DISM /Online /Cleanup-Image /RestoreHealth
sfc /scannow
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff802324a2a9a, Address of the instruction which caused the BugCheck
Arg3: fffff4089810f380, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x2bf7d3, File: 0x2bb588 - C:\ProgramData\Dbg\sym\Ntfs.sys\BB60C9C32d6000\Ntfs.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1703
Key : Analysis.Elapsed.mSec
Value: 1843
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 4445
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_Ntfs!NtfsCommonCreate
Key : Failure.Hash
Value: {43f3b5df-862f-e95d-d914-00fbbfb29f37}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff802324a2a9a
BUGCHECK_P3: fffff4089810f380
BUGCHECK_P4: 0
FILE_IN_CAB: 070923-9593-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
CONTEXT: fffff4089810f380 -- (.cxr 0xfffff4089810f380)
rax=0000000000050000 rbx=ffffb68137c56180 rcx=ffffe4037c93c340
rdx=ffffb6815326cb68 rsi=fffff40898110220 rdi=fffff40898110170
rip=fffff802324a2a9a rsp=fffff4089810fd80 rbp=0000000000000008
r8=0000000000000060 r9=0000000000000000 r10=ffffb6814773f5d0
r11=fffff4089810fd10 r12=ffffb6814717cd48 r13=0000000000000000
r14=fffff40898110170 r15=fffff4089811020c
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
Ntfs!NtfsCommonCreate+0x264a:
fffff802`324a2a9a 6683385c cmp word ptr [rax],5Ch ds:002b:00000000`00050000=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GTA5.exe
STACK_TEXT:
fffff408`9810fd80 fffff802`3249be7b : ffffb681`5326c780 fffff408`98110170 ffffb681`5326c780 00000000`00000000 : Ntfs!NtfsCommonCreate+0x264a
fffff408`98110060 fffff802`30411385 : ffffb681`37c56030 ffffb681`5326c780 fffff408`98110300 ffffb681`4773f5d0 : Ntfs!NtfsFsdCreate+0x1db
fffff408`981102e0 fffff802`2c2f710f : ffffb681`4773f600 fffff408`981103d0 fffff408`981103d9 fffff802`2c2f5f7a : nt!IofCallDriver+0x55
fffff408`98110320 fffff802`2c329f54 : fffff408`981103d0 ffffb681`4773f628 ffffb681`37b92c90 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff408`98110390 fffff802`30411385 : 00000000`00000000 ffffb681`37abe080 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
fffff408`98110440 fffff802`3040d944 : 00000000`00000003 ffffb681`5326c780 ffffb681`6d4e6f49 fffff802`3040d8b3 : nt!IofCallDriver+0x55
fffff408`98110480 fffff802`307ff85b : fffff408`98110740 ffffb681`37abe080 ffffb681`4773f668 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
fffff408`981104d0 fffff802`308152ee : ffffb681`37abe080 00000000`000000e0 ffffb681`47cf72a0 ffffb681`47cf7201 : nt!IopParseDevice+0x11bb
fffff408`98110640 fffff802`3080cfba : ffffb681`47cf7200 fffff408`981108a8 00000000`00000040 ffffb681`364fd380 : nt!ObpLookupObjectName+0x3fe
fffff408`98110810 fffff802`307fd37b : 00000000`00000000 000000bb`5cdfd660 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
fffff408`98110940 fffff802`307fbfa8 : 000000bb`5cdfd6d0 00000000`00100001 000000bb`5cdfd660 000000bb`5cdfd690 : nt!IopCreateFile+0x132b
fffff408`98110a00 fffff802`3060f7f8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
fffff408`98110a90 00007ffe`13cad714 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bb`5cdfd5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`13cad714
SYMBOL_NAME: Ntfs!NtfsCommonCreate+264a
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.3083
STACK_COMMAND: .cxr 0xfffff4089810f380 ; kb
BUCKET_ID_FUNC_OFFSET: 264a
FAILURE_BUCKET_ID: AV_Ntfs!NtfsCommonCreate
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {43f3b5df-862f-e95d-d914-00fbbfb29f37}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff803319948a4, Address of the instruction which caused the BugCheck
Arg3: ffffa10fd6984ca0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1483
Key : Analysis.Elapsed.mSec
Value: 3643
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 17445
Key : Analysis.Memory.CommitPeak.Mb
Value: 135
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_nt!SepRmDereferenceCap
Key : Failure.Hash
