lordnicon1979
Newbie
- Registriert
- Okt. 2011
- Beiträge
- 3
Hi,
ich hoffe das Angebot mit der Hilfe steht noch .. auch wenn ich selber nicht gemeint gewesen bin.
ich habe hier ein übles problem mit einem Server und bin auch diesen Beitrag aufmerksam geworden.
Ich habe mich an die Anweisung gehalten und auch einen Text vom Debugger erhalten .. aber ich kann damit nichts anfangen ..
ich hoffe ja hier hilfe zu erhalten ..
Ich schicke einfach mal den Text des Debuggers mit !
Vielen DAnk schon mal ..
Gruß
Lordy
Text:
Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini100511-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 6002 (Service Pack 2) MP (8 procs) Free x64
Product: LanManNt, suite: SmallBusiness TerminalServer SmallBusinessRestricted SingleUserTS
Built by: 6002.18327.amd64fre.vistasp2_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02262000 PsLoadedModuleList = 0xfffff800`02426dd0
Debug session time: Wed Oct 5 10:31:25.060 2011 (GMT+2)
System Uptime: 0 days 18:53:15.970
Loading Kernel Symbols
...............................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 34, {5077c, fffffa6001d93668, fffffa6001d93040, fffffa60012ecdc4}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFilterCallbackAcquireForCreateSection+24 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 000000000005077c
Arg2: fffffa6001d93668
Arg3: fffffa6001d93040
Arg4: fffffa60012ecdc4
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'mrxsmb' and 'USBD.SYS' overlap
EXCEPTION_RECORD: fffffa6001d93668 -- (.exr 0xfffffa6001d93668)
ExceptionAddress: fffffa60012ecdc4 (Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x0000000000000024)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
CONTEXT: fffffa6001d93040 -- (.cxr 0xfffffa6001d93040)
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa6001d93978
rdx=0000000000000000 rsi=0000000000000126 rdi=fffffa6001d93978
rip=fffffa60012ecdc4 rsp=fffffa6001d938a0 rbp=fffffa8014dd1050
r8=fffffa60012ecda0 r9=fffffa6001d93940 r10=fffffa800cf34ef0
r11=0000000000000000 r12=0000000000000000 r13=fffffa6001d93970
r14=fffffa8014dd1000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x24:
fffffa60`012ecdc4 48837b1000 cmp qword ptr [rbx+10h],0 ds:002b:00000000`00000010=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000010
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002489080
0000000000000010
FOLLOWUP_IP:
Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
fffffa60`012ecdc4 48837b1000 cmp qword ptr [rbx+10h],0
BUGCHECK_STR: 0x34
LAST_CONTROL_TRANSFER: from fffff800022e2c06 to fffffa60012ecdc4
STACK_TEXT:
fffffa60`01d938a0 fffff800`022e2c06 : fffffa60`01d93978 fffffa60`01d93900 fffffa80`0d578030 fffffa80`0df5ea40 : Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x24
fffffa60`01d938e0 fffff800`02518795 : 00000000`00000000 00000000`00000000 fffffa60`01d93978 fffffa60`012ecda0 : nt!FsFilterPerformCallbacks+0xce
fffffa60`01d93940 fffff800`022a68ab : fffffa80`15a49450 00000000`00000000 fffffa80`14dd1050 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0xe1
fffffa60`01d93be0 fffff800`022a6f0a : fffffa60`00000000 fffffa60`005ec7f0 fffffa60`00000000 00000000`00000000 : nt!CcWriteBehind+0x347
fffffa60`01d93c70 fffff800`022c38c3 : fffffa80`0c6139c0 fffff800`0245f8c0 fffffa80`13bcfc90 00000000`00000000 : nt!CcWorkerThread+0x186
fffffa60`01d93cf0 fffff800`024c6f77 : fffffa80`0c6139c0 01c85a65`639ce77a fffffa80`0c5fdbb0 00000000`00000080 : nt!ExpWorkerThread+0xfb
fffffa60`01d93d50 fffff800`022f9636 : fffffa60`005ec180 fffffa80`0c5fdbb0 fffffa60`005f5d40 fffffa60`005ec7f0 : nt!PspSystemThreadStartup+0x57
fffffa60`01d93d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49e022ca
STACK_COMMAND: .cxr 0xfffffa6001d93040 ; kb
FAILURE_BUCKET_ID: X64_0x34_Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
BUCKET_ID: X64_0x34_Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 000000000005077c
Arg2: fffffa6001d93668
Arg3: fffffa6001d93040
Arg4: fffffa60012ecdc4
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'mrxsmb' and 'USBD.SYS' overlap
EXCEPTION_RECORD: fffffa6001d93668 -- (.exr 0xfffffa6001d93668)
ExceptionAddress: fffffa60012ecdc4 (Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x0000000000000024)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
