Arkadaşlar normal Facebook'ta falan gezinirken bile mavi ekran yiyorum, bunun çözümü var mıdır? Minidump dosyam: minidump.rar dosyasını indir - download
Dosya Ekleri
Son düzenleyen: Moderatör:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8014ee33aba, Address of the instruction which caused the bugcheck
Arg3: ffff8b8d485242f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32kfull.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 45281
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8014ee33aba
BUGCHECK_P3: ffff8b8d485242f0
BUGCHECK_P4: 0
CONTEXT: ffff8b8d485242f0 -- (.cxr 0xffff8b8d485242f0)
rax=0000000000000000 rbx=ffffde8928018080 rcx=ffff8b8d48524f08
rdx=0000000000000002 rsi=ffff8b8d48524f08 rdi=0000000000000002
rip=fffff8014ee33aba rsp=ffff8b8d48524ce0 rbp=0000000000000000
r8=0000000000000001 r9=fffff8014ee00000 r10=ffffde8928ab2080
r11=ffff8b8d48524be8 r12=ffffde89280181c0 r13=0000000000000000
r14=0000000000000002 r15=ffffb600bb7b9180
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!KeAbPreAcquire+0x11a:
fffff801`4ee33aba 0fb64220 movzx eax,byte ptr [rdx+20h] ds:002b:00000000`00000022=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
ffff8b8d`48524ce0 fffff801`4eff2c67 : ffffde89`28018080 ffff8b8d`48524db1 00000000`00000000 00000000`00000000 : nt!KeAbPreAcquire+0x11a
ffff8b8d`48524d30 fffff801`4ee3862d : ffff8b8d`48524f08 00000000`0000001b 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x1bdb07
ffff8b8d`48524e10 fffff801`4ee3286e : ffffde89`25ee8190 ffff8b8d`48524ef0 00000000`00010224 fffff801`4ef5b5c0 : nt!ExpWaitForResource+0x6d
ffff8b8d`48524e90 fffff801`4ee31a3f : fffff801`4f8b9f20 00000000`00000000 ffffde89`286bc8e0 00000000`00000000 : nt!ExpAcquireResourceExclusiveLite+0x33e
ffff8b8d`48524f50 ffffdd5b`ee1d6f2c : ffffde89`286bc8e0 00000000`00989680 00000000`00000000 00000000`00000001 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
ffff8b8d`48524f90 ffffdd5b`edf63507 : 00000000`00000000 00000000`00000102 ffff8b8d`48525100 00000000`00000000 : win32kbase!EnterCrit+0x8c
ffff8b8d`485250b0 00000000`00000000 : 00000000`00000102 ffff8b8d`48525100 00000000`00000000 ffffde89`28018001 : win32kfull+0x163507
SYMBOL_NAME: win32kbase!EnterCrit+8c
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .cxr 0xffff8b8d485242f0 ; kb
BUCKET_ID_FUNC_OFFSET: 8c
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!EnterCrit
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a4ae1fed-f8cf-effb-734e-4b667f8fbde8}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffc080aecfaff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc080aecfaf48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5280
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10064
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 4
BUGCHECK_P2: ffffc080aecfaff0
BUGCHECK_P3: ffffc080aecfaf48
BUGCHECK_P4: 0
TRAP_FRAME: ffffc080aecfaff0 -- (.trap 0xffffc080aecfaff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff00d6b44e000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffff00d6b454000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002b9e263f rsp=ffffc080aecfb180 rbp=ffffc080aecfb6f0
r8=fffff00d6b454000 r9=ffffc080aecfb700 r10=ffffc080aed8a1c0
r11=ffffffffffffff80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x1d65e7:
fffff800`2b9e263f cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffc080aecfaf48 -- (.exr 0xffffc080aecfaf48)
ExceptionAddress: fffff8002b9e263f (nt!RtlpGetStackLimitsEx+0x00000000001d65e7)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
EXCEPTION_STR: 0xc0000409
BAD_STACK_POINTER: ffffc080aecfacc8
STACK_TEXT:
ffffc080`aecfacc8 fffff800`2b9d4b29 : 00000000`00000139 00000000`00000004 ffffc080`aecfaff0 ffffc080`aecfaf48 : nt!KeBugCheckEx
ffffc080`aecfacd0 fffff800`2b9d4f50 : 00000028`00000100 00030000`00180400 00000020`00000008 00430053`00440024 : nt!KiBugCheckDispatch+0x69
ffffc080`aecfae10 fffff800`2b9d32e3 : fffff800`2b92ee58 fffff800`2bc0d45c ffffc080`aecfb7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc080`aecfaff0 fffff800`2b9e263f : fffff800`2bc0e080 00000000`00000000 ffffc080`aecfb1f0 fffff800`2b9c934e : nt!KiRaiseSecurityCheckFailure+0x323
ffffc080`aecfb180 fffff800`2b9e2d49 : fffff00d`6b450204 fffff800`2bc0e080 ffffc080`aecfb6f0 00000000`00000003 : nt!RtlpGetStackLimitsEx+0x1d65e7
ffffc080`aecfb1b0 fffff800`2b80b33e : fffff00d`6b4539f8 ffffc080`aecfbe30 fffff00d`6b4539f8 ffff970b`97cdc080 : nt!RtlDispatchException+0x1d6549
ffffc080`aecfb900 fffff800`2b9c3b52 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffc080`aecfbfb0 fffff800`2b9c3b20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff00d`6b4538b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
SYMBOL_NAME: nt!KiFastFailDispatch+d0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
BAD_OBJECT_HEADER (189)
The OBJECT_HEADER has been corrupted
Arguments:
Arg1: ffffe38573cac950, Pointer to bad OBJECT_HEADER
Arg2: 0000000000000000, Pointer to the resulting OBJECT_TYPE based on the TypeIndex in the OBJECT_HEADER
Arg3: 0000000000000000, The type index is corrupt.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6671
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10649
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 189
BUGCHECK_P1: ffffe38573cac950
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VoiceControlEngine.exe
STACK_TEXT:
fffffc01`c7f1e7d8 fffff802`7e7aaac0 : 00000000`00000189 ffffe385`73cac950 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffc01`c7f1e7e0 fffff802`7e5d944e : ffffe385`72f97380 00000000`00000000 ffffe385`696f4220 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0x1d1660
fffffc01`c7f1e870 fffff802`7e034fd1 : 00000000`00000001 ffff9401`40fc1180 00000000`00000000 00000000`00000000 : nt!ObReferenceObjectByHandle+0x2e
fffffc01`c7f1e8c0 fffff802`7e5d0db2 : 00000000`0000043c fffffc01`00000000 ffffe385`00000000 00000000`00000000 : nt!IopReferenceFileObject+0x31
fffffc01`c7f1e900 fffff802`7e5d0c36 : e38573f9`9230c805 00000000`0000062c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x162
fffffc01`c7f1ea20 fffff802`7e1d4558 : 00000000`00000001 fffffc01`c7f1eb01 00000000`00000000 fffffc01`c7f1ea00 : nt!NtDeviceIoControlFile+0x56
fffffc01`c7f1ea90 00000000`77d01cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`058ff2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d01cbc
SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+1d1660
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1139
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1d1660
FAILURE_BUCKET_ID: 0x189_nt!ObpReferenceObjectByHandleWithTag
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8bf3796f-7602-d49d-dd11-eaa45fa2179c}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffef3fbc0f4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff820c33309b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6514
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18232
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 7ffef3fbc0f4
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffff820c33309b80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvsphelper64.exe
STACK_TEXT:
ffff820c`333099b8 fffff804`085d4829 : 00000000`00000001 00007ffe`f3fbc0f4 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff820c`333099c0 fffff804`085d46d3 : ffffc28c`1bbbd0c0 00000025`f39ff2f8 ffff820c`33309b18 ffffffff`ffffd8f0 : nt!KiBugCheckDispatch+0x69
ffff820c`33309b00 00007ffe`f3fbc0f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000025`f39ff2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`f3fbc0f4
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_4_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {52cd694c-15ec-48c3-924a-3539560711db}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff89000000003a, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8021ec2494b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 12202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16413
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff89000000003a
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8021ec2494b
BUGCHECK_P4: 2
READ_ADDRESS: fffff8021d1713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8021d0283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8021d0283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff89000000003a
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: ffff8900d7e59c30 -- (.trap 0xffff8900d7e59c30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff908b925bc368 rbx=0000000000000000 rcx=ffff890000000032
rdx=ffff908b925bc010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021ec2494b rsp=ffff8900d7e59dc0 rbp=ffff8900d7e5a320
r8=ffff8900d7e5a080 r9=ffff8900d7e5a020 r10=ffff908b93452080
r11=ffff8900d7e59fa8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
Ntfs!NtfsCommonCreate+0x13b:
fffff802`1ec2494b 488b4108 mov rax,qword ptr [rcx+8] ds:ffff8900`0000003a=????????????????
Resetting default scope
STACK_TEXT:
ffff8900`d7e59988 fffff802`1cded55a : 00000000`00000050 ffff8900`0000003a 00000000`00000000 ffff8900`d7e59c30 : nt!KeBugCheckEx
ffff8900`d7e59990 fffff802`1cc5889f : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8900`0000003a : nt!MiSystemFault+0x1c60fa
ffff8900`d7e59a90 fffff802`1cdd0a5e : 00000000`00000000 ffff908b`90c476f0 ffff8900`d7e5a0a0 01000000`00100000 : nt!MmAccessFault+0x34f
ffff8900`d7e59c30 fffff802`1ec2494b : ffff8900`d7e5a1e8 fffff802`28eef39c 00000000`000001f8 ffffda8e`f3ffe030 : nt!KiPageFault+0x35e
ffff8900`d7e59dc0 fffff802`1ec2805e : ffff908b`90a95ad8 ffff8900`d7e5a080 ffff908b`90a95ad8 ffff908b`925bc010 : Ntfs!NtfsCommonCreate+0x13b
ffff8900`d7e59fb0 fffff802`1cc99db9 : ffff908b`89ab3030 ffff908b`925bc010 ffff908b`897b1000 ffff908b`89a9d6a0 : Ntfs!NtfsFsdCreate+0x1fe
ffff8900`d7e5a1e0 fffff802`1e0e55de : ffff908b`925bc010 ffff908b`925bc300 ffff908b`925bc010 ffff908b`9b04a260 : nt!IofCallDriver+0x59
ffff8900`d7e5a220 fffff802`1e11cd27 : ffff8900`d7e5a2e0 fffff802`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffff8900`d7e5a2a0 fffff802`1cc99db9 : ffff908b`9b04a200 fffff802`1d202745 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x307
ffff8900`d7e5a350 fffff802`1cc98e74 : 00000000`00000000 00000000`00000000 ffff908b`925bc3f8 ffff908b`925bc010 : nt!IofCallDriver+0x59
ffff8900`d7e5a390 fffff802`1d202dcb : ffff8900`d7e5a650 fffff802`1d202745 ffff8900`d7e5a5c0 ffff8900`d7e5a8a0 : nt!IoCallDriverWithTracing+0x34
ffff8900`d7e5a3e0 fffff802`1d209d9f : ffff908b`8987a930 ffff908b`8987a945 ffff908b`8efe9010 00000000`00000001 : nt!IopParseDevice+0x62b
ffff8900`d7e5a550 fffff802`1d208201 : ffff908b`8efe9000 ffff8900`d7e5a798 00000000`00000040 ffff908b`878f4bc0 : nt!ObpLookupObjectName+0x78f
ffff8900`d7e5a710 fffff802`1d24ee74 : ffff908b`00000001 00000009`289fe460 00000000`00000028 00000009`289fe430 : nt!ObOpenObjectByNameEx+0x201
ffff8900`d7e5a850 fffff802`1cdd4258 : ffff908b`93452080 ffff908b`94de25e0 ffff908b`93452080 ffff908b`999b1860 : nt!NtQueryFullAttributesFile+0x1b4
ffff8900`d7e5ab00 00007ffe`a46fe864 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000009`289fe3d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a46fe864
SYMBOL_NAME: Ntfs!NtfsCommonCreate+13b
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 13b
FAILURE_BUCKET_ID: AV_R_INVALID_Ntfs!NtfsCommonCreate
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {432c19e7-eed6-d291-3847-9570cd565c59}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.