KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 000000004a07d357, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 000000004a07d357, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4593
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 16184
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 4a07d357
BUGCHECK_P3: 8
BUGCHECK_P4: 4a07d357
WRITE_ADDRESS: fffff8035e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8035e40f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8035e40f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 000000004a07d357
EXCEPTION_PARAMETER1:  0000000000000008
EXCEPTION_PARAMETER2:  000000004a07d357
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT: 
fffff48e`2ba21d08 fffff803`5dc4e5b9     : 00000000`0000001e ffffffff`c0000005 00000000`4a07d357 00000000`00000008 : nt!KeBugCheckEx
fffff48e`2ba21d10 fffff803`5dc05fac     : 00000000`00001000 fffff48e`2ba225b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caa59
fffff48e`2ba223d0 fffff803`5dc02143     : 00000000`000081a1 fffff48e`2ba22850 ffffffff`ffffffff ffffffff`0015b0bc : nt!KiExceptionDispatch+0x12c
fffff48e`2ba225b0 00000000`4a07d357     : ffff847c`cb600000 00000000`00000000 fffff48e`2ba229b0 00000000`00000000 : nt!KiPageFault+0x443
fffff48e`2ba22740 ffff847c`cb600000     : 00000000`00000000 fffff48e`2ba229b0 00000000`00000000 00000000`000000ff : 0x4a07d357
fffff48e`2ba22748 00000000`00000000     : fffff48e`2ba229b0 00000000`00000000 00000000`000000ff 00000000`00040282 : 0xffff847c`cb600000
SYMBOL_NAME:  nt!KiDispatchException+1caa59
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.508
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  1caa59
FAILURE_BUCKET_ID:  0x1E_c0000005_X_nt!KiDispatchException
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {72b01280-60ea-6404-b5e3-077cb4799617}
Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803e2510008, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff805227b2234, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4874
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 21670
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  50
BUGCHECK_P1: fffff803e2510008
BUGCHECK_P2: 0
BUGCHECK_P3: fffff805227b2234
BUGCHECK_P4: 2
READ_ADDRESS: fffff8051dafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8051da0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8051da0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff803e2510008
MM_INTERNAL_CODE:  2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
TRAP_FRAME:  fffffb005ac4c600 -- (.trap 0xfffffb005ac4c600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000a78b rbx=0000000000000000 rcx=000000000003a78b
rdx=fffff803e2510000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805227b2234 rsp=fffffb005ac4c790 rbp=fffff805227b21fc
 r8=0000000000000f2e  r9=00000001400025ba r10=fffffb005ac4c9a0
r11=00000000fff2513a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
BEDaisy+0x2a2234:
fffff805`227b2234 f6ff            idiv    bh
Resetting default scope
MISALIGNED_IP:
BEDaisy+2a2234
fffff805`227b2234 f6ff            idiv    bh
STACK_TEXT: 
fffffb00`5ac4c358 fffff805`1d286729     : 00000000`00000050 fffff803`e2510008 00000000`00000000 fffffb00`5ac4c600 : nt!KeBugCheckEx
fffffb00`5ac4c360 fffff805`1d0eeb80     : c0011020`063000a6 00000000`00000000 fffffb00`5ac4c680 00000000`00000000 : nt!MiSystemFault+0x13faf9
fffffb00`5ac4c460 fffff805`1d20205e     : 00000000`00000000 00000000`00000000 fffff803`e2510000 fffff805`1d1fa8f5 : nt!MmAccessFault+0x400
fffffb00`5ac4c600 fffff805`227b2234     : 00000000`00000009 ffffa888`44fcb080 00000000`00000804 fffffb00`5ac4cae0 : nt!KiPageFault+0x35e
fffffb00`5ac4c790 00000000`00000009     : ffffa888`44fcb080 00000000`00000804 fffffb00`5ac4cae0 00000000`00000001 : BEDaisy+0x2a2234
fffffb00`5ac4c798 ffffa888`44fcb080     : 00000000`00000804 fffffb00`5ac4cae0 00000000`00000001 ffff867a`e6800000 : 0x9
fffffb00`5ac4c7a0 00000000`00000804     : fffffb00`5ac4cae0 00000000`00000001 ffff867a`e6800000 00000000`00000002 : 0xffffa888`44fcb080
fffffb00`5ac4c7a8 fffffb00`5ac4cae0     : 00000000`00000001 ffff867a`e6800000 00000000`00000002 00000000`00000005 : 0x804
fffffb00`5ac4c7b0 00000000`00000001     : ffff867a`e6800000 00000000`00000002 00000000`00000005 00000000`00040246 : 0xfffffb00`5ac4cae0
fffffb00`5ac4c7b8 ffff867a`e6800000     : 00000000`00000002 00000000`00000005 00000000`00040246 00000000`00000000 : 0x1
fffffb00`5ac4c7c0 00000000`00000002     : 00000000`00000005 00000000`00040246 00000000`00000000 ffffa888`44fcb4d8 : 0xffff867a`e6800000
fffffb00`5ac4c7c8 00000000`00000005     : 00000000`00040246 00000000`00000000 ffffa888`44fcb4d8 fffff803`e2510000 : 0x2
fffffb00`5ac4c7d0 00000000`00040246     : 00000000`00000000 ffffa888`44fcb4d8 fffff803`e2510000 00000000`00000009 : 0x5
fffffb00`5ac4c7d8 00000000`00000000     : ffffa888`44fcb4d8 fffff803`e2510000 00000000`00000009 00000000`00000000 : 0x40246
SYMBOL_NAME:  BEDaisy+2a2234
IMAGE_NAME:  hardware
STACK_COMMAND:  .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID:  IP_MISALIGNED_BEDaisy.sys
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {0d6989f4-a5e2-2225-1046-259fcb6d205e}
Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
    buffer overrun.
Arg2: ffff81873b7c49d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81873b7c4928, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 6436
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 36332
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  139
BUGCHECK_P1: 2
BUGCHECK_P2: ffff81873b7c49d0
BUGCHECK_P3: ffff81873b7c4928
BUGCHECK_P4: 0
TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
EXCEPTION_RECORD:  ffff81873b7c4928 -- (.exr 0xffff81873b7c4928)
ExceptionAddress: fffff8052dea34c5 (dxgkrnl!_report_gsfailure+0x0000000000000005)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  TslGame.exe
WATSON_BKT_EVENT:  BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR:  c0000409
EXCEPTION_PARAMETER1:  0000000000000002
EXCEPTION_STR:  0xc0000409
STACK_TEXT: 
ffff8187`3b7c46a8 fffff805`29405e69     : 00000000`00000139 00000000`00000002 ffff8187`3b7c49d0 ffff8187`3b7c4928 : nt!KeBugCheckEx
ffff8187`3b7c46b0 fffff805`29406290     : fffff805`293611e0 fffff805`321120cf ffd88b48`00000eec 068b4808`7f8d4dc7 : nt!KiBugCheckDispatch+0x69
ffff8187`3b7c47f0 fffff805`29404623     : 00000000`0000000d 00000000`00000000 7fff9a00`dba46e50 00000000`ffffffff : nt!KiFastFailDispatch+0xd0
ffff8187`3b7c49d0 fffff805`2dea34c5     : fffff805`2dea4736 ffff8187`3b7c5140 fffff805`2928523f fffff805`2df3db38 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`3b7c4b68 fffff805`2dea4736     : ffff8187`3b7c5140 fffff805`2928523f fffff805`2df3db38 ffff8187`00000000 : dxgkrnl!_report_gsfailure+0x5
ffff8187`3b7c4b70 fffff805`2dea46cb     : ffff8187`3b7c4c40 00000000`00000000 ffff8187`3b7c5178 ffff8187`3b7c5150 : dxgkrnl!_GSHandlerCheckCommon+0x5a
ffff8187`3b7c4ba0 fffff805`293fcd62     : fffff805`2dea46b8 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!_GSHandlerCheck+0x13
