YunusYENEROGLU
Hectopat
- Katılım
- 23 Ekim 2020
- Mesajlar
- 1.702
- Çözümler
- 4
Merhaba,
Mavi ekran hatası alıyorum, ilk kez minidump paylaşımı yapıyorum, link de hata varsa kusura bakmayınız.
drive.google.com
Minidump'ın açık hali:
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\yunusy\Desktop\ali pasa minidump\092322-9000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`49600000 PsLoadedModuleList = 0xfffff806`4a22a270
Debug session time: Fri Sep 23 07:57:13.507 2022 (UTC + 3:00)
System Uptime: 0 days 23:15:06.264
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`499f90e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff806`508941a0=00000000000000a0
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 00000000000000f1, The system failed to complete(resume) a power transition in a timely manner.
Arg2: 0000000000000005, The system power state in transition.
Arg3: 0000000000000021, The sleep checkpoint most recently reached.
Arg4: ffffdb086d0052c0, A pointer to the thread currently processing the request.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 49488
Key : Analysis.Init.CPU.mSec
Value: 1078
Key : Analysis.Init.Elapsed.mSec
Value: 174379
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.DumpHeader
Value: 0xa0
Key : Bugcheck.Code.Register
Value: 0xa0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092322-9000-01.dmp
BUGCHECK_CODE: a0
BUGCHECK_P1: f1
BUGCHECK_P2: 5
BUGCHECK_P3: 21
BUGCHECK_P4: ffffdb086d0052c0
FAULTING_THREAD: ffffdb086d0052c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa286c4d16480 -- (.trap 0xffffa286c4d16480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa58295594009 rbx=0000000000000000 rcx=0000000000000021
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80649c808e2 rsp=ffffa286c4d16610 rbp=ffffa58295465000
r8=ffffa286c4d16620 r9=000000000000b020 r10=ffffa58295516108
r11=0000000000000160 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!HvFreeCell+0x6a:
fffff806`49c808e2 8b03 mov eax,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffffa286`c4d15d60 fffff806`498130b0 : 00000000`00000008 fffff806`ffffffff ffffdb08`00000000 ffffdb08`6eb68158 : nt!KiSwapContext+0x76
ffffa286`c4d15ea0 fffff806`498125df : ffffdb08`6d0052c0 00000000`00000000 ffffa286`c4d16060 00000000`00000000 : nt!KiSwapThread+0x500
ffffa286`c4d15f50 fffff806`49811e83 : ffffdb08`00000000 fffff806`00000000 00054c6c`00000000 ffffdb08`6d005400 : nt!KiCommitThreadWait+0x14f
ffffa286`c4d15ff0 fffff806`498f1688 : ffffdb08`3e64a020 00000000`00000009 00000000`00000000 ffffdb08`66d48200 : nt!KeWaitForSingleObject+0x233
ffffa286`c4d160e0 fffff806`498ef4f5 : ffffa286`c4d163a0 ffffa286`c4d16200 ffffa286`c4d16270 fffff806`00000000 : nt!MiWaitForInPageComplete+0x1f8
ffffa286`c4d161d0 fffff806`49839a48 : 00000000`c0033333 00000000`00000000 ffffa582`95594020 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffa286`c4d162e0 fffff806`49a0725e : 00000000`0000090d ffffa286`00000000 00000000`00001001 00000000`00000fff : nt!MmAccessFault+0x468
ffffa286`c4d16480 fffff806`49c808e2 : 00000000`00000002 fffff806`00000002 ffffa582`00000000 ffffa582`9552f164 : nt!KiPageFault+0x35e
ffffa286`c4d16610 fffff806`49e309d7 : 00000000`00000000 ffffa582`95465000 00000000`00000000 ffffa286`c4d16990 : nt!HvFreeCell+0x6a
ffffa286`c4d16690 fffff806`49c7fdee : 00000000`00000000 ffffa582`960a2aac 00000000`00000000 ffffa286`c4d16770 : nt!CmpSetValueDataExisting+0x11ccb7
