0000001c ffff8584`268843a0 ffff8584`26884368 00000000`00000000 : nt!CmpDoParseKey+0x9fa
ffff8584`268842f0 fffff803`2dab681f : ffffc38e`0b6dc550 ffffa208`4c60e601 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x274
ffff8584`26884510 fffff803`2dab4c81 : ffffc38e`0b6dc500 ffff8584`26884758 00000000`00000040 ffffc38d`fe6f4900 : nt!ObpLookupObjectName+0x78f
ffff8584`268846d0 fffff803`2dabe19c : 00000000`00000001 00000000`00000000 00000000`00000000 ffffc38d`fe6f4900 : nt!ObOpenObjectByNameEx+0x201
ffff8584`26884810 fffff803`2dabe01d : 0000001e`babfe970 ffff8584`26884b80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffff8584`26884860 fffff803`2dac003f : 00007ffe`b4000000 00000000`00000000 0000001e`babfec60 00000000`02000000 : nt!CmOpenKey+0x29d
ffff8584`26884ac0 fffff803`2d5d3c18 : 000001c5`7b2a83e8 ffff8584`26884b80 00000000`00000000 000001c5`7b8de480 : nt!NtOpenKeyEx+0xf
ffff8584`26884b00 00007ffe`b629e414 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001e`babfe898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`b629e414


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.752

STACK_COMMAND:  .cxr 0xffff8584268834f0 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff8507e5fe3100, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 7

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff8507e5fe3100

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

CRITICAL_PROCESS:  services.exe

EXCEPTION_RECORD:  ffff8507e5fe36c0 -- (.exr 0xffff8507e5fe36c0)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0xe81f6080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT:
fffff204`6db24d98 fffff805`486cb8a9 : 00000000`000000ef ffff8507`e5fe3100 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff204`6db24da0 fffff805`485ecbdf : ffff8507`e5fe3100 fffff805`47e88065 ffff8507`e5fe3100 fffff805`47e880e0 : nt!PspCatchCriticalBreak+0x115
fffff204`6db24e40 fffff805`484700c0 : ffff8507`00000000 00000000`00000000 ffff8507`e5fe3100 ffff8507`e5fe3100 : nt!PspTerminateAllThreads+0x17b193
fffff204`6db24eb0 fffff805`4846fce9 : ffffffff`ffffffff fffff204`6db24fe0 ffff8507`e5fe3100 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff204`6db24ef0 fffff805`47fd3c18 : 00007ff7`000002d8 ffff8507`e81f6080 ffff8507`e5fe3100 fffff204`6db25130 : nt!NtTerminateProcess+0xa9
fffff204`6db24f60 fffff805`47fc6180 : fffff805`4805ade8 fffff204`6db25a58 fffff204`6db25a58 fffff204`6db25130 : nt!KiSystemServiceCopyEnd+0x28
fffff204`6db250f8 fffff805`4805ade8 : fffff204`6db25a58 fffff204`6db25a58 fffff204`6db25130 00007ff7`31d69000 : nt!KiServiceLinkage
fffff204`6db25100 fffff805`47fd431d : ffff8507`e5fe36c0 fffff805`47edcf9d 00000000`00003200 fffff204`6db25b00 : nt!KiDispatchException+0x15c6f8
fffff204`6db25920 fffff805`47fd0503 : 00000000`0001e392 fffff204`6db25b80 00000000`00000000 ffff8507`e7826b60 : nt!KiExceptionDispatch+0x11d
fffff204`6db25b00 00007ffa`3c8be392 : 00000000`00000000 00000004`00000000 00007ffa`3c93fe8e 00000004`6cd01770 : nt!KiPageFault+0x443
00000004`6cd016e0 00000000`00000000 : 00000004`00000000 00007ffa`3c93fe8e 00000004`6cd01770 00007ff7`31d69000 : 0x00007ffa`3c8be392


SYMBOL_NAME:  nt!PspCatchCriticalBreak+115

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.752

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  115

FAILURE_BUCKET_ID:  0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_e81f6080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fbf08019-354a-04ac-a039-d42dd28a4f2e}

Followup:     MachineOwner
---------
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff870340996000, Pointer to the store context or data manager
Arg2: ffffe70d18434c10, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 4

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  154

BUGCHECK_P1: ffff870340996000

BUGCHECK_P2: ffffe70d18434c10

BUGCHECK_P3: 2

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffe70d18435bb8 -- (.exr 0xffffe70d18435bb8)
ExceptionAddress: fffff8066b15e2e0 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
   ExceptionCode: c0000006 (In-page I/O error)
  ExceptionFlags: 00000000
NumberParameters: 3
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000016b8c46ef50
   Parameter[2]: 00000000c000000e
Inpage operation failed at 0000016b8c46ef50, due to I/O error 00000000c000000e

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000016b8c46ef50

CONTEXT:  ffffe70d18435400 -- (.cxr 0xffffe70d18435400)
rax=fffff8066b15e290 rbx=0000000000000000 rcx=ffffd60059078000
rdx=ffffd60059078000 rsi=0000000000000002 rdi=0000016b8c46ef50
rip=fffff8066b15e2e0 rsp=ffffe70d18435df8 rbp=ffffd60059078000
r8=0000016b8c46ef50  r9=0000000000000c36 r10=ffffd60059078ea0
r11=0000016b8c46fb86 r12=ffffe70d18436088 r13=ffff870341b6c000
r14=0000016b8c46fb30 r15=ffffd60059079000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlDecompressBufferXpressLz+0x50:
fffff806`6b15e2e0 418b08          mov     ecx,dword ptr [r8] ds:002b:0000016b`8c46ef50=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/  hata durumu y z nden belle e yerle tirilmedi.

EXCEPTION_CODE_STR:  c0000006

EXCEPTION_PARAMETER3:  00000000c000000e

EXCEPTION_STR:  0xc0000006

TRAP_FRAME:  ffffe70d18436710 -- (.trap 0xffffe70d18436710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000760024 rbx=0000000000000000 rcx=ffff870338db2c50
rdx=ffff87033c127ab0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066f0bd154 rsp=ffffe70d184368a8 rbp=ffffe70d18436a08
r8=0000000000000000  r9=ffff870338db2b00 r10=0000fffff8066f0b
r11=ffffc5fa7aa00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
volmgr!VmpReferenceDependantVolume:
fffff806`6f0bd154 0000            add     byte ptr [rax],al ds:00000000`00760024=??
Resetting default scope