CONTEXT: fffffa6001d93040 -- (.cxr 0xfffffa6001d93040)
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa6001d93978
rdx=0000000000000000 rsi=0000000000000126 rdi=fffffa6001d93978
rip=fffffa60012ecdc4 rsp=fffffa6001d938a0 rbp=fffffa8014dd1050
r8=fffffa60012ecda0 r9=fffffa6001d93940 r10=fffffa800cf34ef0
r11=0000000000000000 r12=0000000000000000 r13=fffffa6001d93970
r14=fffffa8014dd1000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x24:
fffffa60`012ecdc4 48837b1000 cmp qword ptr [rbx+10h],0 ds:002b:00000000`00000010=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000010
READ_ADDRESS: 0000000000000010
FOLLOWUP_IP:
Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
fffffa60`012ecdc4 48837b1000 cmp qword ptr [rbx+10h],0
BUGCHECK_STR: 0x34
LAST_CONTROL_TRANSFER: from fffff800022e2c06 to fffffa60012ecdc4
STACK_TEXT:
fffffa60`01d938a0 fffff800`022e2c06 : fffffa60`01d93978 fffffa60`01d93900 fffffa80`0d578030 fffffa80`0df5ea40 : Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x24
fffffa60`01d938e0 fffff800`02518795 : 00000000`00000000 00000000`00000000 fffffa60`01d93978 fffffa60`012ecda0 : nt!FsFilterPerformCallbacks+0xce
fffffa60`01d93940 fffff800`022a68ab : fffffa80`15a49450 00000000`00000000 fffffa80`14dd1050 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0xe1
fffffa60`01d93be0 fffff800`022a6f0a : fffffa60`00000000 fffffa60`005ec7f0 fffffa60`00000000 00000000`00000000 : nt!CcWriteBehind+0x347
fffffa60`01d93c70 fffff800`022c38c3 : fffffa80`0c6139c0 fffff800`0245f8c0 fffffa80`13bcfc90 00000000`00000000 : nt!CcWorkerThread+0x186
fffffa60`01d93cf0 fffff800`024c6f77 : fffffa80`0c6139c0 01c85a65`639ce77a fffffa80`0c5fdbb0 00000000`00000080 : nt!ExpWorkerThread+0xfb
fffffa60`01d93d50 fffff800`022f9636 : fffffa60`005ec180 fffffa80`0c5fdbb0 fffffa60`005f5d40 fffffa60`005ec7f0 : nt!PspSystemThreadStartup+0x57
fffffa60`01d93d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49e022ca
STACK_COMMAND: .cxr 0xfffffa6001d93040 ; kb
FAILURE_BUCKET_ID: X64_0x34_Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
BUCKET_ID: X64_0x34_Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
Followup: MachineOwner
---------
ich hoffe das Angebot mit der Hilfe steht noch .. auch wenn ich selber nicht gemeint gewesen bin.
ich habe hier ein übles problem mit einem Server und bin auch diesen Beitrag aufmerksam geworden.
Ich habe mich an die Anweisung gehalten und auch einen Text vom Debugger erhalten .. aber ich kann damit nichts anfangen ..
ich hoffe ja hier hilfe zu erhalten ..
Ich schicke einfach mal den Text des Debuggers mit !
Vielen DAnk schon mal ..
Gruß
Lordy
Text:
Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini100511-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 6002 (Service Pack 2) MP (8 procs) Free x64
Product: LanManNt, suite: SmallBusiness TerminalServer SmallBusinessRestricted SingleUserTS
Built by: 6002.18327.amd64fre.vistasp2_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02262000 PsLoadedModuleList = 0xfffff800`02426dd0
Debug session time: Wed Oct 5 10:31:25.060 2011 (GMT+2)
System Uptime: 0 days 18:53:15.970
Loading Kernel Symbols
...............................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 34, {5077c, fffffa6001d93668, fffffa6001d93040, fffffa60012ecdc4}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFilterCallbackAcquireForCreateSection+24 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 000000000005077c
Arg2: fffffa6001d93668
Arg3: fffffa6001d93040
Arg4: fffffa60012ecdc4
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'mrxsmb' and 'USBD.SYS' overlap
EXCEPTION_RECORD: fffffa6001d93668 -- (.exr 0xfffffa6001d93668)
ExceptionAddress: fffffa60012ecdc4 (Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x0000000000000024)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
CONTEXT: fffffa6001d93040 -- (.cxr 0xfffffa6001d93040)
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa6001d93978
rdx=0000000000000000 rsi=0000000000000126 rdi=fffffa6001d93978
rip=fffffa60012ecdc4 rsp=fffffa6001d938a0 rbp=fffffa8014dd1050
r8=fffffa60012ecda0 r9=fffffa6001d93940 r10=fffffa800cf34ef0
r11=0000000000000000 r12=0000000000000000 r13=fffffa6001d93970
r14=fffffa8014dd1000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x24:
