Attığınız dosyada sorunu
ntoskrnl.exe
değil
ntkrnlmp.exe
çıkartmış. HDD'inize sağlık testi yapar mısınız?
Kayıt defteri sorunu gördüm.
@SenseiEno dediklerini yapmadan önce kayıt defteri yedeğini aldınız değil mi? Onu geri yükleyin. Dökümünü aşağıya bıraktım.
[CODE title="İçerik"]************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`7ce00000 PsLoadedModuleList = 0xfffff803`7da2a310
Debug session time: Sun Jul 4 13:20:03.040 2021 (UTC + 3:00)
System Uptime: 0 days 0:19:47.784
Loading Kernel Symbols
...............................................................
................................................................
..............................................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`7d1f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff9409`e5f76e10=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc38cc23eb880, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8037d02a899, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4937
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 52830
Key : Analysis.Init.CPU.mSec
Value: 468
Key : Analysis.Init.Elapsed.mSec
Value: 23783
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffc38cc23eb880
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8037d02a899
WRITE_ADDRESS: fffff8037dafb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc38cc23eb880
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff9409e5f76f50 -- (.trap 0xffff9409e5f76f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc3865c7031b0 rbx=0000000000000000 rcx=fffff8037a603180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037d02a899 rsp=ffff9409e5f770e0 rbp=ffff9409e5f771b9
r8=ffff8f0000000000 r9=0000000000000000 r10=ffffff7fbfdfe7f8
r11=ffff9d033c9a7720 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiPfPutPagesInTransition+0x469:
fffff803`7d02a899 4a895ce030 mov qword ptr [rax+r12*8+30h],rbx ds:ffffc386`5c7031e0=000000000025b073
Resetting default scope
STACK_TEXT:
ffff9409`e5f76e08 fffff803`7d206569 : 00000000`0000000a ffffc38c`c23eb880 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff9409`e5f76e10 fffff803`7d202869 : 00000000`00000000 00000000`00000001 ffff9d03`3c9a7708 00000000`00000600 : nt!KiBugCheckDispatch+0x69
ffff9409`e5f76f50 fffff803`7d02a899 : ffffffff`ffffffff ffff9409`e5f77160 00000000`00000000 ffff9d03`3c9a7720 : nt!KiPageFault+0x469
ffff9409`e5f770e0 fffff803`7d40eb38 : ffffc386`5ba2b480 00000000`00000000 00000000`00000000 00000000`00000003 : nt!MiPfPutPagesInTransition+0x469
ffff9409`e5f77220 fffff803`7d40f8e8 : ffff9d03`415d5020 00000000`00000000 00000000`00000000 ffffc386`59ee3c10 : nt!MmPrefetchPagesEx+0x130
ffff9409`e5f77290 fffff803`7d465755 : ffff9409`00000000 ffff9409`00000010 ffff9d03`00000000 00000000`00000004 : nt!PfpPrefetchFilesTrickle+0x2a8
ffff9409`e5f77380 fffff803`7d4653f2 : ffff9d03`400c6000 ffff9d03`400c6000 ffff9409`e5f775a0 00000000`00000000 : nt!PfpPrefetchRequestPerform+0x299
ffff9409`e5f774f0 fffff803`7d49bd5d : 00000000`00000001 00000000`00000201 ffffc386`5a8218e0 ffff9d03`400c6000 : nt!PfpPrefetchRequest+0x132
ffff9409`e5f77570 fffff803`7d49ac2d : ffff9409`00000000 00000000`00000000 ffffc386`5a55a080 ffffffff`ffffff01 : nt!PfSetSuperfetchInformation+0x155
ffff9409`e5f77670 fffff803`7d205fb5 : ffffc386`5a55a080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtSetSystemInformation+0x9bd
ffff9409`e5f77a00 00007ff9`c962f2c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000003a`dce7f6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c962f2c4
SYMBOL_NAME: nt!MiPfPutPagesInTransition+469
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_nt!MiPfPutPagesInTransition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4722b20-c317-dab0-0f83-fcc7584d2184}
Followup: MachineOwner
---------
[/CODE]