KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 000000004a07d357, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 000000004a07d357, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16184
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: 4a07d357
BUGCHECK_P3: 8
BUGCHECK_P4: 4a07d357
WRITE_ADDRESS: fffff8035e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8035e40f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8035e40f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000004a07d357
EXCEPTION_PARAMETER1: 0000000000000008
EXCEPTION_PARAMETER2: 000000004a07d357
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
fffff48e`2ba21d08 fffff803`5dc4e5b9 : 00000000`0000001e ffffffff`c0000005 00000000`4a07d357 00000000`00000008 : nt!KeBugCheckEx
fffff48e`2ba21d10 fffff803`5dc05fac : 00000000`00001000 fffff48e`2ba225b0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caa59
fffff48e`2ba223d0 fffff803`5dc02143 : 00000000`000081a1 fffff48e`2ba22850 ffffffff`ffffffff ffffffff`0015b0bc : nt!KiExceptionDispatch+0x12c
fffff48e`2ba225b0 00000000`4a07d357 : ffff847c`cb600000 00000000`00000000 fffff48e`2ba229b0 00000000`00000000 : nt!KiPageFault+0x443
fffff48e`2ba22740 ffff847c`cb600000 : 00000000`00000000 fffff48e`2ba229b0 00000000`00000000 00000000`000000ff : 0x4a07d357
fffff48e`2ba22748 00000000`00000000 : fffff48e`2ba229b0 00000000`00000000 00000000`000000ff 00000000`00040282 : 0xffff847c`cb600000
SYMBOL_NAME: nt!KiDispatchException+1caa59
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1caa59
FAILURE_BUCKET_ID: 0x1E_c0000005_X_nt!KiDispatchException
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {72b01280-60ea-6404-b5e3-077cb4799617}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803e2510008, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff805227b2234, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21670
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff803e2510008
BUGCHECK_P2: 0
BUGCHECK_P3: fffff805227b2234
BUGCHECK_P4: 2
READ_ADDRESS: fffff8051dafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8051da0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8051da0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff803e2510008
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffb005ac4c600 -- (.trap 0xfffffb005ac4c600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000a78b rbx=0000000000000000 rcx=000000000003a78b
rdx=fffff803e2510000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805227b2234 rsp=fffffb005ac4c790 rbp=fffff805227b21fc
r8=0000000000000f2e r9=00000001400025ba r10=fffffb005ac4c9a0
r11=00000000fff2513a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
BEDaisy+0x2a2234:
fffff805`227b2234 f6ff idiv bh
Resetting default scope
MISALIGNED_IP:
BEDaisy+2a2234
fffff805`227b2234 f6ff idiv bh
STACK_TEXT:
fffffb00`5ac4c358 fffff805`1d286729 : 00000000`00000050 fffff803`e2510008 00000000`00000000 fffffb00`5ac4c600 : nt!KeBugCheckEx
fffffb00`5ac4c360 fffff805`1d0eeb80 : c0011020`063000a6 00000000`00000000 fffffb00`5ac4c680 00000000`00000000 : nt!MiSystemFault+0x13faf9
fffffb00`5ac4c460 fffff805`1d20205e : 00000000`00000000 00000000`00000000 fffff803`e2510000 fffff805`1d1fa8f5 : nt!MmAccessFault+0x400
fffffb00`5ac4c600 fffff805`227b2234 : 00000000`00000009 ffffa888`44fcb080 00000000`00000804 fffffb00`5ac4cae0 : nt!KiPageFault+0x35e
fffffb00`5ac4c790 00000000`00000009 : ffffa888`44fcb080 00000000`00000804 fffffb00`5ac4cae0 00000000`00000001 : BEDaisy+0x2a2234
fffffb00`5ac4c798 ffffa888`44fcb080 : 00000000`00000804 fffffb00`5ac4cae0 00000000`00000001 ffff867a`e6800000 : 0x9
fffffb00`5ac4c7a0 00000000`00000804 : fffffb00`5ac4cae0 00000000`00000001 ffff867a`e6800000 00000000`00000002 : 0xffffa888`44fcb080
fffffb00`5ac4c7a8 fffffb00`5ac4cae0 : 00000000`00000001 ffff867a`e6800000 00000000`00000002 00000000`00000005 : 0x804
fffffb00`5ac4c7b0 00000000`00000001 : ffff867a`e6800000 00000000`00000002 00000000`00000005 00000000`00040246 : 0xfffffb00`5ac4cae0
fffffb00`5ac4c7b8 ffff867a`e6800000 : 00000000`00000002 00000000`00000005 00000000`00040246 00000000`00000000 : 0x1
fffffb00`5ac4c7c0 00000000`00000002 : 00000000`00000005 00000000`00040246 00000000`00000000 ffffa888`44fcb4d8 : 0xffff867a`e6800000
fffffb00`5ac4c7c8 00000000`00000005 : 00000000`00040246 00000000`00000000 ffffa888`44fcb4d8 fffff803`e2510000 : 0x2
fffffb00`5ac4c7d0 00000000`00040246 : 00000000`00000000 ffffa888`44fcb4d8 fffff803`e2510000 00000000`00000009 : 0x5
fffffb00`5ac4c7d8 00000000`00000000 : ffffa888`44fcb4d8 fffff803`e2510000 00000000`00000009 00000000`00000000 : 0x40246
SYMBOL_NAME: BEDaisy+2a2234
IMAGE_NAME: hardware
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_BEDaisy.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0d6989f4-a5e2-2225-1046-259fcb6d205e}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
buffer overrun.