fffffa60`012ecdc4 48837b1000 cmp qword ptr [rbx+10h],0 ds:002b:00000000`00000010=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000010
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002489080
0000000000000010
FOLLOWUP_IP:
Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
fffffa60`012ecdc4 48837b1000 cmp qword ptr [rbx+10h],0
BUGCHECK_STR: 0x34
LAST_CONTROL_TRANSFER: from fffff800022e2c06 to fffffa60012ecdc4
STACK_TEXT:
fffffa60`01d938a0 fffff800`022e2c06 : fffffa60`01d93978 fffffa60`01d93900 fffffa80`0d578030 fffffa80`0df5ea40 : Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x24
fffffa60`01d938e0 fffff800`02518795 : 00000000`00000000 00000000`00000000 fffffa60`01d93978 fffffa60`012ecda0 : nt!FsFilterPerformCallbacks+0xce
fffffa60`01d93940 fffff800`022a68ab : fffffa80`15a49450 00000000`00000000 fffffa80`14dd1050 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0xe1
fffffa60`01d93be0 fffff800`022a6f0a : fffffa60`00000000 fffffa60`005ec7f0 fffffa60`00000000 00000000`00000000 : nt!CcWriteBehind+0x347
fffffa60`01d93c70 fffff800`022c38c3 : fffffa80`0c6139c0 fffff800`0245f8c0 fffffa80`13bcfc90 00000000`00000000 : nt!CcWorkerThread+0x186
fffffa60`01d93cf0 fffff800`024c6f77 : fffffa80`0c6139c0 01c85a65`639ce77a fffffa80`0c5fdbb0 00000000`00000080 : nt!ExpWorkerThread+0xfb
fffffa60`01d93d50 fffff800`022f9636 : fffffa60`005ec180 fffffa80`0c5fdbb0 fffffa60`005f5d40 fffffa60`005ec7f0 : nt!PspSystemThreadStartup+0x57
fffffa60`01d93d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49e022ca
STACK_COMMAND: .cxr 0xfffffa6001d93040 ; kb
FAILURE_BUCKET_ID: X64_0x34_Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
BUCKET_ID: X64_0x34_Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 000000000005077c
Arg2: fffffa6001d93668
Arg3: fffffa6001d93040
Arg4: fffffa60012ecdc4
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'mrxsmb' and 'USBD.SYS' overlap
EXCEPTION_RECORD: fffffa6001d93668 -- (.exr 0xfffffa6001d93668)
ExceptionAddress: fffffa60012ecdc4 (Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x0000000000000024)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
CONTEXT: fffffa6001d93040 -- (.cxr 0xfffffa6001d93040)
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa6001d93978
rdx=0000000000000000 rsi=0000000000000126 rdi=fffffa6001d93978
rip=fffffa60012ecdc4 rsp=fffffa6001d938a0 rbp=fffffa8014dd1050
r8=fffffa60012ecda0 r9=fffffa6001d93940 r10=fffffa800cf34ef0
r11=0000000000000000 r12=0000000000000000 r13=fffffa6001d93970
r14=fffffa8014dd1000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x24:
fffffa60`012ecdc4 48837b1000 cmp qword ptr [rbx+10h],0 ds:002b:00000000`00000010=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000010
READ_ADDRESS: 0000000000000010
FOLLOWUP_IP:
Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
fffffa60`012ecdc4 48837b1000 cmp qword ptr [rbx+10h],0
BUGCHECK_STR: 0x34
LAST_CONTROL_TRANSFER: from fffff800022e2c06 to fffffa60012ecdc4
STACK_TEXT:
fffffa60`01d938a0 fffff800`022e2c06 : fffffa60`01d93978 fffffa60`01d93900 fffffa80`0d578030 fffffa80`0df5ea40 : Ntfs!NtfsFilterCallbackAcquireForCreateSection+0x24
fffffa60`01d938e0 fffff800`02518795 : 00000000`00000000 00000000`00000000 fffffa60`01d93978 fffffa60`012ecda0 : nt!FsFilterPerformCallbacks+0xce
fffffa60`01d93940 fffff800`022a68ab : fffffa80`15a49450 00000000`00000000 fffffa80`14dd1050 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0xe1
fffffa60`01d93be0 fffff800`022a6f0a : fffffa60`00000000 fffffa60`005ec7f0 fffffa60`00000000 00000000`00000000 : nt!CcWriteBehind+0x347
fffffa60`01d93c70 fffff800`022c38c3 : fffffa80`0c6139c0 fffff800`0245f8c0 fffffa80`13bcfc90 00000000`00000000 : nt!CcWorkerThread+0x186
fffffa60`01d93cf0 fffff800`024c6f77 : fffffa80`0c6139c0 01c85a65`639ce77a fffffa80`0c5fdbb0 00000000`00000080 : nt!ExpWorkerThread+0xfb
fffffa60`01d93d50 fffff800`022f9636 : fffffa60`005ec180 fffffa80`0c5fdbb0 fffffa60`005f5d40 fffffa60`005ec7f0 : nt!PspSystemThreadStartup+0x57
fffffa60`01d93d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49e022ca
STACK_COMMAND: .cxr 0xfffffa6001d93040 ; kb
FAILURE_BUCKET_ID: X64_0x34_Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
BUCKET_ID: X64_0x34_Ntfs!NtfsFilterCallbackAcquireForCreateSection+24
Followup: MachineOwner
---------