Cpt.semihaksoy
Hectopat
- Katılım
- 12 Mart 2017
- Mesajlar
- 155
Daha fazla
- Cinsiyet
- Erkek
7C02v39 Sürümünü yükleyin.Kullandığınız VPN uygulamasını kaldırın. (sadece Opera'nın içindeki varsa bir süreliğine Opera'yı kaldırın.)
GameLoop'u ve CPU-Z'yi de kaldırın.
Bağlı tüm USB cihazları çıkarın. Klavye ve Mouse'u başka porta takın.
Kullandığınız BIOS beta sürüm. Beta sürüm kullanmanızı önermem.7C02v39sürümünü yükleyin.
B450 TOMAHAWK MAX | Motherboard | MSI Global
Best AMD AM4 B450 ATX motherboard, Turbo M.2, Extended heatsink, USB 3.2 Gen 2, Mystic Light, MSI MAGwww.msi.com
Aşağıdaki rehberi uygulayın.
Hata almaya devam ederseniz dosyaları paylaşın.
[CODE title="Kod"]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\011021-7015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff806`66600000 PsLoadedModuleList = 0xfffff806`6722a2b0.
Debug session time: Sat Jan 9 23:52:13.827 2021 (UTC + 3:00)
System Uptime: 0 days 21:56:05.513.
Loading Kernel Symbols.
...............................................................
................................................................
.............................................................
Loading User Symbols.
Loading unloaded module list.
.......................
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff806`669f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff800b`3617f340=000000000000003b.
11: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80666956475, Address of the instruction which caused the bugcheck.
Arg3: ffff800b3617fc40, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 8405.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 11367.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 74.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 3b.
BUGCHECK_P1: c0000005.
BUGCHECK_P2: fffff80666956475.
BUGCHECK_P3: ffff800b3617fc40.
BUGCHECK_P4: 0.
CONTEXT: ffff800b3617fc40 -- (.cxr 0xffff800b3617fc40)
rax=ffff800b36180690 rbx=ffffa00bff8ae080 rcx=ffff800b36180720.
rdx=0000000000000000 rsi=ffffa00bff8ae308 rdi=f7ffa00bff8ae080.
rip=fffff80666956475 rsp=ffff800b36180640 rbp=ffff800b36180709.
r8=0000000000000008 r9=0000000000000000 r10=0000fffff8066695.
r11=ffffbf7d13000000 r12=fffff806669973d0 r13=0000000000000000.
r14=0000000000000000 r15=ffff800b36180b00.
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202.
nt!KiSchedulerApc+0x45:
fffff806`66956475 448b7778 mov r14d,dword ptr [rdi+78h] ds:002b:f7ffa00b`ff8ae0f8=????????
Resetting default scope.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: steam.exe.
STACK_TEXT:
ffff800b`36180640 fffff806`66867e19 : 00000000`00000000 ffffa00b`ff8ae080 ffffa00b`ff8ae308 ffffa00b`ff8ae118 : nt!KiSchedulerApc+0x45.
ffff800b`36180770 fffff806`66865b77 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2e9.
ffff800b`36180820 fffff806`66864d7f : ffffa00b`00000005 0000ffff`0000000c ffff800b`361809e0 00001f80`00000000 : nt!KiSwapThread+0x827.
ffff800b`361808d0 fffff806`66864623 : ffff800b`000000cd fffff806`00000000 ffffa00c`016e2801 ffffa00b`ff8ae1c0 : nt!KiCommitThreadWait+0x14f.
ffff800b`36180970 fffff806`66c2c6a1 : ffffa00c`016e2860 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233.
ffff800b`36180a60 fffff806`66c2c74a : ffffa00b`ff8ae080 00000000`00000000 00000000`00000000 fffff806`66a07018 : nt!ObWaitForSingleObject+0x91.
ffff800b`36180ac0 fffff806`66a071b8 : 00000000`6ec17e40 00000000`0000000b ffff800b`36180b18 ffffffff`ffd9da60 : nt!NtWaitForSingleObject+0x6a.
ffff800b`36180b00 00000000`77301cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000000`090df168 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77301cfc.
SYMBOL_NAME: nt!KiSchedulerApc+45.
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe.
IMAGE_VERSION: 10.0.19041.685.
STACK_COMMAND: .cxr 0xffff800b3617fc40 ; kb.
BUCKET_ID_FUNC_OFFSET: 45.
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KiSchedulerApc.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {e85a6041-adb4-a2f5-2ff7-c19c8aa8e87a}
Followup: MachineOwner.
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\010521-7015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff800`33c00000 PsLoadedModuleList = 0xfffff800`3482a2b0.
Debug session time: Tue Jan 5 02:00:07.447 2021 (UTC + 3:00)
System Uptime: 0 days 7:35:05.133.
Loading Kernel Symbols.
...............................................................
................................................................
.............................................................
Loading User Symbols.
Loading unloaded module list.
..........
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff800`33ff5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa98c`540a7b40=000000000000000a.
12: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000562cac00, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 0000000000000098, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80033ff910f, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 8171.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 10309.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: a.
BUGCHECK_P1: 562cac00.
BUGCHECK_P2: ff.
BUGCHECK_P3: 98.
BUGCHECK_P4: fffff80033ff910f.
READ_ADDRESS: fffff800348fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8003480f330: Unable to get Flags value from nt!KdVersionBlock.
fffff8003480f330: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
00000000562cac00.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: dwm.exe.
TRAP_FRAME: ffffa98c540a7c80 -- (.trap 0xffffa98c540a7c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000097a667f330.
rdx=0000000000000018 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80033ff910f rsp=ffffa98c540a7e10 rbp=ffffa98c540a7ec0.
r8=00000000562cab00 r9=ffffa98c562c9060 r10=ffffa98c540a7fd0.
r11=ffffb00ceb321080 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di pl zr na po nc.
nt!NtCallbackReturn+0x4f:
fffff800`33ff910f 6641c780000100000000 mov word ptr [r8+100h],0 ds:00000000`562cac00=????
Resetting default scope.
STACK_TEXT:
ffffa98c`540a7b38 fffff800`34007769 : 00000000`0000000a 00000000`562cac00 00000000`000000ff 00000000`00000098 : nt!KeBugCheckEx.
ffffa98c`540a7b40 fffff800`34003a69 : ffffb00c`002be1c9 ffffb00c`e274c1c0 ffffa98c`549f77b0 ffffb00c`e274c080 : nt!KiBugCheckDispatch+0x69.
ffffa98c`540a7c80 fffff800`33ff910f : ffffb00c`e8d26080 ffffa98c`540a7ec0 ffffb00c`e8d26080 00000065`3a9fe2d0 : nt!KiPageFault+0x469.
ffffa98c`540a7e10 fffff800`340071b8 : ffffb00c`eb321080 00000000`00000000 00000000`00000000 ffffb00c`00000000 : nt!NtCallbackReturn+0x4f.
ffffa98c`540a7e40 00007ff8`f9e4c054 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000097`a667f308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f9e4c054.
SYMBOL_NAME: nt!NtCallbackReturn+4f.
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe.
IMAGE_VERSION: 10.0.19041.685.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 4f.
FAILURE_BUCKET_ID: AV_nt!NtCallbackReturn.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {c5e59f8b-b1d8-17df-8284-4f5cbacae96b}
Followup: MachineOwner.
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\010421-6953-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff805`4a400000 PsLoadedModuleList = 0xfffff805`4b02a2b0.
Debug session time: Mon Jan 4 18:24:34.950 2021 (UTC + 3:00)
System Uptime: 0 days 0:09:26.637.
Loading Kernel Symbols.
...............................................................
................................................................
............................................................
Loading User Symbols.
Loading unloaded module list.
.......
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff805`4a7f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff805`5046c440=000000000000000a.
0: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg4: 0000000000000000, address which referenced memory.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys.
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 6093.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 9647.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: d1.
BUGCHECK_P1: 0.
BUGCHECK_P2: 2.
BUGCHECK_P3: 8.
BUGCHECK_P4: 0.
READ_ADDRESS: fffff8054b0fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8054b00f330: Unable to get Flags value from nt!KdVersionBlock.
fffff8054b00f330: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000000.
PROCESS_NAME: System.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
TRAP_FRAME: fffff8055046c580 -- (.trap 0xfffff8055046c580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000001.
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000.
rip=0000000000000000 rsp=fffff8055046c710 rbp=0000000000000000.
r8=ffffb001da7c7180 r9=0000000000000000 r10=0000000000000000.
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na pe nc.
00000000`00000000 ?? ???
Resetting default scope.
IP_IN_FREE_BLOCK: 0.
FAILED_INSTRUCTION_ADDRESS:
+0.
00000000`00000000 ?? ???