ffff8187`3b7c4bd0 fffff805`29285027     : ffff8187`3b7c5140 00000000`00000000 ffff8187`3b7c5350 fffff805`2dfc4a16 : nt!RtlpExecuteHandlerForException+0x12
ffff8187`3b7c4c00 fffff805`29283ce6     : ffff8187`3b7c5b18 ffff8187`3b7c5850 ffff8187`3b7c5b18 ffffd809`cefe4010 : nt!RtlDispatchException+0x297
ffff8187`3b7c5320 fffff805`29405fac     : 00000000`00001000 ffff8187`3b7c5bc0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffff8187`3b7c59e0 fffff805`29402143     : fffff805`2def8918 ffffd809`cb565310 00000000`00000002 fffff805`292d5d19 : nt!KiExceptionDispatch+0x12c
ffff8187`3b7c5bc0 fffff805`2dfc4a16     : 00000000`00000000 00000000`00000004 ffff8187`3b7c5eb0 00000000`00000004 : nt!KiPageFault+0x443
ffff8187`3b7c5d50 fffff805`2df6b027     : 00000000`00000000 fffff805`2df7bdc7 ffffd809`d1993a20 ffff9a00`db3a2b30 : dxgkrnl!ADAPTER_RENDER::DdiValidateSubmitCommand+0x3e
ffff8187`3b7c5e00 fffff805`2df6b621     : ffff9a00`db3a2b30 00000000`00000001 00000000`00000001 ffff9a00`db3a2b30 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x5b7
ffff8187`3b7c65c0 fffff805`2df6aa2d     : ffffd809`d2b1d080 00000000`00000000 ffff9a00`dba46de0 00000004`6e2beb20 : dxgkrnl!DxgkSubmitCommandInternal+0x551
ffff8187`3b7c6ac0 fffff805`294058b8     : ffffd809`d2b1d080 00000000`1631c000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommand+0x5d
ffff8187`3b7c6b00 00007ffe`43ef5ae4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000004`6e2bea58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`43ef5ae4
SYMBOL_NAME:  dxgkrnl!_report_gsfailure+5
MODULE_NAME: dxgkrnl
IMAGE_NAME:  dxgkrnl.sys
IMAGE_VERSION:  10.0.19041.508
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  5
FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {1685fa82-f4b9-d129-b6b1-78c3bba339a9}
Followup:     MachineOwner
---------
CACHE_MANAGER (34)
    See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000051384
Arg2: ffffb40dbcde6e88
Arg3: ffffb40dbcde66c0
Arg4: fffff806705c7798
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
    Key  : AV.Dereference
    Value: NullPtr
    Key  : AV.Fault
    Value: Read
    Key  : Analysis.CPU.mSec
    Value: 6202
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 8900
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: vb_release
    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    Key  : WER.OS.Version
    Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE:  34
BUGCHECK_P1: 51384
BUGCHECK_P2: ffffb40dbcde6e88
BUGCHECK_P3: ffffb40dbcde66c0
BUGCHECK_P4: fffff806705c7798
EXCEPTION_RECORD:  ffffb40dbcde6e88 -- (.exr 0xffffb40dbcde6e88)
ExceptionAddress: fffff806705c7798 (Ntfs+0x0000000000007798)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT:  ffffb40dbcde66c0 -- (.cxr 0xffffb40dbcde66c0)
rax=0000000000000001 rbx=ffffdd8e3ccbba08 rcx=0000000000000000
rdx=0000000000000000 rsi=ffff8980c3e56170 rdi=ffffdd8e3cdd3d08
rip=fffff806705c7798 rsp=ffffb40dbcde70c0 rbp=ffffb40dbcde7100
 r8=0000000000010000  r9=0000000000000000 r10=fffff8066c456180
r11=ffffb40dbcde70a0 r12=0000000000010000 r13=ffffdd8e3cf48a20
r14=0000000000000000 r15=0000000000070000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
Ntfs+0x7798:
fffff806`705c7798 33d2            xor     edx,edx
Resetting default scope
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
READ_ADDRESS: fffff8066cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8066ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.
EXCEPTION_CODE_STR:  c0000005
EXCEPTION_PARAMETER1:  0000000000000000
EXCEPTION_PARAMETER2:  0000000000000000
EXCEPTION_STR:  0xc0000005
STACK_TEXT: 
ffffb40d`bcde70c0 fffff806`705c502c     : ffffdd8e`3cdd3dd0 ffffb40d`bcde74f0 ffffdd8e`36349184 00000000`00000000 : Ntfs+0x7798
ffffb40d`bcde72c0 fffff806`705c40cc     : ffffdd8e`3cdd3d08 ffffdd8e`3cf48a20 ffffdd8e`00000000 ffffdd8e`00010000 : Ntfs+0x502c
ffffb40d`bcde74c0 fffff806`6c4d1f35     : ffffdd8e`3cdd0460 ffffdd8e`3cf48a20 ffffdd8e`3cf48a20 ffffdd8e`36342d20 : Ntfs+0x40cc
ffffb40d`bcde7590 fffff806`6a466ccf     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffb40d`bcde75d0 fffff806`6a4648d3     : ffffb40d`bcde7660 ffffdd8e`36342d20 00000000`00000006 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffb40d`bcde7640 fffff806`6c4d1f35     : ffffdd8e`3cf48a20 fffff806`6c539895 ffffdd8e`3cf715f0 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffb40d`bcde76a0 fffff806`6c539b57     : 00000000`00000000 ffffdd8e`3cf48a20 ffffdd8e`3c1270b0 ffffdd8e`3cf715f0 : nt!IofCallDriver+0x55
ffffb40d`bcde76e0 fffff806`6c4add88     : ffffdd8e`3c127060 fffff806`6c50fefa ffffdd8e`3c1270c0 ffffdd8e`3c127080 : nt!IoPageReadEx+0x1d7
ffffb40d`bcde7750 fffff806`6c8982ad     : ffffdd8e`3c127060 ffffdd8e`36efa040 ffffdd8e`3c127170 ffffdd8e`30e66840 : nt!MiPageRead+0x28
ffffb40d`bcde77a0 fffff806`6c897b21     : ffffb40d`bcde7910 00000000`00000001 ffffdd8e`36efa040 00000000`00000000 : nt!MiPfExecuteReadList+0xf9
ffffb40d`bcde7810 fffff806`6c4aa430     : 00000000`00051000 fffff806`6c550c70 ffffdd8e`3cf73330 00000000`00000000 : nt!MmPrefetchForCacheManager+0xe5
ffffb40d`bcde7870 fffff806`6c550f3b     : 00000000`00020000 fffff806`6c550c70 00000000`00020000 00000000`00000000 : nt!CcPerformReadAhead+0x328
ffffb40d`bcde7a40 fffff806`6c4c1f15     : ffffdd8e`36efa040 ffffdd8e`36efa040 ffffdd8e`30f02850 ffffdd8e`00000000 : nt!CcWorkerThread+0x2cb
ffffb40d`bcde7b70 fffff806`6c466dd5     : ffffdd8e`36efa040 00000000`00000080 ffffdd8e`30e661c0 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffb40d`bcde7c10 fffff806`6c5fb4f8     : fffff806`6924b180 ffffdd8e`36efa040 fffff806`6c466d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb40d`bcde7c60 00000000`00000000     : ffffb40d`bcde8000 ffffb40d`bcde2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME:  Ntfs+7798
MODULE_NAME: Ntfs
IMAGE_NAME:  Ntfs.sys
IMAGE_VERSION:  10.0.19041.508
STACK_COMMAND:  .cxr 0xffffb40dbcde66c0 ; kb
BUCKET_ID_FUNC_OFFSET:  7798
FAILURE_BUCKET_ID:  0x34_Ntfs!unknown_function
OS_VERSION:  10.0.19041.1
BUILDLAB_STR:  vb_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {d51835d9-4001-510a-3094-b40ec540e0b1}
Followup:     MachineOwner
---------