Value: {da51fe44-ac59-05e6-121e-def74a4ea0fa}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff803319948a4
BUGCHECK_P3: ffffa10fd6984ca0
BUGCHECK_P4: 0
FILE_IN_CAB: 070923-9484-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
CONTEXT: ffffa10fd6984ca0 -- (.cxr 0xffffa10fd6984ca0)
rax=0000000000000001 rbx=0000000000000001 rcx=0000000000000000
rdx=000000000000006e rsi=ffffa58a0a25a060 rdi=0000000000000000
rip=fffff803319948a4 rsp=ffffa10fd69856a0 rbp=ffffa10fd6985b80
r8=ffffffffffffff80 r9=0000000000000002 r10=0000000000000021
r11=00000000000001be r12=0000000000000000 r13=ffffa10fd6985858
r14=0000000000000001 r15=ffffa10fd698585c
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!SepRmDereferenceCap+0x4:
fffff803`319948a4 488b4920 mov rcx,qword ptr [rcx+20h] ds:002b:00000000`00000020=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
ffffa10f`d69856a0 fffff803`3182a200 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa10f`d6985b80 : nt!SepRmDereferenceCap+0x4
ffffa10f`d69856d0 fffff803`3162a7c5 : 00000000`00501802 ffffa10f`00000001 00000000`00000f33 00000000`00501802 : nt!SeAccessCheckByTypeWithAdminlessChecks+0x201180
ffffa10f`d6985990 fffff803`3162abb7 : 00000083`33a7e840 00000000`00000000 00000000`00000ca8 fffff803`00000001 : nt!SeAccessCheckByType+0x115
ffffa10f`d6985a20 fffff803`3180ff9d : ffff800d`6105b080 fffff803`00000008 ffff800d`6105b000 00000083`33a7e7f8 : nt!NtAccessCheck+0x57
ffffa10f`d6985a90 00007fff`ebeed0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3f2
00000083`33a7e7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`ebeed0b4
SYMBOL_NAME: nt!SepRmDereferenceCap+4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .cxr 0xffffa10fd6984ca0 ; kb
BUCKET_ID_FUNC_OFFSET: 4
FAILURE_BUCKET_ID: AV_nt!SepRmDereferenceCap
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {da51fe44-ac59-05e6-121e-def74a4ea0fa}
Followup: MachineOwner
---------
DISM /Online /Cleanup-Image /RestoreHealth
sfc /scannow
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff802324a2a9a, Address of the instruction which caused the BugCheck
Arg3: fffff4089810f380, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Check Image - Checksum mismatch - Dump: 0x2bf7d3, File: 0x2bb588 - C:\ProgramData\Dbg\sym\Ntfs.sys\BB60C9C32d6000\Ntfs.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1703
Key : Analysis.Elapsed.mSec
Value: 1843
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 4445
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_Ntfs!NtfsCommonCreate
Key : Failure.Hash
Value: {43f3b5df-862f-e95d-d914-00fbbfb29f37}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff802324a2a9a
BUGCHECK_P3: fffff4089810f380
BUGCHECK_P4: 0
FILE_IN_CAB: 070923-9593-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
CONTEXT: fffff4089810f380 -- (.cxr 0xfffff4089810f380)
rax=0000000000050000 rbx=ffffb68137c56180 rcx=ffffe4037c93c340
rdx=ffffb6815326cb68 rsi=fffff40898110220 rdi=fffff40898110170
rip=fffff802324a2a9a rsp=fffff4089810fd80 rbp=0000000000000008
r8=0000000000000060 r9=0000000000000000 r10=ffffb6814773f5d0
r11=fffff4089810fd10 r12=ffffb6814717cd48 r13=0000000000000000
r14=fffff40898110170 r15=fffff4089811020c
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
Ntfs!NtfsCommonCreate+0x264a:
fffff802`324a2a9a 6683385c cmp word ptr [rax],5Ch ds:002b:00000000`00050000=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GTA5.exe
STACK_TEXT:
fffff408`9810fd80 fffff802`3249be7b : ffffb681`5326c780 fffff408`98110170 ffffb681`5326c780 00000000`00000000 : Ntfs!NtfsCommonCreate+0x264a
fffff408`98110060 fffff802`30411385 : ffffb681`37c56030 ffffb681`5326c780 fffff408`98110300 ffffb681`4773f5d0 : Ntfs!NtfsFsdCreate+0x1db
fffff408`981102e0 fffff802`2c2f710f : ffffb681`4773f600 fffff408`981103d0 fffff408`981103d9 fffff802`2c2f5f7a : nt!IofCallDriver+0x55
fffff408`98110320 fffff802`2c329f54 : fffff408`981103d0 ffffb681`4773f628 ffffb681`37b92c90 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff408`98110390 fffff802`30411385 : 00000000`00000000 ffffb681`37abe080 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