STACK_TEXT:
fffff805`5046c438 fffff805`4a807769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx.
fffff805`5046c440 fffff805`4a803a69 : 00000000`00000020 00000000`00000000 00000000`00000064 00000000`00000000 : nt!KiBugCheckDispatch+0x69.
fffff805`5046c580 00000000`00000000 : fffff805`5046c960 fffff805`5046cb20 00000001`51dfbcc1 00000000`00989680 : nt!KiPageFault+0x469.
SYMBOL_NAME: nt!KiPageFault+469.
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe.
IMAGE_VERSION: 10.0.19041.685.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 469.
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
Followup: MachineOwner.
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\010421-7671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
Mini Kernel Dump does not have process information.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 (Service Pack 3) MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Machine Name:
Kernel base = 0xfffff800`33000000 PsLoadedModuleList = 0xfffff800`33c2a2b0.
Debug session time: Mon Jan 4 18:04:03.053 2021 (UTC + 3:00)
System Uptime: 0 days 3:17:39.740.
Loading Kernel Symbols.
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.
Loading User Symbols.
Loading unloaded module list.
.........
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff800`333f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff958d`ab75d650=00000000000000a0.
0: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the.
hibernation file.
Arg2: 000000000000000a.
Arg3: 0000000000008371, Incorrect checksum.
Arg4: 000000000000be8e, Previous disk read's checksum.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 4062.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 5254.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.
Key : Analysis.System.
Value: CreateObject.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
DUMP_FILE_ATTRIBUTES: 0x9.
Hiber Crash Dump.
Kernel Generated Triage Dump.
BUGCHECK_CODE: a0.
BUGCHECK_P1: 10e.
BUGCHECK_P2: a.
BUGCHECK_P3: 8371.
BUGCHECK_P4: be8e.
CUSTOMER_CRASH_COUNT: 1.
STACK_TEXT:
ffff958d`ab75d648 fffff800`339a07ee : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00008371 : nt!KeBugCheckEx.
ffff958d`ab75d650 fffff800`339adc01 : 00000000`00000001 ffffe08f`bb460b90 00000002`07758000 ffffe08f`d4149000 : nt!PopHiberChecksumHiberFileData+0x103ae.
ffff958d`ab75d6b0 fffff800`3399fdc7 : 00000000`00000000 ffffbd08`db135f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x7d.
ffff958d`ab75d720 fffff800`3398f5d0 : 000025cb`f2426a08 ffffbd08`db135f38 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x1069f.
ffff958d`ab75d7b0 fffff800`3398f316 : fffff800`33c50460 ffff958d`ab75d930 fffff800`33c50460 00000000`00000100 : nt!PopHandleNextState+0x210.
ffff958d`ab75d800 fffff800`3398f093 : 00000000`00000100 fffff800`33c50460 0000001b`9d166555 00000000`00989680 : nt!PopIssueNextState+0x1a.
ffff958d`ab75d830 fffff800`33991c99 : 00000000`0000000a ffff958d`ab75db40 00000000`00000000 fffff800`33991a1f : nt!PopInvokeSystemStateHandler+0x33b.
ffff958d`ab75da30 fffff800`3398c98a : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9.
ffff958d`ab75daf0 fffff800`3398c675 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x2be.
ffff958d`ab75db80 fffff800`33317e25 : ffffe08f`c862c000 ffffe08f`c862c080 fffff800`3398c540 00000000`00000001 : nt!PopTransitionToSleep+0x135.
ffff958d`ab75dc10 fffff800`333fcdd8 : ffffa880`2e100180 ffffe08f`c862c080 fffff800`33317dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55.
ffff958d`ab75dc60 00000000`00000000 : ffff958d`ab75e000 ffff958d`ab758000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+103ae.
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe.
IMAGE_VERSION: 10.0.19041.685.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 103ae.
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner.
---------
[/CODE]
Sorun Opera kaynaklı gözüküyor başka bir tarayıcı kullanın bir süre. Opera'yı da kaldırın.
Hocam tekrar merhaba, sizi biraz meşgul ediyorum ama lütfen kusuruma bakmayın ve yardımınızı esirgemeyin. Durum aynen devam ediyor ve bazen sistem takılarak çalışıyor. Yani mesela masaüstünde mouse oynatırken takılarak ilerliyor. Dosyalar takılarak açılıyor. Bazen de donup kalıyor. Operayı falan da kaldırdım ama sonuç aynı. Eşim teknik ressam ve gün içinde Autocad - Magicad ile proje çiziyor sistemin bu durumu defalarca projeye baştan başlamasına sebep oluyor. Minidump dosyalarını tekrar ekledim tekrar teşekkürler.Bir süre kullanın sistemi. Tekrar olursa dosyaları paylaşın.