Arg2: ffff81873b7c49d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81873b7c4928, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6436
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 36332
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 2
BUGCHECK_P2: ffff81873b7c49d0
BUGCHECK_P3: ffff81873b7c4928
BUGCHECK_P4: 0
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
EXCEPTION_RECORD: ffff81873b7c4928 -- (.exr 0xffff81873b7c4928)
ExceptionAddress: fffff8052dea34c5 (dxgkrnl!_report_gsfailure+0x0000000000000005)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: TslGame.exe
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000002
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff8187`3b7c46a8 fffff805`29405e69 : 00000000`00000139 00000000`00000002 ffff8187`3b7c49d0 ffff8187`3b7c4928 : nt!KeBugCheckEx
ffff8187`3b7c46b0 fffff805`29406290 : fffff805`293611e0 fffff805`321120cf ffd88b48`00000eec 068b4808`7f8d4dc7 : nt!KiBugCheckDispatch+0x69
ffff8187`3b7c47f0 fffff805`29404623 : 00000000`0000000d 00000000`00000000 7fff9a00`dba46e50 00000000`ffffffff : nt!KiFastFailDispatch+0xd0
ffff8187`3b7c49d0 fffff805`2dea34c5 : fffff805`2dea4736 ffff8187`3b7c5140 fffff805`2928523f fffff805`2df3db38 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8187`3b7c4b68 fffff805`2dea4736 : ffff8187`3b7c5140 fffff805`2928523f fffff805`2df3db38 ffff8187`00000000 : dxgkrnl!_report_gsfailure+0x5
ffff8187`3b7c4b70 fffff805`2dea46cb : ffff8187`3b7c4c40 00000000`00000000 ffff8187`3b7c5178 ffff8187`3b7c5150 : dxgkrnl!_GSHandlerCheckCommon+0x5a
ffff8187`3b7c4ba0 fffff805`293fcd62 : fffff805`2dea46b8 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!_GSHandlerCheck+0x13
ffff8187`3b7c4bd0 fffff805`29285027 : ffff8187`3b7c5140 00000000`00000000 ffff8187`3b7c5350 fffff805`2dfc4a16 : nt!RtlpExecuteHandlerForException+0x12
ffff8187`3b7c4c00 fffff805`29283ce6 : ffff8187`3b7c5b18 ffff8187`3b7c5850 ffff8187`3b7c5b18 ffffd809`cefe4010 : nt!RtlDispatchException+0x297
ffff8187`3b7c5320 fffff805`29405fac : 00000000`00001000 ffff8187`3b7c5bc0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffff8187`3b7c59e0 fffff805`29402143 : fffff805`2def8918 ffffd809`cb565310 00000000`00000002 fffff805`292d5d19 : nt!KiExceptionDispatch+0x12c
ffff8187`3b7c5bc0 fffff805`2dfc4a16 : 00000000`00000000 00000000`00000004 ffff8187`3b7c5eb0 00000000`00000004 : nt!KiPageFault+0x443
ffff8187`3b7c5d50 fffff805`2df6b027 : 00000000`00000000 fffff805`2df7bdc7 ffffd809`d1993a20 ffff9a00`db3a2b30 : dxgkrnl!ADAPTER_RENDER::DdiValidateSubmitCommand+0x3e
ffff8187`3b7c5e00 fffff805`2df6b621 : ffff9a00`db3a2b30 00000000`00000001 00000000`00000001 ffff9a00`db3a2b30 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x5b7
ffff8187`3b7c65c0 fffff805`2df6aa2d : ffffd809`d2b1d080 00000000`00000000 ffff9a00`dba46de0 00000004`6e2beb20 : dxgkrnl!DxgkSubmitCommandInternal+0x551
ffff8187`3b7c6ac0 fffff805`294058b8 : ffffd809`d2b1d080 00000000`1631c000 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommand+0x5d
ffff8187`3b7c6b00 00007ffe`43ef5ae4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000004`6e2bea58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`43ef5ae4
SYMBOL_NAME: dxgkrnl!_report_gsfailure+5
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_dxgkrnl!_report_gsfailure
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1685fa82-f4b9-d129-b6b1-78c3bba339a9}
Followup: MachineOwner
---------
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000051384
Arg2: ffffb40dbcde6e88
Arg3: ffffb40dbcde66c0
