1) yazıcınızın sürücüsünü kaldırın ve bağlantısını kesin.
2) Memtest86 testi uygulayın.
[CODE title="Dökümler:"]Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8817B201\021221-38484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (2 procs) Free x86 compatible.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.x86fre.vb_release.191206-1406
Machine Name:
Kernel base = 0x81c7a000 PsLoadedModuleList = 0x81f3b938.
Debug session time: Fri Feb 12 16:55:40.406 2021 (UTC + 3:00)
System Uptime: 0 days 0:00:46.320
Loading Kernel Symbols.
...............................................................
................................................................
.....................
Loading User Symbols.
Loading unloaded module list.
.........
For analysis of this file, run !analyze -v
eax=00000018 ebx=00000000 ecx=87f5b3c0 edx=009e5f28 esi=c0004000 edi=8965ea60
eip=81df5714 esp=8965e8a8 ebp=8965e950 iopl=0 nv up ei pl nz na pe nc.
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000206
nt!KeBugCheckEx:
81df5714 55 push ebp.
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00004477, A driver tried to write to an unallocated address in the.
user space of the system process. Parameter 2 contains the.
address of the attempted write.
Arg2: 009e5f28.
Arg3: 00000000.
Arg4: 00000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6781.
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject.
Key : Analysis.DebugModel
Value: CreateObject.
Key : Analysis.Elapsed.mSec
Value: 37840.
Key : Analysis.Memory.CommitPeak.Mb
Value: 73.
Key : Analysis.System
Value: CreateObject.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a.
BUGCHECK_P1: 4477.
BUGCHECK_P2: 9e5f28.
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
TRAP_FRAME: 8965eb49 -- (.trap 0xffffffff8965eb49)
ErrCode = 00000002.
eax=009e5f28 ebx=9e5f9100 ecx=00000091 edx=00000002 esi=88c02d80 edi=0000001f
eip=81fd708b esp=8965ebbd ebp=89663094 iopl=0 nv up ei pl nz ac pe nc.
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216
nt!ObCloseHandleTableEntry+0x1bb:
81fd708b 0000 add byte ptr [eax],al ds:0023:009e5f28=??
Resetting default scope.
BAD_STACK_POINTER: 8965e8a8.
MISALIGNED_IP:
nt!ObCloseHandleTableEntry+1bb
81fd708b 0000 add byte ptr [eax],al
UNALIGNED_STACK_POINTER: 8965ebbd.
STACK_TEXT:
8965e8a4 81e260ff 0000001a 00004477 009e5f28 nt!KeBugCheckEx
8965e950 81ce67b4 8965eb49 009e5f28 00000002 nt!MiInPagePageTable+0x14119f
8965e9e0 81ce58b1 009e5f28 8965eac0 04050607 nt!MiUserFault+0x834
8965eaa8 81e11e17 00000002 009e5f28 00000000 nt!MmAccessFault+0x121
8965eaa8 81fd708b (T) 00000002 009e5f28 00000000 nt!KiTrap0E+0x2c7
8965ec41 6f736165 (T) 6863506e 69460400 61776d72 nt!ObCloseHandleTableEntry+0x1bb
WARNING: Frame IP not in any known module. Following frames may be wrong.
8965ec55 52746573 6f736165 6863506e 69646441 0x6f736165.
8965ec59 6f736165 6863506e 69646441 6e6f6974 0x52746573.
8965ec5d 6863506e 69646441 6e6f6974 08006c61 0x6f736165.
8965ec61 69646441 6e6f6974 08006c61 6d726946 0x6863506e.
8965ec65 6e6f6974 08006c61 6d726946 65726177 0x69646441.
8965ec69 08006c61 6d726946 65726177 65736552 0x6e6f6974.
8965ec6d 6d726946 65726177 65736552 61655274 0x8006c61.
8965ec71 65726177 65736552 61655274 456e6f73 0x6d726946.
8965ec75 65736552 61655274 456e6f73 6465626d 0x65726177.
8965ec79 61655274 456e6f73 6465626d 43646564 0x65736552.
8965ec7d 456e6f73 6465626d 43646564 72746e6f 0x61655274.
8965ec81 6465626d 43646564 72746e6f 656c6c6f 0x456e6f73.
8965ec85 43646564 72746e6f 656c6c6f 46040072 0x6465626d.
8965ec89 72746e6f 656c6c6f 46040072 776d7269 0x43646564.
8965ec8d 656c6c6f 46040072 776d7269 52657261 0x72746e6f.
8965ec91 46040072 776d7269 52657261 74657365 0x656c6c6f.
8965ec95 776d7269 52657261 74657365 73616552 0x46040072.
8965ec99 52657261 74657365 73616552 6d456e6f 0x776d7269.
8965ec9d 74657365 73616552 6d456e6f 64646562 0x52657261.
8965eca1 73616552 6d456e6f 64646562 6f436465 0x74657365.
8965eca5 6d456e6f 64646562 6f436465 6f72746e 0x73616552.
8965eca9 64646562 6f436465 6f72746e 72656c6c 0x6d456e6f.
8965ecad 6f436465 6f72746e 72656c6c 69646441 0x64646562.
8965ecb1 6f72746e 72656c6c 69646441 6e6f6974 0x6f436465.
8965ecb5 72656c6c 69646441 6e6f6974 08006c61 0x6f72746e.
8965ecb9 69646441 6e6f6974 08006c61 00040b06 0x72656c6c.
8965ecbd 6e6f6974 08006c61 00040b06 00000000 0x69646441.
8965ecc1 08006c61 00040b06 00000000 00002000 0x6e6f6974.
8965ecc5 00040b06 00000000 00002000 00800059 0x8006c61.
8965ecc9 00000000 00002000 00800059 416c734f 0x40b06.
SYMBOL_NAME: nt!MiInPagePageTable+14119f
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb.
IMAGE_NAME: hardware.
MODULE_NAME: hardware.
FAILURE_BUCKET_ID: IP_MISALIGNED.
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x86.
OSNAME: Windows 10.
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner.
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO8813C101\021221-32828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (2 procs) Free x86 compatible.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.x86fre.vb_release.191206-1406
Machine Name:
Kernel base = 0x82870000 PsLoadedModuleList = 0x82b30a38.
Debug session time: Fri Feb 12 22:42:57.925 2021 (UTC + 3:00)
System Uptime: 0 days 4:37:17.838
Loading Kernel Symbols.
...............................................................
................................................................
...........................................
Loading User Symbols.
Loading unloaded module list.
................
For analysis of this file, run !analyze -v
eax=9a893a9c ebx=b80c31f0 ecx=00000000 edx=00000001 esi=b80c3270 edi=9a893a9c
eip=829eb634 esp=b80c3140 ebp=b80c31e8 iopl=0 nv up ei pl zr na pe nc.
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000246
nt!KeBugCheckEx:
829eb634 55 push ebp.
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 9a893a9c, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 82985482, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 00000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7781.
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject.
Key : Analysis.DebugModel
Value: CreateObject.
Key : Analysis.Elapsed.mSec
Value: 28131.
Key : Analysis.Memory.CommitPeak.Mb
Value: 79.
Key : Analysis.System
Value: CreateObject.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50.
BUGCHECK_P1: ffffffff9a893a9c.
BUGCHECK_P2: 0
BUGCHECK_P3: ffffffff82985482.
BUGCHECK_P4: 2
READ_ADDRESS: 82b6f1a4: Unable to get MiVisibleState.
Unable to get MmSystemRangeStart.
Unable to get NonPagedPoolStart.
Unable to get PagedPoolStart.
unable to get nt!MmSpecialPagesInUse
9a893a9c.
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: installer.exe
TRAP_FRAME: b80c374c -- (.trap 0xffffffffb80c374c)
ErrCode = 00000000.
eax=00000000 ebx=afa7b008 ecx=b2c13528 edx=8f17a001 esi=b80c3894 edi=afa7b008
eip=82985482 esp=b80c37c0 ebp=b80c37c0 iopl=0 nv up ei pl nz na po nc.
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!IoIsOperationSynchronous+0x22:
82985482 0f94c1 sete cl.
Resetting default scope.
STACK_TEXT:
b80c313c 82927cda 00000050 9a893a9c 00000000 nt!KeBugCheckEx
b80c31f0 828dba76 9a893a9c b80c32d0 00000001 nt!MiSystemFault+0x86a
b80c32b8 82a07d37 00000000 9a893a9c 00000000 nt!MmAccessFault+0x376
b80c32b8 82985482 (T) 00000000 9a893a9c 00000000 nt!KiTrap0E+0x2c7
b80c33c4 837162c3 (T) b699bce8 e454e8cb b699bce8 nt!IoIsOperationSynchronous+0x22
b80c3448 828b3038 8f17a018 b699bce8 b2d1ec98 Ntfs!NtfsFsdRead+0x95
b80c34e0 82925a25 cc0d3088 00000002 00000000 nt!IofCallDriver+0x48
b80c3514 8297abcd cc0d30c0 cc0d3098 cc0d30b8 nt!IoPageReadEx+0x185
b80c3544 829005ee bf07ca58 00000000 00000000 nt!MiIssueHardFaultIo+0x8d
b80c35e0 828dbb1c be3706ac b80c36c0 b80c3670 nt!MiIssueHardFault+0x21e
b80c36a8 82a07d37 00000000 be3706ac 00000000 nt!MmAccessFault+0x41c
b80c36a8 82985482 (T) 00000000 be3706ac 00000000 nt!KiTrap0E+0x2c7
b80c37c0 837d15a3 (T) afa7b008 e454e59b afa7b008 nt!IoIsOperationSynchronous+0x22
b80c3918 828b3038 8f17a018 afa7b008 b54e2008 Ntfs!NtfsFsdCreate+0xd3
b80c39e0 828b2fcf b2c13528 afa7b008 b80c3a08 nt!IofCallDriver+0x48
b80c3a08 82bc5295 19f884e0 8f173510 82bc4550 nt!IoCallDriverWithTracing+0x2f
b80c3ac4 82bc9e3a 8f173528 05b91730 b6954c98 nt!IopParseDevice+0xd45
b80c3bcc 82bc9547 00000040 88b91730 71718501 nt!ObpLookupObjectName+0x39a
b80c3c6c 82c311cb 00cff530 88b91730 71718501 nt!ObOpenObjectByNameEx+0x1c7
b80c3cf4 82c30e90 00cff530 00cff548 00000000 nt!IopCreateFile+0x32b
b80c3d34 82a01bfb 00cff560 00020000 00cff530 nt!NtOpenFile+0x30
b80c3d34 77ce1740 (T) 00cff560 00020000 00cff530 nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
00cff56c 00000000 (T) 00000000 00000000 00000000 0x77ce1740.
SYMBOL_NAME: nt!IoIsOperationSynchronous+22
MODULE_NAME: nt.
IMAGE_NAME: ntkrpamp.exe
IMAGE_VERSION: 10.0.19041.789
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 22.
FAILURE_BUCKET_ID: AV_R_INVALID_nt!IoIsOperationSynchronous
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x86.
OSNAME: Windows 10.
FAILURE_ID_HASH: {d432de7a-a28b-a5d0-ed43-c674e25980a5}
Followup: MachineOwner.
---------[/CODE]