ffffa286`c4d16720 fffff806`49bf1368 : 01d8cf08`3f6775ab 00000000`00000001 ffffa582`9fa8e130 00000000`00000003 : nt!CmpSetValueKeyExisting+0x2be
ffffa286`c4d167a0 fffff806`49bf0ba8 : ffffa286`00000001 ffffa286`c4d16a30 00000000`00000000 00000000`00007c01 : nt!CmSetValueKey+0x508
ffffa286`c4d16940 fffff806`49a0aab5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtSetValueKey+0x648
ffffa286`c4d16b20 fffff806`499fcf70 : fffff806`49f9887b ffffa582`960a2aa8 ffffffff`80000ed0 ffffa582`960a1010 : nt!KiSystemServiceCopyEnd+0x25
ffffa286`c4d16d28 fffff806`49f9887b : ffffa582`960a2aa8 ffffffff`80000ed0 ffffa582`960a1010 00000000`00000000 : nt!KiServiceLinkage
ffffa286`c4d16d30 fffff806`49f96cfc : ffffffff`80001ab4 00000000`00000001 ffffa582`960a1000 00000000`00000001 : nt!BapdRegisterSiData+0x93
ffffa286`c4d16da0 fffff806`49f90815 : ffffdb08`6a6ba7b0 00000000`00000001 ffffa286`c4d16e02 ffffdb08`6a6ba7b0 : nt!PopBootLoaderSiData+0x38
ffffa286`c4d16dd0 fffff806`49f8ec8b : 00000000`00000002 ffffa286`c4d16fc0 fffff806`4a223288 00000000`00000000 : nt!PoBroadcastSystemState+0x4cd
ffffa286`c4d16e80 fffff806`49f8fffb : ffffa286`c4d16fc0 fffff806`4a223288 00000000`00000000 04f8ae17`00000006 : nt!PopSetDevicesSystemState+0x87
ffffa286`c4d16ee0 fffff806`49f96f0c : ffffdb08`6e274000 ffffdb08`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0xef7
ffffa286`c4d16fa0 fffff806`49a0aab5 : 7ffff806`4a224f40 00000000`ffffffff 00000000`00000000 ffffdb08`6d005960 : nt!NtSetSystemPowerState+0x4c
ffffa286`c4d17180 fffff806`499fcf70 : fffff806`49d678ae 00000000`00000008 ffffa286`c4d17378 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
ffffa286`c4d17318 fffff806`49d678ae : 00000000`00000008 ffffa286`c4d17378 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffffa286`c4d17320 fffff806`49d67579 : 00000000`00000000 ffffdb08`3e6dda60 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216
ffffa286`c4d173c0 fffff806`49955634 : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff806`4a223a00 : nt!PopPolicyWorkerAction+0x79
ffffa286`c4d17430 fffff806`49852b65 : ffffdb08`00000001 ffffdb08`6d0052c0 fffff806`499555a0 ffffdb08`00000000 : nt!PopPolicyWorkerThread+0x94
ffffa286`c4d17470 fffff806`49871d25 : ffffdb08`6d0052c0 00000000`00000080 ffffdb08`3e6c5080 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffa286`c4d17510 fffff806`49a00768 : fffff806`47483180 ffffdb08`6d0052c0 fffff806`49871cd0 ffffdb08`60f55c70 : nt!PspSystemThreadStartup+0x55
ffffa286`c4d17560 00000000`00000000 : ffffa286`c4d18000 ffffa286`c4d11000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiSwapContext+76
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2075
STACK_COMMAND: .process /r /p 0xffffdb083e6c5080; .thread 0xffffdb086d0052c0 ; kb
BUCKET_ID_FUNC_OFFSET: 76
FAILURE_BUCKET_ID: 0xa0_f1_nt!KiSwapContext
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {99fdb01c-b80a-f6be-7a24-2507a33fc6e8}
Followup: MachineOwner
---------
0: kd> lmvm nt
Browse full module list
start end module name
fffff806`49600000 fffff806`4a646000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\E9A11A4645EB039920AC31D9A72862971\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\A7C6F73A1046000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: A7C6F73A (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A64C71
ImageSize: 01046000
File version: 10.0.19041.2075
Product version: 10.0.19041.2075
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.2075
FileVersion: 10.0.19041.2075 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
Yardımlarınızı rica ederim.