Arg4: fffff806705c7798
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 6202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8900
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 34
BUGCHECK_P1: 51384
BUGCHECK_P2: ffffb40dbcde6e88
BUGCHECK_P3: ffffb40dbcde66c0
BUGCHECK_P4: fffff806705c7798
EXCEPTION_RECORD: ffffb40dbcde6e88 -- (.exr 0xffffb40dbcde6e88)
ExceptionAddress: fffff806705c7798 (Ntfs+0x0000000000007798)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: ffffb40dbcde66c0 -- (.cxr 0xffffb40dbcde66c0)
rax=0000000000000001 rbx=ffffdd8e3ccbba08 rcx=0000000000000000
rdx=0000000000000000 rsi=ffff8980c3e56170 rdi=ffffdd8e3cdd3d08
rip=fffff806705c7798 rsp=ffffb40dbcde70c0 rbp=ffffb40dbcde7100
r8=0000000000010000 r9=0000000000000000 r10=fffff8066c456180
r11=ffffb40dbcde70a0 r12=0000000000010000 r13=ffffdd8e3cf48a20
r14=0000000000000000 r15=0000000000070000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
Ntfs+0x7798:
fffff806`705c7798 33d2 xor edx,edx
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8066cefa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8066ce0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffb40d`bcde70c0 fffff806`705c502c : ffffdd8e`3cdd3dd0 ffffb40d`bcde74f0 ffffdd8e`36349184 00000000`00000000 : Ntfs+0x7798
ffffb40d`bcde72c0 fffff806`705c40cc : ffffdd8e`3cdd3d08 ffffdd8e`3cf48a20 ffffdd8e`00000000 ffffdd8e`00010000 : Ntfs+0x502c
ffffb40d`bcde74c0 fffff806`6c4d1f35 : ffffdd8e`3cdd0460 ffffdd8e`3cf48a20 ffffdd8e`3cf48a20 ffffdd8e`36342d20 : Ntfs+0x40cc
ffffb40d`bcde7590 fffff806`6a466ccf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffb40d`bcde75d0 fffff806`6a4648d3 : ffffb40d`bcde7660 ffffdd8e`36342d20 00000000`00000006 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffb40d`bcde7640 fffff806`6c4d1f35 : ffffdd8e`3cf48a20 fffff806`6c539895 ffffdd8e`3cf715f0 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffb40d`bcde76a0 fffff806`6c539b57 : 00000000`00000000 ffffdd8e`3cf48a20 ffffdd8e`3c1270b0 ffffdd8e`3cf715f0 : nt!IofCallDriver+0x55
ffffb40d`bcde76e0 fffff806`6c4add88 : ffffdd8e`3c127060 fffff806`6c50fefa ffffdd8e`3c1270c0 ffffdd8e`3c127080 : nt!IoPageReadEx+0x1d7
ffffb40d`bcde7750 fffff806`6c8982ad : ffffdd8e`3c127060 ffffdd8e`36efa040 ffffdd8e`3c127170 ffffdd8e`30e66840 : nt!MiPageRead+0x28
ffffb40d`bcde77a0 fffff806`6c897b21 : ffffb40d`bcde7910 00000000`00000001 ffffdd8e`36efa040 00000000`00000000 : nt!MiPfExecuteReadList+0xf9
ffffb40d`bcde7810 fffff806`6c4aa430 : 00000000`00051000 fffff806`6c550c70 ffffdd8e`3cf73330 00000000`00000000 : nt!MmPrefetchForCacheManager+0xe5
ffffb40d`bcde7870 fffff806`6c550f3b : 00000000`00020000 fffff806`6c550c70 00000000`00020000 00000000`00000000 : nt!CcPerformReadAhead+0x328
ffffb40d`bcde7a40 fffff806`6c4c1f15 : ffffdd8e`36efa040 ffffdd8e`36efa040 ffffdd8e`30f02850 ffffdd8e`00000000 : nt!CcWorkerThread+0x2cb
ffffb40d`bcde7b70 fffff806`6c466dd5 : ffffdd8e`36efa040 00000000`00000080 ffffdd8e`30e661c0 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffb40d`bcde7c10 fffff806`6c5fb4f8 : fffff806`6924b180 ffffdd8e`36efa040 fffff806`6c466d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb40d`bcde7c60 00000000`00000000 : ffffb40d`bcde8000 ffffb40d`bcde2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Ntfs+7798
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xffffb40dbcde66c0 ; kb
BUCKET_ID_FUNC_OFFSET: 7798
FAILURE_BUCKET_ID: 0x34_Ntfs!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d51835d9-4001-510a-3094-b40ec540e0b1}
Followup: MachineOwner
---------