fffff408`98110440 fffff802`3040d944 : 00000000`00000003 ffffb681`5326c780 ffffb681`6d4e6f49 fffff802`3040d8b3 : nt!IofCallDriver+0x55
fffff408`98110480 fffff802`307ff85b : fffff408`98110740 ffffb681`37abe080 ffffb681`4773f668 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
fffff408`981104d0 fffff802`308152ee : ffffb681`37abe080 00000000`000000e0 ffffb681`47cf72a0 ffffb681`47cf7201 : nt!IopParseDevice+0x11bb
fffff408`98110640 fffff802`3080cfba : ffffb681`47cf7200 fffff408`981108a8 00000000`00000040 ffffb681`364fd380 : nt!ObpLookupObjectName+0x3fe
fffff408`98110810 fffff802`307fd37b : 00000000`00000000 000000bb`5cdfd660 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1fa
fffff408`98110940 fffff802`307fbfa8 : 000000bb`5cdfd6d0 00000000`00100001 000000bb`5cdfd660 000000bb`5cdfd690 : nt!IopCreateFile+0x132b
fffff408`98110a00 fffff802`3060f7f8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtOpenFile+0x58
fffff408`98110a90 00007ffe`13cad714 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bb`5cdfd5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`13cad714
SYMBOL_NAME: Ntfs!NtfsCommonCreate+264a
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.3083
STACK_COMMAND: .cxr 0xfffff4089810f380 ; kb
BUCKET_ID_FUNC_OFFSET: 264a
FAILURE_BUCKET_ID: AV_Ntfs!NtfsCommonCreate
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {43f3b5df-862f-e95d-d914-00fbbfb29f37}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff803319948a4, Address of the instruction which caused the BugCheck
Arg3: ffffa10fd6984ca0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1483
Key : Analysis.Elapsed.mSec
Value: 3643
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 17445
Key : Analysis.Memory.CommitPeak.Mb
Value: 135
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_nt!SepRmDereferenceCap
Key : Failure.Hash
Value: {da51fe44-ac59-05e6-121e-def74a4ea0fa}
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff803319948a4
BUGCHECK_P3: ffffa10fd6984ca0
BUGCHECK_P4: 0
FILE_IN_CAB: 070923-9484-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
CONTEXT: ffffa10fd6984ca0 -- (.cxr 0xffffa10fd6984ca0)
rax=0000000000000001 rbx=0000000000000001 rcx=0000000000000000
rdx=000000000000006e rsi=ffffa58a0a25a060 rdi=0000000000000000
rip=fffff803319948a4 rsp=ffffa10fd69856a0 rbp=ffffa10fd6985b80
r8=ffffffffffffff80 r9=0000000000000002 r10=0000000000000021
r11=00000000000001be r12=0000000000000000 r13=ffffa10fd6985858
r14=0000000000000001 r15=ffffa10fd698585c
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!SepRmDereferenceCap+0x4:
fffff803`319948a4 488b4920 mov rcx,qword ptr [rcx+20h] ds:002b:00000000`00000020=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
ffffa10f`d69856a0 fffff803`3182a200 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa10f`d6985b80 : nt!SepRmDereferenceCap+0x4
ffffa10f`d69856d0 fffff803`3162a7c5 : 00000000`00501802 ffffa10f`00000001 00000000`00000f33 00000000`00501802 : nt!SeAccessCheckByTypeWithAdminlessChecks+0x201180
ffffa10f`d6985990 fffff803`3162abb7 : 00000083`33a7e840 00000000`00000000 00000000`00000ca8 fffff803`00000001 : nt!SeAccessCheckByType+0x115
ffffa10f`d6985a20 fffff803`3180ff9d : ffff800d`6105b080 fffff803`00000008 ffff800d`6105b000 00000083`33a7e7f8 : nt!NtAccessCheck+0x57
ffffa10f`d6985a90 00007fff`ebeed0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3f2
00000083`33a7e7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`ebeed0b4
SYMBOL_NAME: nt!SepRmDereferenceCap+4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .cxr 0xffffa10fd6984ca0 ; kb
BUCKET_ID_FUNC_OFFSET: 4
FAILURE_BUCKET_ID: AV_nt!SepRmDereferenceCap
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {da51fe44-ac59-05e6-121e-def74a4ea0fa}
Followup: MachineOwner
---------
Şu an ikisi de takılı mı?
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.