Mavi ekran hatası alıyorum, ilk kez minidump paylaşımı yapıyorum, link de hata varsa kusura bakmayınız.
092322-9000-01.dmp

Minidump'ın açık hali:
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\yunusy\Desktop\ali pasa minidump\092322-9000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`49600000 PsLoadedModuleList = 0xfffff806`4a22a270
Debug session time: Fri Sep 23 07:57:13.507 2022 (UTC + 3:00)
System Uptime: 0 days 23:15:06.264
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................................................
........
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`499f90e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff806`508941a0=00000000000000a0
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 00000000000000f1, The system failed to complete(resume) a power transition in a timely manner.
Arg2: 0000000000000005, The system power state in transition.
Arg3: 0000000000000021, The sleep checkpoint most recently reached.
Arg4: ffffdb086d0052c0, A pointer to the thread currently processing the request.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 49488
Key : Analysis.Init.CPU.mSec
Value: 1078
Key : Analysis.Init.Elapsed.mSec
Value: 174379
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.DumpHeader
Value: 0xa0
Key : Bugcheck.Code.Register
Value: 0xa0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092322-9000-01.dmp
BUGCHECK_CODE: a0
BUGCHECK_P1: f1
BUGCHECK_P2: 5
BUGCHECK_P3: 21
BUGCHECK_P4: ffffdb086d0052c0
FAULTING_THREAD: ffffdb086d0052c0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa286c4d16480 -- (.trap 0xffffa286c4d16480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa58295594009 rbx=0000000000000000 rcx=0000000000000021
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80649c808e2 rsp=ffffa286c4d16610 rbp=ffffa58295465000
r8=ffffa286c4d16620 r9=000000000000b020 r10=ffffa58295516108
r11=0000000000000160 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!HvFreeCell+0x6a:
fffff806`49c808e2 8b03 mov eax,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffffa286`c4d15d60 fffff806`498130b0 : 00000000`00000008 fffff806`ffffffff ffffdb08`00000000 ffffdb08`6eb68158 : nt!KiSwapContext+0x76
ffffa286`c4d15ea0 fffff806`498125df : ffffdb08`6d0052c0 00000000`00000000 ffffa286`c4d16060 00000000`00000000 : nt!KiSwapThread+0x500
ffffa286`c4d15f50 fffff806`49811e83 : ffffdb08`00000000 fffff806`00000000 00054c6c`00000000 ffffdb08`6d005400 : nt!KiCommitThreadWait+0x14f
ffffa286`c4d15ff0 fffff806`498f1688 : ffffdb08`3e64a020 00000000`00000009 00000000`00000000 ffffdb08`66d48200 : nt!KeWaitForSingleObject+0x233
ffffa286`c4d160e0 fffff806`498ef4f5 : ffffa286`c4d163a0 ffffa286`c4d16200 ffffa286`c4d16270 fffff806`00000000 : nt!MiWaitForInPageComplete+0x1f8
ffffa286`c4d161d0 fffff806`49839a48 : 00000000`c0033333 00000000`00000000 ffffa582`95594020 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffa286`c4d162e0 fffff806`49a0725e : 00000000`0000090d ffffa286`00000000 00000000`00001001 00000000`00000fff : nt!MmAccessFault+0x468
ffffa286`c4d16480 fffff806`49c808e2 : 00000000`00000002 fffff806`00000002 ffffa582`00000000 ffffa582`9552f164 : nt!KiPageFault+0x35e
ffffa286`c4d16610 fffff806`49e309d7 : 00000000`00000000 ffffa582`95465000 00000000`00000000 ffffa286`c4d16990 : nt!HvFreeCell+0x6a
ffffa286`c4d16690 fffff806`49c7fdee : 00000000`00000000 ffffa582`960a2aac 00000000`00000000 ffffa286`c4d16770 : nt!CmpSetValueDataExisting+0x11ccb7
ffffa286`c4d16720 fffff806`49bf1368 : 01d8cf08`3f6775ab 00000000`00000001 ffffa582`9fa8e130 00000000`00000003 : nt!CmpSetValueKeyExisting+0x2be