STACK_TEXT:
ffffe70d`18435df8 fffff806`6b0527b0 : ffffd600`59078000 ffffd600`59078000 00000000`00000002 0000016b`8c46ef50 : nt!RtlDecompressBufferXpressLz+0x50
ffffe70d`18435e10 fffff806`6b160069 : 00000000`00000000 000000e8`00000001 00000000`00000000 ffff8703`40997788 : nt!RtlDecompressBufferEx+0x60
ffffe70d`18435e60 fffff806`6b15fef4 : 00000000`00000004 ffffe70d`18436070 00000000`00000000 00000000`000007d5 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x155
ffffe70d`18435f40 fffff806`6b15fd72 : 00000000`00000001 00000000`0000ef50 ffff8703`0000ef50 ffff8703`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
ffffe70d`18435f90 fffff806`6b15fb9b : ffff8703`ffffffff ffff8703`41b6c000 ffffe70d`18436070 ffff8703`45696450 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
ffffe70d`18436030 fffff806`6b15f9e1 : ffff8703`41b6c000 00000000`00000000 00000000`00000001 ffff8703`40997788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
ffffe70d`184360e0 fffff806`6b15f8f1 : ffff8703`40996000 ffff8703`45696450 ffff8703`41b6c000 ffff8703`409979b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffe70d`18436160 fffff806`6b0c00e8 : ffff8703`4e0cc040 ffff8703`40996000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffe70d`18436190 fffff806`6b163281 : fffff806`6b15f8d0 ffffe70d`18436240 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffe70d`18436200 fffff806`6b14c6d1 : ffffe70d`18436300 fffff806`6b58db78 ffff8703`40996000 ffffe70d`18436450 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xcd
ffffe70d`184362d0 fffff806`6b14c2b7 : 00000000`0000000c ffff8703`40996000 ffffe70d`18436380 ffff8703`45696450 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a5
ffffe70d`18436320 fffff806`6b162163 : 00000000`0000000c ffff8703`45696450 00000000`00000001 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffe70d`184363b0 fffff806`6b163c6f : ffff8703`00000001 ffff8703`41837f40 00000000`00000000 ffff8703`40996000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffe70d`18436420 fffff806`6b10491f : fffff806`6b468b80 00000000`00000001 fffff806`6b468c40 fffff806`6b0cb1b6 : nt!SmPageRead+0x33
ffffe70d`18436470 fffff806`6b105449 : 00000000`00000002 ffffe70d`18436500 ffffe70d`18436668 ffffa9d4`fe019bc0 : nt!MiIssueHardFaultIo+0x117
ffffe70d`184364c0 fffff806`6b0c926b : 00000000`c0033333 00000000`00000000 fffff806`6f0bd154 fffff806`6f0bd154 : nt!MiIssueHardFault+0x489
ffffe70d`18436570 fffff806`6b1d041e : 00000000`000000ff 00000000`00000006 ffff8703`3c32ea90 00000000`00000040 : nt!MmAccessFault+0x40b
ffffe70d`18436710 fffff806`6f0bd154 : fffff806`6f0b2271 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffe70d`184368a8 fffff806`6f0b2271 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : volmgr!VmpReferenceDependantVolume
ffffe70d`184368b0 fffff806`6b10a929 : ffff8703`3c127ab0 00000000`000000c0 ffff8703`4e0cc040 00000000`00000001 : volmgr!VmInternalDeviceControl+0xe1
ffffe70d`184368e0 fffff806`6b06316e : 00000000`000000e0 fffff806`6b124f1e 00000000`00000001 00000000`00000000 : nt!IofCallDriver+0x59
ffffe70d`18436920 fffff806`6b613241 : 00000000`00000000 ffff8703`3c2b7ad8 00000000`00000000 ffff8703`3c32ea90 : nt!IoSynchronousCallDriver+0x4e
ffffe70d`18436980 fffff806`6efc4d49 : 00000000`00000030 00000000`00000030 ffffe70d`18436a08 ffffe70d`18436a90 : nt!IoForwardIrpSynchronously+0x41
ffffe70d`184369b0 fffff806`6efc25cc : ffff8703`00000000 ffff8703`3c32eac8 00000000`00000000 ffffc187`2b97b110 : partmgr!PmQueryDepends+0x135
ffffe70d`18436a50 fffff806`6b102aff : 00000000`00000000 ffff8703`3c2fcc60 ffff8703`41eb9040 fffff806`6efc1fd0 : partmgr!PmNotificationWorkItem+0x5fc
ffffe70d`18436b00 fffff806`6b0f43b5 : ffff8703`38480a20 ffff8703`4e0cc040 fffff806`6b102a00 00000000`00000003 : nt!IopProcessWorkItem+0xff
ffffe70d`18436b70 fffff806`6b06bcd5 : ffff8703`4e0cc040 00000000`00000080 ffff8703`3848a040 ffff862b`00000001 : nt!ExpWorkerThread+0x105
ffffe70d`18436c10 fffff806`6b1c9968 : fffff806`68919180 ffff8703`4e0cc040 fffff806`6b06bc80 ffff862b`4460e8a0 : nt!PspSystemThreadStartup+0x55
ffffe70d`18436c60 00000000`00000000 : ffffe70d`18437000 ffffe70d`18431000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !volmgr
    fffff8066f0bd000-fffff8066f0bd003  4 bytes - volmgr!VmpDeleteLegacyNameLinks+10
    [ 48 81 ec f0:00 00 00 00 ]
    fffff8066f0bd007-fffff8066f0bd01b  21 bytes - volmgr!VmpDeleteLegacyNameLinks+17 (+0x07)
    [ 48 8b 05 92 b0 ff ff 48:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd01f-fffff8066f0bd02a  12 bytes - volmgr!VmpDeleteLegacyNameLinks+2f (+0x18)
    [ 48 89 45 97 48 89 45 9f:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd02d-fffff8066f0bd030  4 bytes - volmgr!VmpDeleteLegacyNameLinks+3d (+0x0e)
    [ 0f 85 a3 2b:00 00 00 00 ]
    fffff8066f0bd033-fffff8066f0bd035  3 bytes - volmgr!VmpDeleteLegacyNameLinks+43 (+0x06)
    [ 38 81 af:00 00 00 ]
    fffff8066f0bd039-fffff8066f0bd03c  4 bytes - volmgr!VmpDeleteLegacyNameLinks+49 (+0x06)
    [ 0f 85 c5 2b:00 00 00 00 ]
    fffff8066f0bd03f-fffff8066f0bd042  4 bytes - volmgr!VmpDeleteLegacyNameLinks+4f (+0x06)
    [ 8b 83 94 01:00 00 00 00 ]
    fffff8066f0bd045-fffff8066f0bd050  12 bytes - volmgr!VmpDeleteLegacyNameLinks+55 (+0x06)
    [ 4c 8d 05 d4 80 ff ff 44:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd053-fffff8066f0bd06a  24 bytes - volmgr!VmpDeleteLegacyNameLinks+63 (+0x0e)
    [ 48 8d 4d a7 48 8b d7 89:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd077-fffff8066f0bd07a  4 bytes - volmgr!VmpDeleteLegacyNameLinks+87 (+0x24)
    [ 48 8d 4d 97:00 00 00 00 ]
    fffff8066f0bd087-fffff8066f0bd08a  4 bytes - volmgr!VmpDeleteLegacyNameLinks+97 (+0x10)
    [ 8b 83 94 01:00 00 00 00 ]
    fffff8066f0bd08d-fffff8066f0bd098  12 bytes - volmgr!VmpDeleteLegacyNameLinks+9d (+0x06)
    [ 4c 8d 05 d4 80 ff ff 44:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd09b-fffff8066f0bd0b2  24 bytes - volmgr!VmpDeleteLegacyNameLinks+ab (+0x0e)
    [ 48 8d 4d a7 48 8b d7 89:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd0bf-fffff8066f0bd0c2  4 bytes - volmgr!VmpDeleteLegacyNameLinks+cf (+0x24)
    [ 48 8d 4d 97:00 00 00 00 ]
    fffff8066f0bd0cf-fffff8066f0bd0d4  6 bytes - volmgr!VmpDeleteLegacyNameLinks+df (+0x10)
    [ 48 8b 0b f7 41 30:00 00 00 00 00 00 ]
    fffff8066f0bd0d6 - volmgr!VmpDeleteLegacyNameLinks+e6 (+0x07)
    [ 01:00 ]
    fffff8066f0bd0d9-fffff8066f0bd0dc  4 bytes - volmgr!VmpDeleteLegacyNameLinks+e9 (+0x03)
    [ 0f 85 bb 2b:00 00 00 00 ]
    fffff8066f0bd0df-fffff8066f0bd0e1  3 bytes - volmgr!VmpDeleteLegacyNameLinks+ef (+0x06)
    [ f7 41 30:00 00 00 ]
    fffff8066f0bd0e4 - volmgr!VmpDeleteLegacyNameLinks+f4 (+0x05)
    [ 20:00 ]
    fffff8066f0bd0e6-fffff8066f0bd0e9  4 bytes - volmgr!VmpDeleteLegacyNameLinks+f6 (+0x02)
    [ 0f 85 04 2c:00 00 00 00 ]
    fffff8066f0bd0ec-fffff8066f0bd0ef  4 bytes - volmgr!VmpDeleteLegacyNameLinks+fc (+0x06)
    [ 44 8b 8b b8:00 00 00 00 ]
    fffff8066f0bd0f3-fffff8066f0bd0ff  13 bytes - volmgr!VmpDeleteLegacyNameLinks+103 (+0x07)
    [ 4c 8d 05 ae 80 ff ff 48:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd156-fffff8066f0bd16b  22 bytes - volmgr!VmpReferenceDependantVolume+2 (+0x63)
    [ 5c 24 08 55 56 57 41 54:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd16f-fffff8066f0bd180  18 bytes - volmgr!VmpReferenceDependantVolume+1b (+0x19)
    [ 33 db 4c 8b e2 4c 8b e9:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd183-fffff8066f0bd18a  8 bytes - volmgr!VmpReferenceDependantVolume+2f (+0x14)
    [ 83 78 08 08 0f 82 87 2c:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd18d-fffff8066f0bd1aa  30 bytes - volmgr!VmpReferenceDependantVolume+39 (+0x0a)
    [ 4c 8b 72 18 49 8b 06 48:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd1ae-fffff8066f0bd1bc  15 bytes - volmgr!VmpReferenceDependantVolume+5a (+0x21)
    [ 8b eb 4c 8b 3e eb 21 49:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd1bf-fffff8066f0bd1c2  4 bytes - volmgr!VmpReferenceDependantVolume+6b (+0x11)
    [ 0f 85 7f 2b:00 00 00 00 ]
    fffff8066f0bd1c5-fffff8066f0bd1ce  10 bytes - volmgr!VmpReferenceDependantVolume+71 (+0x06)
    [ 48 8b 44 24 70 48 39 87:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd1d1-fffff8066f0bd1df  15 bytes - volmgr!VmpReferenceDependantVolume+7d (+0x0c)
    [ 74 0a 4d 8b 3f 4c 3b fe:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd1e3-fffff8066f0bd1ea  8 bytes - volmgr!VmpReferenceDependantVolume+8f (+0x12)
    [ 74 02 ff c5 8b d5 b9 01:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd1ee-fffff8066f0bd1f8  11 bytes - volmgr!VmpReferenceDependantVolume+9a (+0x0b)
    [ 41 b8 56 4d 20 20 48 8d:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd208-fffff8066f0bd215  14 bytes - volmgr!VmpReferenceDependantVolume+b4 (+0x1a)
    [ 49 89 06 48 85 c0 74 5b:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd219-fffff8066f0bd21f  7 bytes - volmgr!VmpReferenceDependantVolume+c5 (+0x11)
    [ 4c 3b fe 0f 84 6b 2b:00 00 00 00 00 00 00 ]
    fffff8066f0bd222-fffff8066f0bd227  6 bytes - volmgr!VmpReferenceDependantVolume+ce (+0x09)
    [ 49 8b 06 38 9f b0:00 00 00 00 00 00 ]
    fffff8066f0bd22b-fffff8066f0bd22d  3 bytes - volmgr!VmpReferenceDependantVolume+d7 (+0x09)
    [ 74 45 c7:00 00 00 ]
    fffff8066f0bd22f - volmgr!VmpReferenceDependantVolume+db (+0x04)
    [ 01:00 ]
    fffff8066f0bd233-fffff8066f0bd23f  13 bytes - volmgr!VmpReferenceDependantVolume+df (+0x04)
    [ 49 8b 16 48 8b 07 48 89:00 00 00 00 00 00 00 00 ]
    fffff8066f0bd24c-fffff8066f0bd253  8 bytes - volmgr!VmpReferenceDependantVolume+f8 (+0x19)
    [ 49 8b cd e8 a4 57 ff ff:00 00 00 00 00 00 00 00 ]
365 errors : !volmgr (fffff8066f0bd000-fffff8066f0bd253)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffe70d18435400 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffe0891f02d3c0, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 15

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffe0891f02d3c0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  services.exe

CRITICAL_PROCESS:  services.exe

EXCEPTION_RECORD:  ffffe0891f02d980 -- (.exr 0xffffe0891f02d980)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x20a450c0 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT:
ffffb403`c1c52d98 fffff804`80ac9b99 : 00000000`000000ef ffffe089`1f02d3c0 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffb403`c1c52da0 fffff804`809c4b37 : ffffe089`1f02d3c0 fffff804`8029c209 ffffe089`1f02d3c0 fffff804`8029c360 : nt!PspCatchCriticalBreak+0x115
ffffb403`c1c52e40 fffff804`80836e40 : ffffe089`00000000 00000000`00000000 ffffe089`1f02d3c0 ffffe089`1f02d3c0 : nt!PspTerminateAllThreads+0x176353
ffffb403`c1c52eb0 fffff804`80836c29 : ffffffff`ffffffff ffffb403`c1c52fe0 ffffe089`1f02d3c0 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffb403`c1c52ef0 fffff804`803d1518 : 00007ffb`0000031c ffffe089`20a450c0 ffffe089`1f02d3c0 ffffb403`c1c53130 : nt!NtTerminateProcess+0xa9
ffffb403`c1c52f60 fffff804`803c3b00 : fffff804`8042f140 ffffb403`c1c53a58 ffffb403`c1c53a58 ffffb403`c1c53130 : nt!KiSystemServiceCopyEnd+0x28
ffffb403`c1c530f8 fffff804`8042f140 : ffffb403`c1c53a58 ffffb403`c1c53a58 ffffb403`c1c53130 00007ffb`c18c2780 : nt!KiServiceLinkage
ffffb403`c1c53100 fffff804`803d1c1d : ffffe089`1f02d980 fffff804`8028678d 00000000`00008000 ffffb403`c1c53b00 : nt!KiDispatchException+0x167f20
ffffb403`c1c53920 fffff804`803cde05 : 000000a5`1830a530 ffffb403`c1c53b80 00000000`00000000 ffffe089`00000000 : nt!KiExceptionDispatch+0x11d
ffffb403`c1c53b00 00007ffb`c2b7cd05 : 000000a5`18301c48 000000a5`18301cd0 00007ffb`c2cd277c 00000000`00000000 : nt!KiPageFault+0x445
000000a5`18301660 000000a5`18301c48 : 000000a5`18301cd0 00007ffb`c2cd277c 00000000`00000000 000000a5`183022f0 : 0x00007ffb`c2b7cd05
000000a5`18301668 000000a5`18301cd0 : 00007ffb`c2cd277c 00000000`00000000 000000a5`183022f0 000000a5`18301c30 : 0x000000a5`18301c48
000000a5`18301670 00007ffb`c2cd277c : 00000000`00000000 000000a5`183022f0 000000a5`18301c30 00007ffb`c18c2780 : 0x000000a5`18301cd0
000000a5`18301678 00000000`00000000 : 000000a5`183022f0 000000a5`18301c30 00007ffb`c18c2780 00007ffb`c2b7e2e9 : 0x00007ffb`c2cd277c


SYMBOL_NAME:  nt!PspCatchCriticalBreak+115

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.295

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  115

FAILURE_BUCKET_ID:  0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_20a450c0_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {44793bf5-d01d-16bf-12f3-524056917061}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı