- RAM
- 2x8 16GB
- SSD veya HDD modeli
- Neo Forza NFS01
- İşlemci
- i5-9400
WeTransfer | Send Large Files Fast
The simple, quick and secure way to send your files around the world without an account. Share your files, photos, and videos today for free.
Kod:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\uyku\Desktop\041323-5484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`7a800000 PsLoadedModuleList = 0xfffff805`7b42a270
Debug session time: Thu Apr 13 18:11:34.533 2023 (UTC + 3:00)
System Uptime: 0 days 0:11:16.180
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`7abf90f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff805`7e6604b0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff805005a85b4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff805005a85b4, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3733
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17860
Key : Analysis.Init.CPU.mSec
Value: 952
Key : Analysis.Init.Elapsed.mSec
Value: 82129
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 041323-5484-01.dmp
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff805005a85b4
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff805005a85b4
READ_ADDRESS: fffff8057b4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff805005a85b4
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8057e6605f0 -- (.trap 0xfffff8057e6605f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000004ccc8b49 rbx=0000000000000000 rcx=ffffba89870b88c0
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805005a85b4 rsp=fffff8057e660780 rbp=fffff8057e6607e9
r8=fffff8057c637df0 r9=0000000000000003 r10=fffff8057aaa99e0
r11=fffff8057e660848 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei ng nz na po cy
fffff805`005a85b4 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
fffff805`005a85b4 ?? ???
STACK_TEXT:
fffff805`7e6604a8 fffff805`7ac0b069 : 00000000`0000000a fffff805`005a85b4 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff805`7e6604b0 fffff805`7ac07369 : ffffe5e4`4f5a589d fffff805`956bae90 00000000`00000000 00001f80`00000200 : nt!KiBugCheckDispatch+0x69
fffff805`7e6605f0 fffff805`005a85b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff805`7e660780 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff805`005a85b4
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2130
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
Yine bir mavi ekran yedim, sanırım bellek kaynaklı.
Kod:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\uyku\Desktop\041323-4890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`1f400000 PsLoadedModuleList = 0xfffff807`2002a270
Debug session time: Thu Apr 13 18:56:30.954 2023 (UTC + 3:00)
System Uptime: 0 days 0:44:35.602
Loading Kernel Symbols
...............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`1f7f90f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9401`131b1d70=000000000000003d
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
The exception handler for the kernel interrupt object interrupt management was
not able to handle the generated exception.
Arguments:
Arg1: ffff9401131b2cf8, Exception Record (When Available)
Arg2: ffff9401131b2530, Context Record (When Available)
Arg3: 0000000000000000, Not used
Arg4: 0000000000000000, Not used
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 4109
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 22355
Key : Analysis.Init.CPU.mSec
Value: 499
Key : Analysis.Init.Elapsed.mSec
Value: 2974
Key : Analysis.Memory.CommitPeak.Mb
Value: 96
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 041323-4890-01.dmp
BUGCHECK_CODE: 3d
BUGCHECK_P1: ffff9401131b2cf8
BUGCHECK_P2: ffff9401131b2530
BUGCHECK_P3: 0
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffff9401131b2cf8 -- (.exr 0xffff9401131b2cf8)
ExceptionAddress: fffff8071f6db0ef (nt!HalpTimerClockInterrupt+0x000000000000000f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
CONTEXT: ffff9401131b2530 -- (.cxr 0xffff9401131b2530)
rax=fffff8071f6db000 rbx=ffffb90de6eebe60 rcx=ffffb90de6eebe60
rdx=0000000000000000 rsi=ffffb90de6eebf10 rdi=fffffa8dca04fa50
rip=fffff8071f6db0ef rsp=ffff9401131b2f30 rbp=fffffa8dca04fa50
r8=0000000000264e01 r9=0000000000000000 r10=fffff8071f6db0e0
r11=0000000000000000 r12=0000071755e17e7f r13=fffffa8dce9bf590
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!HalpTimerClockInterrupt+0xf:
fffff807`1f6db0ef 488b9988000000 mov rbx,qword ptr [rcx+88h] ds:002b:ffffb90d`e6eebee8=fffffa8dca04f9d0
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff807200fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff9401`131b2f30 fffff807`1f608a45 : 00000006`3adf5990 ffffb90d`e6eebe60 ffffb90d`e6eebf10 fffff193`4e7d6cd7 : nt!HalpTimerClockInterrupt+0xf
ffff9401`131b2f60 fffff807`1f7fab9a : fffffa8d`ca04fa50 ffffb90d`e6eebe60 00000000`00000590 02001b5a`a905c700 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9401`131b2fb0 fffff807`1f7fb107 : fffffa8d`ca04faf0 00000000`00000001 00000000`00040046 fffff807`1f6d3158 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffa8d`ca04f9d0 fffff807`1f7fcc4a : ffffffff`00000000 00000000`00000000 ffff9401`131a41c0 00000000`00000590 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffa8d`ca04fb60 00000000`00000000 : fffffa8d`ca050000 fffffa8d`ca049000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!HalpTimerClockInterrupt+f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2130
STACK_COMMAND: .cxr 0xffff9401131b2530 ; kb
BUCKET_ID_FUNC_OFFSET: f
FAILURE_BUCKET_ID: 0x3D_C0000005_nt!HalpTimerClockInterrupt
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d6ebbb1c-d60c-a9b0-9ace-b0f93003e839}
Followup: MachineOwner
---------
Son düzenleme: