drive.google.com
Minidump üzerinde görünen bir aygıt donanım kimliği ilginçtir ki burada görünmüyor. Şimdi sizden iki şey isteyeceğim. Birisi sisteme yüklenmiş tüm uygulamaların olduğu bir ekran alıntısı paylaşmanız. İkincisi de Olay Görüntüleyicisi'nde sistem raporunu paylaşmanızdır. Olay Görüntüleyicisi raporunun paylaşımı hakkında detaylı bilgi için de aşağıdaki rehberi inceleyebilirsiniz.
Windows + R tıklayıp boşluğa eventvwr yazıp enter'a basın. Sizden istenilen*** hangi bölüm ise 1 yazılı yerden oraya sağ tıklayın. Eğer Yönetim olaylarından alacaksanız ona sağ tıklayıp resimdeki 2 olarak işaretlenmişi seçin. **İstenilen: Uygulama, Kur ve Sistem çıktılarını paylaşın. Eğer...
www.technopat.net
[CODE title="041022-16656-01.dmp"]Start memory scan : 0xffff8f8023332e18 ($csp)
End memory scan : 0xffff8f8023333000 (ISR Stack Base)
0xffff8f8023332e38 : 0xfffff80331afb320 : nt!KeDpcWatchdogProfileGlobalTriageBlock
0xffff8f8023332e78 : 0xfffff80331016953 : nt!KeClockInterruptNotify+0x453
0xffff8f8023332f28 : 0xfffff8033101643a : nt!HalpTimerClockIpiRoutine+0x1a
0xffff8f8023332f38 : 0xffff8c8d4fca6e90 : !du "host.exeVolume5\Windows\System32"
0xffff8f8023332f58 : 0xfffff803310de215 : nt!KiCallInterruptServiceRoutine+0xa5
0xffff8f8023332fa8 : 0xfffff803311f934a : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
0xffff8f8023332fb0 : 0xffff8c8d4fca6e90 : !du "host.exeVolume5\Windows\System32"
0xffff8f8023332fd8 : 0xfffff803311f98b7 : nt!KiInterruptDispatchNoLockNoEtw+0x37[/CODE]
[CODE title="041022-13000-01.dmp"]Start memory scan : 0xffffc9008fccff58 ($csp)
End memory scan : 0xffffc9008fcd2000 (Kernel Stack Base)
0xffffc9008fcd0058 : 0xfffff8061e69f550 : nt!MmAccessFault+0x400
0xffffc9008fcd0088 : 0xfffff806220fdac3 : Ntfs!LfsWriteLogRecordIntoLogPage+0x293
0xffffc9008fcd00b8 : 0xfffff8061e7242a5 : nt!ExReleaseAutoExpandPushLockShared+0x85
0xffffc9008fcd0108 : 0xfffff80621ff3ece : Ntfs!NtfsLookupNtfsMcbEntryWithSyncFlag+0x14e
0xffffc9008fcd01f8 : 0xfffff8061e805a5e : nt!KiPageFault+0x35e
0xffffc9008fcd0200 : 0x0000005000000050 : Trap @ ffffc9008fcd0200
0xffffc9008fcd0248 : 0xffff898a4faab1cc : !du "3320%131./322.02002/102/,1-.(""
0xffffc9008fcd0290 : 0x0047005f00360036 : !du "66_Gn_xEUx5bePnKmw2[1].j"
0xffffc9008fcd0298 : 0x00450078005f006e : !du "n_xEUx5bePnKmw2[1].j"
0xffffc9008fcd02a0 : 0x0062003500780055 : !du "Ux5bePnKmw2[1].j"
0xffffc9008fcd02a8 : 0x004b006e00500065 : !du "ePnKmw2[1].j"
0xffffc9008fcd02b0 : 0x005b00320077006d : !du "mw2[1].j"
0xffffc9008fcd02e8 : 0xfffff8061e68d04c : nt!ExAllocateHeapPool+0x83c
0xffffc9008fcd03c8 : 0xfffff8061e648d7a : nt!MiAddViewsForSection+0xea
0xffffc9008fcd0468 : 0xfffff8061edb2149 : nt!ExFreePool+0x9
0xffffc9008fcd0498 : 0xfffff8061ea0a19c : nt!MiReleaseReadListResources+0x80
0xffffc9008fcd04c8 : 0xfffff8061e9fb62d : nt!MiPfPrepareReadList+0x51d
0xffffc9008fcd0550 : 0xfffff8061f050c00 : nt!MiSystemPartition
0xffffc9008fcd0568 : 0xfffff8061e648006 : nt!MiAllocatePool+0x86
0xffffc9008fcd05b8 : 0xfffff8061ea0a9ee : nt!MmPrefetchPagesEx+0x96
0xffffc9008fcd0628 : 0xfffff8061ea0a94c : nt!MmPrefetchPages+0xc
0xffffc9008fcd0658 : 0xfffff80621fec3a1 : Ntfs!NtfsPerformPrefetch+0x151
0xffffc9008fcd06c8 : 0xfffff806220f7c0a : Ntfs!NtfsReadUsnJournal+0x3fa
0xffffc9008fcd0868 : 0xfffff806220f76ee : Ntfs!NtOfsPostNewLength+0x11a
0xffffc9008fcd08f0 : 0xfffff80622075000 : Ntfs!WPP_GLOBAL_Control
0xffffc9008fcd0918 : 0xfffff806220cdf4f : Ntfs!NtfsCommitCurrentTransaction+0x28f
0xffffc9008fcd0958 : 0xfffff8062208ffc0 : Ntfs!NtfsLarge0
0xffffc9008fcd09b8 : 0xfffff8062210df7c : Ntfs!NtfsCheckpointCurrentTransaction+0x50
0xffffc9008fcd0ed0 : 0xffff898a51829af4 : !du "viewmodelflow_a_Oi66_Gn_xEUx5bePnKmw2[1].jsxml"
0xffffc9008fcd0f88 : 0xfffff8062f5bf7a9 : luafv!LuafvReadAndCacheSecurityDescriptor+0x99
0xffffc9008fcd0f98 : 0xfffff8062f5bfeb2 : luafv!LuafvFindTableNode+0x312
0xffffc9008fcd0fb8 : 0xfffff8061e69afdb : nt!KeQueryCurrentStackInformationEx+0x8b
0xffffc9008fcd0fe8 : 0xffff898a51829af4 : !du "viewmodelflow_a_Oi66_Gn_xEUx5bePnKmw2[1].jsxml"
0xffffc9008fcd1078 : 0xfffff806220c6bdb : Ntfs!NtfsFsdCreate+0x1db
0xffffc9008fcd1168 : 0xfffff8061edb21c4 : nt!ExAllocatePoolWithTag+0x64
0xffffc9008fcd1178 : 0xfffff80621f07090 : fileinfo!FIUnknown
0xffffc9008fcd1198 : 0xffff898a51829a00 : !du "\Users\defaultuser100001\AppData\Local\Packages\Microsoft.Windows.CloudExperienc..."
0xffffc9008fcd11a8 : 0xffff898a51829a00 : !du "\Users\defaultuser100001\AppData\Local\Packages\Microsoft.Windows.CloudExperienc..."
0xffffc9008fcd12f8 : 0xfffff8061e68f835 : nt!IofCallDriver+0x55
0xffffc9008fcd1338 : 0xfffff8061c006fcf : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
0xffffc9008fcd1358 : 0xfffff8061c005fc5 : FLTMGR!FltpPassThroughInternal+0x265
0xffffc9008fcd1368 : 0xfffff8061c007b00 : FLTMGR!FltpPerformFastIoCall+0x570
0xffffc9008fcd13a8 : 0xfffff8061c03c124 : FLTMGR!FltpCreate+0x324
0xffffc9008fcd13e8 : 0xfffff8061c01ca02 : !du "$Volume"
0xffffc9008fcd1458 : 0xfffff8061e68f835 : nt!IofCallDriver+0x55
0xffffc9008fcd1498 : 0xfffff8061e690e34 : nt!IoCallDriverWithTracing+0x34
0xffffc9008fcd14b8 : 0xfffff8061e690a63 : nt!RtlCopyUnicodeString+0x43
0xffffc9008fcd1540 : 0xfffff8061e40a458 : nt!RtlpRestrictedMapping
0xffffc9008fcd1650 : 0xfffff8061ea779b0 : nt!IopParseDevice
0xffffc9008fcd1658 : 0xfffff8061e9f31ee : nt!ObpLookupObjectName+0x3fe
0xffffc9008fcd16d8 : 0xffff898a51e50b2e : !du "\Users\defaultuser100001\AppData\Local\Packages\microsoft.windows.cloudexperienc..."
0xffffc9008fcd1728 : 0xffff898a51e50b10 : !du "HarddiskVolume5\Users\defaultuser100001\AppData\Local\Packages\microsoft.windows..."
0xffffc9008fcd1828 : 0xfffff8061ea961ea : nt!ObOpenObjectByNameEx+0x1fa
0xffffc9008fcd18d0 : 0xffff898a51e50b00 : !du "\Device\HarddiskVolume5\Users\defaultuser100001\AppData\Local\Packages\microsoft..."
0xffffc9008fcd1958 : 0xfffff8061ea16f9f : nt!IopCreateFile+0x40f
0xffffc9008fcd19f8 : 0xfffff8061ea16b79 : nt!NtCreateFile+0x79
0xffffc9008fcd1a80 : 0xfffff8061ea16b00 : nt!NtCreateFile
0xffffc9008fcd1a88 : 0xfffff8061e8092b8 : nt!KiSystemServiceCopyEnd+0x28
0xffffc9008fcd1af8 : 0xfffff8061e8092b8 : nt!KiSystemServiceCopyEnd+0x28
0xffffc9008fcd1b00 : 0xffffca0f30088040 : Trap @ ffffc9008fcd1b00[/CODE]