ffffa286`c4d167a0 fffff806`49bf0ba8 : ffffa286`00000001 ffffa286`c4d16a30 00000000`00000000 00000000`00007c01 : nt!CmSetValueKey+0x508
ffffa286`c4d16940 fffff806`49a0aab5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtSetValueKey+0x648
ffffa286`c4d16b20 fffff806`499fcf70 : fffff806`49f9887b ffffa582`960a2aa8 ffffffff`80000ed0 ffffa582`960a1010 : nt!KiSystemServiceCopyEnd+0x25
ffffa286`c4d16d28 fffff806`49f9887b : ffffa582`960a2aa8 ffffffff`80000ed0 ffffa582`960a1010 00000000`00000000 : nt!KiServiceLinkage
ffffa286`c4d16d30 fffff806`49f96cfc : ffffffff`80001ab4 00000000`00000001 ffffa582`960a1000 00000000`00000001 : nt!BapdRegisterSiData+0x93
ffffa286`c4d16da0 fffff806`49f90815 : ffffdb08`6a6ba7b0 00000000`00000001 ffffa286`c4d16e02 ffffdb08`6a6ba7b0 : nt!PopBootLoaderSiData+0x38
ffffa286`c4d16dd0 fffff806`49f8ec8b : 00000000`00000002 ffffa286`c4d16fc0 fffff806`4a223288 00000000`00000000 : nt!PoBroadcastSystemState+0x4cd
ffffa286`c4d16e80 fffff806`49f8fffb : ffffa286`c4d16fc0 fffff806`4a223288 00000000`00000000 04f8ae17`00000006 : nt!PopSetDevicesSystemState+0x87
ffffa286`c4d16ee0 fffff806`49f96f0c : ffffdb08`6e274000 ffffdb08`00000006 00000000`00000002 00000000`00000070 : nt!PopTransitionSystemPowerStateEx+0xef7
ffffa286`c4d16fa0 fffff806`49a0aab5 : 7ffff806`4a224f40 00000000`ffffffff 00000000`00000000 ffffdb08`6d005960 : nt!NtSetSystemPowerState+0x4c
ffffa286`c4d17180 fffff806`499fcf70 : fffff806`49d678ae 00000000`00000008 ffffa286`c4d17378 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
ffffa286`c4d17318 fffff806`49d678ae : 00000000`00000008 ffffa286`c4d17378 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffffa286`c4d17320 fffff806`49d67579 : 00000000`00000000 ffffdb08`3e6dda60 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0x216
ffffa286`c4d173c0 fffff806`49955634 : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff806`4a223a00 : nt!PopPolicyWorkerAction+0x79
ffffa286`c4d17430 fffff806`49852b65 : ffffdb08`00000001 ffffdb08`6d0052c0 fffff806`499555a0 ffffdb08`00000000 : nt!PopPolicyWorkerThread+0x94
ffffa286`c4d17470 fffff806`49871d25 : ffffdb08`6d0052c0 00000000`00000080 ffffdb08`3e6c5080 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffa286`c4d17510 fffff806`49a00768 : fffff806`47483180 ffffdb08`6d0052c0 fffff806`49871cd0 ffffdb08`60f55c70 : nt!PspSystemThreadStartup+0x55
ffffa286`c4d17560 00000000`00000000 : ffffa286`c4d18000 ffffa286`c4d11000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiSwapContext+76
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2075
STACK_COMMAND: .process /r /p 0xffffdb083e6c5080; .thread 0xffffdb086d0052c0 ; kb
BUCKET_ID_FUNC_OFFSET: 76
FAILURE_BUCKET_ID: 0xa0_f1_nt!KiSwapContext
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {99fdb01c-b80a-f6be-7a24-2507a33fc6e8}
Followup: MachineOwner
---------
0: kd> lmvm nt
Browse full module list
start end module name
fffff806`49600000 fffff806`4a646000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\E9A11A4645EB039920AC31D9A72862971\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\A7C6F73A1046000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: A7C6F73A (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A64C71
ImageSize: 01046000
File version: 10.0.19041.2075
Product version: 10.0.19041.2075
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.2075
FileVersion: 10.0.19041.2075 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
Yardımlarınızı rica ederim.
Son düzenleyen: Moderatör: