SYSTEM_SERVICE_EXCEPTION mavi ekran hatası

ckuscu058

Decapat
Katılım
15 Ekim 2020
Mesajlar
31
Daha fazla  
Cinsiyet
Erkek

Dosya Ekleri

  • 121622561_1432854727066614_111380299907261443_n.jpg
    121622561_1432854727066614_111380299907261443_n.jpg
    36 KB · Görüntüleme: 37
  • 121671937_1432854673733286_8720851527616993784_n.jpg
    121671937_1432854673733286_8720851527616993784_n.jpg
    53,2 KB · Görüntüleme: 34
Son düzenleyen: Moderatör:
Ek MSI ve Gigabyte yazılımlarını kaldırın. Afterburner ile bir ayar yaptıysanız sıfırlayın ve Afterburner'ı kaldırın. Disklerinize HD Tune ile (quick scan kapalı şekilde) hata taraması, HD Sentinel ile de sağlık testi yapıp sonuçlarını paylaşın.

Ayrıca belleklere test yapın. Ve Windows'u son sürüme güncelleyin.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8014ee33aba, Address of the instruction which caused the bugcheck
Arg3: ffff8b8d485242f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 45281

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8014ee33aba

BUGCHECK_P3: ffff8b8d485242f0

BUGCHECK_P4: 0

CONTEXT:  ffff8b8d485242f0 -- (.cxr 0xffff8b8d485242f0)
rax=0000000000000000 rbx=ffffde8928018080 rcx=ffff8b8d48524f08
rdx=0000000000000002 rsi=ffff8b8d48524f08 rdi=0000000000000002
rip=fffff8014ee33aba rsp=ffff8b8d48524ce0 rbp=0000000000000000
 r8=0000000000000001  r9=fffff8014ee00000 r10=ffffde8928ab2080
r11=ffff8b8d48524be8 r12=ffffde89280181c0 r13=0000000000000000
r14=0000000000000002 r15=ffffb600bb7b9180
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!KeAbPreAcquire+0x11a:
fffff801`4ee33aba 0fb64220        movzx   eax,byte ptr [rdx+20h] ds:002b:00000000`00000022=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT: 
ffff8b8d`48524ce0 fffff801`4eff2c67     : ffffde89`28018080 ffff8b8d`48524db1 00000000`00000000 00000000`00000000 : nt!KeAbPreAcquire+0x11a
ffff8b8d`48524d30 fffff801`4ee3862d     : ffff8b8d`48524f08 00000000`0000001b 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x1bdb07
ffff8b8d`48524e10 fffff801`4ee3286e     : ffffde89`25ee8190 ffff8b8d`48524ef0 00000000`00010224 fffff801`4ef5b5c0 : nt!ExpWaitForResource+0x6d
ffff8b8d`48524e90 fffff801`4ee31a3f     : fffff801`4f8b9f20 00000000`00000000 ffffde89`286bc8e0 00000000`00000000 : nt!ExpAcquireResourceExclusiveLite+0x33e
ffff8b8d`48524f50 ffffdd5b`ee1d6f2c     : ffffde89`286bc8e0 00000000`00989680 00000000`00000000 00000000`00000001 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
ffff8b8d`48524f90 ffffdd5b`edf63507     : 00000000`00000000 00000000`00000102 ffff8b8d`48525100 00000000`00000000 : win32kbase!EnterCrit+0x8c
ffff8b8d`485250b0 00000000`00000000     : 00000000`00000102 ffff8b8d`48525100 00000000`00000000 ffffde89`28018001 : win32kfull+0x163507


SYMBOL_NAME:  win32kbase!EnterCrit+8c

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .cxr 0xffff8b8d485242f0 ; kb

BUCKET_ID_FUNC_OFFSET:  8c

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!EnterCrit

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a4ae1fed-f8cf-effb-734e-4b667f8fbde8}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffc080aecfaff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc080aecfaf48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5280

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10064

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffc080aecfaff0

BUGCHECK_P3: ffffc080aecfaf48

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc080aecfaff0 -- (.trap 0xffffc080aecfaff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff00d6b44e000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffff00d6b454000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002b9e263f rsp=ffffc080aecfb180 rbp=ffffc080aecfb6f0
 r8=fffff00d6b454000  r9=ffffc080aecfb700 r10=ffffc080aed8a1c0
r11=ffffffffffffff80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x1d65e7:
fffff800`2b9e263f cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc080aecfaf48 -- (.exr 0xffffc080aecfaf48)
ExceptionAddress: fffff8002b9e263f (nt!RtlpGetStackLimitsEx+0x00000000001d65e7)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  ffffc080aecfacc8

STACK_TEXT: 
ffffc080`aecfacc8 fffff800`2b9d4b29     : 00000000`00000139 00000000`00000004 ffffc080`aecfaff0 ffffc080`aecfaf48 : nt!KeBugCheckEx
ffffc080`aecfacd0 fffff800`2b9d4f50     : 00000028`00000100 00030000`00180400 00000020`00000008 00430053`00440024 : nt!KiBugCheckDispatch+0x69
ffffc080`aecfae10 fffff800`2b9d32e3     : fffff800`2b92ee58 fffff800`2bc0d45c ffffc080`aecfb7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc080`aecfaff0 fffff800`2b9e263f     : fffff800`2bc0e080 00000000`00000000 ffffc080`aecfb1f0 fffff800`2b9c934e : nt!KiRaiseSecurityCheckFailure+0x323
ffffc080`aecfb180 fffff800`2b9e2d49     : fffff00d`6b450204 fffff800`2bc0e080 ffffc080`aecfb6f0 00000000`00000003 : nt!RtlpGetStackLimitsEx+0x1d65e7
ffffc080`aecfb1b0 fffff800`2b80b33e     : fffff00d`6b4539f8 ffffc080`aecfbe30 fffff00d`6b4539f8 ffff970b`97cdc080 : nt!RtlDispatchException+0x1d6549
ffffc080`aecfb900 fffff800`2b9c3b52     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffc080`aecfbfb0 fffff800`2b9c3b20     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff00d`6b4538b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------



BAD_OBJECT_HEADER (189)
The OBJECT_HEADER has been corrupted
Arguments:
Arg1: ffffe38573cac950, Pointer to bad OBJECT_HEADER
Arg2: 0000000000000000, Pointer to the resulting OBJECT_TYPE based on the TypeIndex in the OBJECT_HEADER
Arg3: 0000000000000000, The type index is corrupt.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10649

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  189

BUGCHECK_P1: ffffe38573cac950

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VoiceControlEngine.exe

STACK_TEXT: 
fffffc01`c7f1e7d8 fffff802`7e7aaac0     : 00000000`00000189 ffffe385`73cac950 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffc01`c7f1e7e0 fffff802`7e5d944e     : ffffe385`72f97380 00000000`00000000 ffffe385`696f4220 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0x1d1660
fffffc01`c7f1e870 fffff802`7e034fd1     : 00000000`00000001 ffff9401`40fc1180 00000000`00000000 00000000`00000000 : nt!ObReferenceObjectByHandle+0x2e
fffffc01`c7f1e8c0 fffff802`7e5d0db2     : 00000000`0000043c fffffc01`00000000 ffffe385`00000000 00000000`00000000 : nt!IopReferenceFileObject+0x31
fffffc01`c7f1e900 fffff802`7e5d0c36     : e38573f9`9230c805 00000000`0000062c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x162
fffffc01`c7f1ea20 fffff802`7e1d4558     : 00000000`00000001 fffffc01`c7f1eb01 00000000`00000000 fffffc01`c7f1ea00 : nt!NtDeviceIoControlFile+0x56
fffffc01`c7f1ea90 00000000`77d01cbc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`058ff2a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d01cbc


SYMBOL_NAME:  nt!ObpReferenceObjectByHandleWithTag+1d1660

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1139

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1d1660

FAILURE_BUCKET_ID:  0x189_nt!ObpReferenceObjectByHandleWithTag

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8bf3796f-7602-d49d-dd11-eaa45fa2179c}

Followup:     MachineOwner
---------



APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffef3fbc0f4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff820c33309b80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6514

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18232

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1

BUGCHECK_P1: 7ffef3fbc0f4

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: ffff820c33309b80

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvsphelper64.exe

STACK_TEXT: 
ffff820c`333099b8 fffff804`085d4829     : 00000000`00000001 00007ffe`f3fbc0f4 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff820c`333099c0 fffff804`085d46d3     : ffffc28c`1bbbd0c0 00000025`f39ff2f8 ffff820c`33309b18 ffffffff`ffffd8f0 : nt!KiBugCheckDispatch+0x69
ffff820c`33309b00 00007ffe`f3fbc0f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000025`f39ff2c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f3fbc0f4


SYMBOL_NAME:  nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1fe

FAILURE_BUCKET_ID:  0x1_SysCallNum_4_nt!KiSystemServiceExitPico

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {52cd694c-15ec-48c3-924a-3539560711db}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff89000000003a, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8021ec2494b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 12202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16413

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff89000000003a

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8021ec2494b

BUGCHECK_P4: 2

READ_ADDRESS: fffff8021d1713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8021d0283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8021d0283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff89000000003a

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

TRAP_FRAME:  ffff8900d7e59c30 -- (.trap 0xffff8900d7e59c30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff908b925bc368 rbx=0000000000000000 rcx=ffff890000000032
rdx=ffff908b925bc010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021ec2494b rsp=ffff8900d7e59dc0 rbp=ffff8900d7e5a320
 r8=ffff8900d7e5a080  r9=ffff8900d7e5a020 r10=ffff908b93452080
r11=ffff8900d7e59fa8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
Ntfs!NtfsCommonCreate+0x13b:
fffff802`1ec2494b 488b4108        mov     rax,qword ptr [rcx+8] ds:ffff8900`0000003a=????????????????
Resetting default scope

STACK_TEXT: 
ffff8900`d7e59988 fffff802`1cded55a     : 00000000`00000050 ffff8900`0000003a 00000000`00000000 ffff8900`d7e59c30 : nt!KeBugCheckEx
ffff8900`d7e59990 fffff802`1cc5889f     : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8900`0000003a : nt!MiSystemFault+0x1c60fa
ffff8900`d7e59a90 fffff802`1cdd0a5e     : 00000000`00000000 ffff908b`90c476f0 ffff8900`d7e5a0a0 01000000`00100000 : nt!MmAccessFault+0x34f
ffff8900`d7e59c30 fffff802`1ec2494b     : ffff8900`d7e5a1e8 fffff802`28eef39c 00000000`000001f8 ffffda8e`f3ffe030 : nt!KiPageFault+0x35e
ffff8900`d7e59dc0 fffff802`1ec2805e     : ffff908b`90a95ad8 ffff8900`d7e5a080 ffff908b`90a95ad8 ffff908b`925bc010 : Ntfs!NtfsCommonCreate+0x13b
ffff8900`d7e59fb0 fffff802`1cc99db9     : ffff908b`89ab3030 ffff908b`925bc010 ffff908b`897b1000 ffff908b`89a9d6a0 : Ntfs!NtfsFsdCreate+0x1fe
ffff8900`d7e5a1e0 fffff802`1e0e55de     : ffff908b`925bc010 ffff908b`925bc300 ffff908b`925bc010 ffff908b`9b04a260 : nt!IofCallDriver+0x59
ffff8900`d7e5a220 fffff802`1e11cd27     : ffff8900`d7e5a2e0 fffff802`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffff8900`d7e5a2a0 fffff802`1cc99db9     : ffff908b`9b04a200 fffff802`1d202745 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x307
ffff8900`d7e5a350 fffff802`1cc98e74     : 00000000`00000000 00000000`00000000 ffff908b`925bc3f8 ffff908b`925bc010 : nt!IofCallDriver+0x59
ffff8900`d7e5a390 fffff802`1d202dcb     : ffff8900`d7e5a650 fffff802`1d202745 ffff8900`d7e5a5c0 ffff8900`d7e5a8a0 : nt!IoCallDriverWithTracing+0x34
ffff8900`d7e5a3e0 fffff802`1d209d9f     : ffff908b`8987a930 ffff908b`8987a945 ffff908b`8efe9010 00000000`00000001 : nt!IopParseDevice+0x62b
ffff8900`d7e5a550 fffff802`1d208201     : ffff908b`8efe9000 ffff8900`d7e5a798 00000000`00000040 ffff908b`878f4bc0 : nt!ObpLookupObjectName+0x78f
ffff8900`d7e5a710 fffff802`1d24ee74     : ffff908b`00000001 00000009`289fe460 00000000`00000028 00000009`289fe430 : nt!ObOpenObjectByNameEx+0x201
ffff8900`d7e5a850 fffff802`1cdd4258     : ffff908b`93452080 ffff908b`94de25e0 ffff908b`93452080 ffff908b`999b1860 : nt!NtQueryFullAttributesFile+0x1b4
ffff8900`d7e5ab00 00007ffe`a46fe864     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000009`289fe3d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a46fe864


SYMBOL_NAME:  Ntfs!NtfsCommonCreate+13b

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.18362.1082

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  13b

FAILURE_BUCKET_ID:  AV_R_INVALID_Ntfs!NtfsCommonCreate

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {432c19e7-eed6-d291-3847-9570cd565c59}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı