Cumali0110
Decapat
- Katılım
- 20 Temmuz 2022
- Mesajlar
- 12
Daha fazla
- Cinsiyet
- Erkek
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the BugCheck.
Arg2: ffffc185e1550a20
Arg3: ffffe7809b3b4000
Arg4: ffffd707c8229ae4
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4708
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 6755
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Memory.System.Errors.BadPageCount
Value: 23
Key : Memory.System.Errors.ScrubErrors
Value: 23
FILE_IN_CAB: 071922-32890-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 31
BUGCHECK_P2: ffffc185e1550a20
BUGCHECK_P3: ffffe7809b3b4000
BUGCHECK_P4: ffffd707c8229ae4
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
BAD_PAGES_DETECTED: 17
STACK_TEXT:
ffffa00b`65a6d998 fffff807`5d9feaa3 : 00000000`0000001a 00000000`00000031 ffffc185`e1550a20 ffffe780`9b3b4000 : nt!KeBugCheckEx
ffffa00b`65a6d9a0 fffff807`5d81c26c : ffffe780`9b3b4000 ffffd707`c8229aa2 00000000`00000051 00000000`00000000 : nt!MiApplyCompressedFixups+0x1e29f3
ffffa00b`65a6da00 fffff807`5d81c88d : 00000000`00000000 ffffc185`e1550a20 ffffffff`e1250000 00000000`00000051 : nt!MiPerformFixups+0x88
ffffa00b`65a6daa0 fffff807`5d476dc1 : ffffd2f3`c04d62b0 ffffc185`e1550a20 00000000`00000008 ffffa00b`65a6dc10 : nt!MiRelocateImagePfn+0x18d
ffffa00b`65a6db10 fffff807`5d7db2ed : 00000000`75130000 00000000`00000000 00000000`15130000 ffffd707`c9c12200 : nt!MiWalkEntireImage+0x521
ffffa00b`65a6dd40 fffff807`5d7dbdfc : ffffc185`e1550a20 00000000`56380000 00000000`00000000 ffffd707`c8228000 : nt!MiSwitchBaseAddress+0x5d
ffffa00b`65a6dd70 fffff807`5d7db895 : 00000000`56380000 ffffa00b`65a6e040 ffffc185`e3af5080 00000000`00000000 : nt!MiRelocateImageAgain+0x188
ffffa00b`65a6de00 fffff807`5d82219b : 00000000`00000002 ffffa00b`00000000 ffffc185`e3eb9840 ffffa00b`65a6e040 : nt!MiValidateExistingImage+0x81
ffffa00b`65a6dea0 fffff807`5d8234cd : 00000000`00000000 ffffa00b`65a6e040 ffffc185`e3af5080 ffffc185`e3eb9840 : nt!MiShareExistingControlArea+0xc7
ffffa00b`65a6ded0 fffff807`5d822c44 : ffffc185`e1550a20 00000000`00000000 ffffc185`e3eb9840 00000000`00000000 : nt!MiCreateImageOrDataSection+0x1ad
ffffa00b`65a6dfc0 fffff807`5d822987 : 00000000`11000000 ffffa00b`65a6e331 00000000`00000000 00000000`00000002 : nt!MiCreateSection+0xf4
ffffa00b`65a6e140 fffff807`5d82270c : ffffa00b`65a6e398 ffffa00b`00000005 ffffa00b`65a6e308 fffff807`5d43cc14 : nt!MiCreateSectionCommon+0x207
ffffa00b`65a6e220 fffff807`5d7f8c4c : 00000000`000008a0 ffffffff`ffe91ca0 00000000`00000020 ffffffff`80002438 : nt!NtCreateSection+0x5c
ffffa00b`65a6e290 fffff807`5d839d62 : 00000000`11000000 00000000`00000000 00000000`00000000 ffffc185`00000060 : nt!PfpFileBuildReadSupport+0x1c8
ffffa00b`65a6e390 fffff807`5d83f3a9 : 00000000`00000000 ffffa00b`00000017 ffffd707`00000000 00000000`00000006 : nt!PfpPrefetchFilesTrickle+0x1c6
ffffa00b`65a6e480 fffff807`5d83fbce : ffffd707`db9e5000 ffffd707`db9e5000 ffffa00b`65a6e6a0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x299
ffffa00b`65a6e5f0 fffff807`5d8456d9 : 00000000`00000001 fffff807`5d4b4a01 ffffc185`e6a85be0 ffffd707`db9e5000 : nt!PfpPrefetchRequest+0x132
ffffa00b`65a6e670 fffff807`5d84456d : ffffc185`00000000 00000000`00000000 00000000`2aac9eb5 00000000`2aac9e01 : nt!PfSetSuperfetchInformation+0x155
ffffa00b`65a6e770 fffff807`5d6096b8 : 00000000`00000001 00000000`00000000 ffffa00b`65a6eb80 00000000`00000000 : nt!NtSetSystemInformation+0x9bd
ffffa00b`65a6eb00 00007ffe`8acf0274 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c8`6c37f608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8acf0274
SYMBOL_NAME: PAGE_NOT_ZERO
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_NOT_ZERO_0x1a_31
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7bffb5e0-eeb7-e109-1d31-4c57d47f6a6c}
Followup: MachineOwner
---------
*** Memory manager detected 23 instance(s) of page corruption, target is likely to have memory corruption.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8077f2c83de, Address of the instruction which caused the BugCheck
Arg3: ffffc900822b5920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1859
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8231
Key : Analysis.Init.CPU.mSec
Value: 343
Key : Analysis.Init.Elapsed.mSec
Value: 15751
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 072022-30484-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8077f2c83de
BUGCHECK_P3: ffffc900822b5920
BUGCHECK_P4: 0
CONTEXT: ffffc900822b5920 -- (.cxr 0xffffc900822b5920)
rax=0000000000000000 rbx=fffff684b9676390 rcx=fffff684b9676390
rdx=0010000000000000 rsi=0000000000000700 rdi=ffff800dfc571b80
rip=fffff8077f2c83de rsp=fffff684b9676300 rbp=ffff800dfb3b4080
r8=0000000000000000 r9=0000000000000004 r10=0000000000000000
r11=fffff684b96763f0 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff807`7f2c83de 48890a mov qword ptr [rdx],rcx ds:002b:00100000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
fffff684`b9676300 fffff807`7f2c83bf : 00000000`00000000 fffff807`7fcdb500 fffff684`00000000 fffff684`b9676350 : nt!KxWaitForLockOwnerShip+0xe
fffff684`b9676330 fffff807`7f251690 : ffff800d`fc571b20 00000000`00000000 00000000`00000000 fffff684`b9676700 : nt!KeAcquireInStackQueuedSpinLock+0x7f
fffff684`b9676360 fffff807`840d3d00 : fffff684`b9676700 00000000`00000702 00000000`00000004 ffffdf85`dc54a5a0 : nt!ExAcquireResourceExclusiveLite+0xb0
fffff684`b96763f0 fffff807`840e57ae : ffff800d`fa41aa28 ffffdf85`dc54a5a0 ffffdf85`dc54a700 ffff800d`00000001 : Ntfs!NtfsAcquireExclusiveFcb+0x90
fffff684`b9676470 fffff807`840eaf51 : 00000000`00000000 ffffdf85`dc54a5a0 ffff800d`00000000 00000000`00000000 : Ntfs!NtfsAcquireExclusiveScbEx+0x22
fffff684`b96764a0 fffff807`840e78e3 : ffff800d`fa41aa28 ffff800d`fddb7ae0 fffff684`b9676740 00000000`00000000 : Ntfs!NtfsCommonWrite+0x3201
fffff684`b96766d0 fffff807`7f24e565 : ffff800d`fd4f4300 ffff800d`fddb7ae0 ffff800d`fddb7ae0 ffff800d`f1a88c00 : Ntfs!NtfsFsdWrite+0x1d3
fffff684`b96767a0 fffff807`7e1272af : ffff800d`f1990007 00000000`00000000 ffff800d`f1a908a0 ffff800d`fc705570 : nt!IofCallDriver+0x55
fffff684`b96767e0 fffff807`7e124b33 : fffff684`b9676870 00000000`00000000 00000000`00000001 00000000`20707249 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff684`b9676850 fffff807`7f24e565 : ffff800d`fddb7ae0 fffff684`b9676a20 fffff684`00000000 ffff800d`fc705570 : FLTMGR!FltpDispatch+0xa3
fffff684`b96768b0 fffff807`7f60da18 : 00000000`00000001 ffff800d`fc705570 00000000`00000001 ffff800d`fddb7f58 : nt!IofCallDriver+0x55
fffff684`b96768f0 fffff807`7f5fc89f : ffff800d`00000000 fffff684`b9676b80 00000000`00000000 fffff684`b9676b80 : nt!IopSynchronousServiceTail+0x1a8
fffff684`b9676990 fffff807`7f4096b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000069`203fe980 : nt!NtWriteFile+0x66f
fffff684`b9676a90 00007ff9`03c0ce44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000069`203fe8d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`03c0ce44
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1706
STACK_COMMAND: .cxr 0xffffc900822b5920 ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93}
Followup: MachineOwner
---------
Sağlık bölümünde böyle bir şey çıkıyor, bu bir sorun mu?HD Tune 5.75 indirip HDD'nizin Health sekmesinden ekran alıntısı paylaşırsanız sevinirim. Sorun diskte gibi.
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000031, The subtype of the BugCheck. Arg2: ffffc185e1550a20 Arg3: ffffe7809b3b4000 Arg4: ffffd707c8229ae4 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1796 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4708 Key : Analysis.Init.CPU.mSec Value: 312 Key : Analysis.Init.Elapsed.mSec Value: 6755 Key : Analysis.Memory.CommitPeak.Mb Value: 82 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Memory.System.Errors.BadPageCount Value: 23 Key : Memory.System.Errors.ScrubErrors Value: 23 FILE_IN_CAB: 071922-32890-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 1a BUGCHECK_P1: 31 BUGCHECK_P2: ffffc185e1550a20 BUGCHECK_P3: ffffe7809b3b4000 BUGCHECK_P4: ffffd707c8229ae4 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe BAD_PAGES_DETECTED: 17 STACK_TEXT: ffffa00b`65a6d998 fffff807`5d9feaa3 : 00000000`0000001a 00000000`00000031 ffffc185`e1550a20 ffffe780`9b3b4000 : nt!KeBugCheckEx ffffa00b`65a6d9a0 fffff807`5d81c26c : ffffe780`9b3b4000 ffffd707`c8229aa2 00000000`00000051 00000000`00000000 : nt!MiApplyCompressedFixups+0x1e29f3 ffffa00b`65a6da00 fffff807`5d81c88d : 00000000`00000000 ffffc185`e1550a20 ffffffff`e1250000 00000000`00000051 : nt!MiPerformFixups+0x88 ffffa00b`65a6daa0 fffff807`5d476dc1 : ffffd2f3`c04d62b0 ffffc185`e1550a20 00000000`00000008 ffffa00b`65a6dc10 : nt!MiRelocateImagePfn+0x18d ffffa00b`65a6db10 fffff807`5d7db2ed : 00000000`75130000 00000000`00000000 00000000`15130000 ffffd707`c9c12200 : nt!MiWalkEntireImage+0x521 ffffa00b`65a6dd40 fffff807`5d7dbdfc : ffffc185`e1550a20 00000000`56380000 00000000`00000000 ffffd707`c8228000 : nt!MiSwitchBaseAddress+0x5d ffffa00b`65a6dd70 fffff807`5d7db895 : 00000000`56380000 ffffa00b`65a6e040 ffffc185`e3af5080 00000000`00000000 : nt!MiRelocateImageAgain+0x188 ffffa00b`65a6de00 fffff807`5d82219b : 00000000`00000002 ffffa00b`00000000 ffffc185`e3eb9840 ffffa00b`65a6e040 : nt!MiValidateExistingImage+0x81 ffffa00b`65a6dea0 fffff807`5d8234cd : 00000000`00000000 ffffa00b`65a6e040 ffffc185`e3af5080 ffffc185`e3eb9840 : nt!MiShareExistingControlArea+0xc7 ffffa00b`65a6ded0 fffff807`5d822c44 : ffffc185`e1550a20 00000000`00000000 ffffc185`e3eb9840 00000000`00000000 : nt!MiCreateImageOrDataSection+0x1ad ffffa00b`65a6dfc0 fffff807`5d822987 : 00000000`11000000 ffffa00b`65a6e331 00000000`00000000 00000000`00000002 : nt!MiCreateSection+0xf4 ffffa00b`65a6e140 fffff807`5d82270c : ffffa00b`65a6e398 ffffa00b`00000005 ffffa00b`65a6e308 fffff807`5d43cc14 : nt!MiCreateSectionCommon+0x207 ffffa00b`65a6e220 fffff807`5d7f8c4c : 00000000`000008a0 ffffffff`ffe91ca0 00000000`00000020 ffffffff`80002438 : nt!NtCreateSection+0x5c ffffa00b`65a6e290 fffff807`5d839d62 : 00000000`11000000 00000000`00000000 00000000`00000000 ffffc185`00000060 : nt!PfpFileBuildReadSupport+0x1c8 ffffa00b`65a6e390 fffff807`5d83f3a9 : 00000000`00000000 ffffa00b`00000017 ffffd707`00000000 00000000`00000006 : nt!PfpPrefetchFilesTrickle+0x1c6 ffffa00b`65a6e480 fffff807`5d83fbce : ffffd707`db9e5000 ffffd707`db9e5000 ffffa00b`65a6e6a0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x299 ffffa00b`65a6e5f0 fffff807`5d8456d9 : 00000000`00000001 fffff807`5d4b4a01 ffffc185`e6a85be0 ffffd707`db9e5000 : nt!PfpPrefetchRequest+0x132 ffffa00b`65a6e670 fffff807`5d84456d : ffffc185`00000000 00000000`00000000 00000000`2aac9eb5 00000000`2aac9e01 : nt!PfSetSuperfetchInformation+0x155 ffffa00b`65a6e770 fffff807`5d6096b8 : 00000000`00000001 00000000`00000000 ffffa00b`65a6eb80 00000000`00000000 : nt!NtSetSystemInformation+0x9bd ffffa00b`65a6eb00 00007ffe`8acf0274 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000c8`6c37f608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8acf0274 SYMBOL_NAME: PAGE_NOT_ZERO MODULE_NAME: hardware IMAGE_NAME: hardware_ram STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: PAGE_NOT_ZERO_0x1a_31 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {7bffb5e0-eeb7-e109-1d31-4c57d47f6a6c} Followup: MachineOwner --------- *** Memory manager detected 23 instance(s) of page corruption, target is likely to have memory corruption. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff8077f2c83de, Address of the instruction which caused the BugCheck Arg3: ffffc900822b5920, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1859 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 8231 Key : Analysis.Init.CPU.mSec Value: 343 Key : Analysis.Init.Elapsed.mSec Value: 15751 Key : Analysis.Memory.CommitPeak.Mb Value: 88 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 072022-30484-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8077f2c83de BUGCHECK_P3: ffffc900822b5920 BUGCHECK_P4: 0 CONTEXT: ffffc900822b5920 -- (.cxr 0xffffc900822b5920) rax=0000000000000000 rbx=fffff684b9676390 rcx=fffff684b9676390 rdx=0010000000000000 rsi=0000000000000700 rdi=ffff800dfc571b80 rip=fffff8077f2c83de rsp=fffff684b9676300 rbp=ffff800dfb3b4080 r8=0000000000000000 r9=0000000000000004 r10=0000000000000000 r11=fffff684b96763f0 r12=0000000000000000 r13=0000000000000001 r14=0000000000000001 r15=0000000000000001 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286 nt!KxWaitForLockOwnerShip+0xe: fffff807`7f2c83de 48890a mov qword ptr [rdx],rcx ds:002b:00100000`00000000=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: opera.exe STACK_TEXT: fffff684`b9676300 fffff807`7f2c83bf : 00000000`00000000 fffff807`7fcdb500 fffff684`00000000 fffff684`b9676350 : nt!KxWaitForLockOwnerShip+0xe fffff684`b9676330 fffff807`7f251690 : ffff800d`fc571b20 00000000`00000000 00000000`00000000 fffff684`b9676700 : nt!KeAcquireInStackQueuedSpinLock+0x7f fffff684`b9676360 fffff807`840d3d00 : fffff684`b9676700 00000000`00000702 00000000`00000004 ffffdf85`dc54a5a0 : nt!ExAcquireResourceExclusiveLite+0xb0 fffff684`b96763f0 fffff807`840e57ae : ffff800d`fa41aa28 ffffdf85`dc54a5a0 ffffdf85`dc54a700 ffff800d`00000001 : Ntfs!NtfsAcquireExclusiveFcb+0x90 fffff684`b9676470 fffff807`840eaf51 : 00000000`00000000 ffffdf85`dc54a5a0 ffff800d`00000000 00000000`00000000 : Ntfs!NtfsAcquireExclusiveScbEx+0x22 fffff684`b96764a0 fffff807`840e78e3 : ffff800d`fa41aa28 ffff800d`fddb7ae0 fffff684`b9676740 00000000`00000000 : Ntfs!NtfsCommonWrite+0x3201 fffff684`b96766d0 fffff807`7f24e565 : ffff800d`fd4f4300 ffff800d`fddb7ae0 ffff800d`fddb7ae0 ffff800d`f1a88c00 : Ntfs!NtfsFsdWrite+0x1d3 fffff684`b96767a0 fffff807`7e1272af : ffff800d`f1990007 00000000`00000000 ffff800d`f1a908a0 ffff800d`fc705570 : nt!IofCallDriver+0x55 fffff684`b96767e0 fffff807`7e124b33 : fffff684`b9676870 00000000`00000000 00000000`00000001 00000000`20707249 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f fffff684`b9676850 fffff807`7f24e565 : ffff800d`fddb7ae0 fffff684`b9676a20 fffff684`00000000 ffff800d`fc705570 : FLTMGR!FltpDispatch+0xa3 fffff684`b96768b0 fffff807`7f60da18 : 00000000`00000001 ffff800d`fc705570 00000000`00000001 ffff800d`fddb7f58 : nt!IofCallDriver+0x55 fffff684`b96768f0 fffff807`7f5fc89f : ffff800d`00000000 fffff684`b9676b80 00000000`00000000 fffff684`b9676b80 : nt!IopSynchronousServiceTail+0x1a8 fffff684`b9676990 fffff807`7f4096b8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000069`203fe980 : nt!NtWriteFile+0x66f fffff684`b9676a90 00007ff9`03c0ce44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000069`203fe8d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`03c0ce44 SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1706 STACK_COMMAND: .cxr 0xffffc900822b5920 ; kb BUCKET_ID_FUNC_OFFSET: e FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.