Hakan Çetin
Kilopat
- Katılım
- 5 Kasım 2016
- Mesajlar
- 98
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
Herhangi bir çözüm buldunuz mu aynı hatayı alıyorum.
Sorun çözülürse onu da belirtmeyi unutmayın da. Umarım temelli sorununuz çözülmüştür, gerçi devam ederse de kime gideceğinizi biliyorsunuz.
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\Desktop\... EKRANLAR\122320-12703-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*
Executable search path is:
DBGHELP: Symbol Search Path: cache*;SRV*https://msdl.microsoft.com/download/symbols
SYMSRV: BYINDEX: 0x1
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x2
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`43000000 PsLoadedModuleList = 0xfffff802`43c2a2b0
Debug session time: Wed Dec 23 20:44:17.542 2020 (UTC + 3:00)
System Uptime: 0 days 4:00:58.214
SYMSRV: BYINDEX: 0x3
C:\ProgramData\Dbg\sym
ntoskrnl.exe
C129B8081046000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - OK
DBGENG: C:\ProgramData\Dbg\sym\ntoskrnl.exe\C129B8081046000\ntoskrnl.exe - Mapped image memory
SYMSRV: BYINDEX: 0x4
C:\ProgramData\Dbg\sym
ntkrnlmp.pdb
4EF9A5375F61FE84B7EAEF54BF025C0E1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: nt - public symbols
C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
Loading Kernel Symbols
.SYMSRV: BYINDEX: 0x5
C:\ProgramData\Dbg\sym
halaacpi.dll
1A7BE8E96000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - OK
DBGENG: C:\ProgramData\Dbg\sym\halaacpi.dll\1A7BE8E96000\halaacpi.dll - Mapped image memory
..............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`433f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffda01`5dbfb020=000000000000003b
3: kd> lm
start end module name
fffff802`41040000 fffff802`41068000 mcupdate_AuthenticAMD (deferred)
fffff802`41070000 fffff802`41076000 hal (deferred)
fffff802`41080000 fffff802`4108b000 kd (deferred)
fffff802`41090000 fffff802`410b7000 tm (deferred)
fffff802`410c0000 fffff802`4112a000 CLFS (deferred)
fffff802`41130000 fffff802`4114a000 PSHED (deferred)
fffff802`41150000 fffff802`4115b000 BOOTVID (deferred)
fffff802`41160000 fffff802`41273000 clipsp (deferred)
fffff802`41280000 fffff802`412ef000 FLTMGR (deferred)
fffff802`412f0000 fffff802`41319000 ksecdd (deferred)
fffff802`41320000 fffff802`41382000 msrpc (deferred)
fffff802`41390000 fffff802`4139e000 cmimcext (deferred)
fffff802`413a0000 fffff802`413b1000 werkernel (deferred)
fffff802`413c0000 fffff802`413cc000 ntosext (deferred)
fffff802`413d0000 fffff802`413e3000 WDFLDR (deferred)
fffff802`413f0000 fffff802`413ff000 SleepStudyHelper (deferred)
fffff802`41400000 fffff802`41411000 WppRecorder (deferred)
fffff802`41420000 fffff802`4143a000 SgrmAgent (deferred)
fffff802`43000000 fffff802`44046000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\4EF9A5375F61FE84B7EAEF54BF025C0E1\ntkrnlmp.pdb
fffff802`46a00000 fffff802`46ae3000 CI (deferred)
fffff802`46af0000 fffff802`46ba7000 cng (deferred)
fffff802`46bb0000 fffff802`46c81000 Wdf01000 (deferred)
fffff802`46c90000 fffff802`46cb6000 acpiex (deferred)
fffff802`46cc0000 fffff802`46d0b000 mssecflt (deferred)
fffff802`46d10000 fffff802`46ddc000 ACPI (deferred)
fffff802`46de0000 fffff802`46dec000 WMILIB (deferred)
fffff802`46e10000 fffff802`46e7b000 intelpep (deferred)
fffff802`46e80000 fffff802`46e97000 WindowsTrustedRT (deferred)
fffff802`46ea0000 fffff802`46eab000 IntelTA (deferred)
fffff802`46eb0000 fffff802`46ebb000 WindowsTrustedRTProxy (deferred)
fffff802`46ec0000 fffff802`46ed4000 pcw (deferred)
fffff802`46ee0000 fffff802`46eeb000 msisadrv (deferred)
fffff802`46ef0000 fffff802`46f66000 pci (deferred)
fffff802`46f70000 fffff802`46f85000 vdrvroot (deferred)
fffff802`46f90000 fffff802`46fbf000 pdc (deferred)
fffff802`46fc0000 fffff802`46fd9000 CEA (deferred)
fffff802`46fe0000 fffff802`47011000 partmgr (deferred)
fffff802`47020000 fffff802`470ca000 spaceport (deferred)
fffff802`470d0000 fffff802`470e9000 volmgr (deferred)
fffff802`470f0000 fffff802`47153000 volmgrx (deferred)
fffff802`47160000 fffff802`4717e000 mountmgr (deferred)
fffff802`47180000 fffff802`471b2000 storahci (deferred)
fffff802`471c0000 fffff802`471dc000 EhStorClass (deferred)
fffff802`471e0000 fffff802`471fa000 fileinfo (deferred)
fffff802`47200000 fffff802`472b0000 storport (deferred)
fffff802`472c0000 fffff802`472ff000 Wof (deferred)
fffff802`47300000 fffff802`4736c000 WdFilter (deferred)
fffff802`47370000 fffff802`4737d000 Fs_Rec (deferred)
fffff802`47380000 fffff802`474ef000 ndis (deferred)
fffff802`474f0000 fffff802`47588000 NETIO (deferred)
fffff802`47590000 fffff802`475c2000 ksecpkg (deferred)
fffff802`475d0000 fffff802`475f1000 amdpsp (deferred)
fffff802`47600000 fffff802`478d9000 Ntfs (deferred)
fffff802`478e0000 fffff802`47bcb000 tcpip (deferred)
fffff802`47bd0000 fffff802`47c4f000 fwpkclnt (deferred)
fffff802`47c50000 fffff802`47c80000 wfplwfs (deferred)
fffff802`47c90000 fffff802`47d58000 fvevol (deferred)
fffff802`47d60000 fffff802`47d6b000 volume (deferred)
fffff802`47d70000 fffff802`47ddd000 volsnap (deferred)
fffff802`47de0000 fffff802`47e30000 rdyboost (deferred)
fffff802`47e40000 fffff802`47e66000 mup (deferred)
fffff802`47e70000 fffff802`47e82000 iorate (deferred)
fffff802`47eb0000 fffff802`47ecc000 disk (deferred)
fffff802`47ed0000 fffff802`47f3c000 CLASSPNP (deferred)
fffff802`4e600000 fffff802`4e693000 mrxsmb (deferred)
fffff802`4e6a0000 fffff802`4e6b3000 condrv (deferred)
fffff802`4e6c0000 fffff802`4ec43000 vgk (deferred)
fffff802`4ec50000 fffff802`4ec80000 cdrom (deferred)
fffff802`4ec90000 fffff802`4eca5000 filecrypt (deferred)
fffff802`4ecb0000 fffff802`4ecbe000 tbs (deferred)
fffff802`4ecc0000 fffff802`4ecca000 Null (deferred)
fffff802`4ecd0000 fffff802`4ecda000 Beep (deferred)
fffff802`4ece0000 fffff802`4ed36000 msquic (deferred)
fffff802`4ed40000 fffff802`4eec6000 HTTP (deferred)
fffff802`4eed0000 fffff802`4eef5000 bowser (deferred)
fffff802`4ef00000 fffff802`4ef1a000 mpsdrv (deferred)
fffff802`4ef20000 fffff802`4ef65000 mrxsmb20 (deferred)
fffff802`4efc0000 fffff802`4efde000 crashdmp (deferred)
fffff802`4f400000 fffff802`4f418000 watchdog (deferred)
fffff802`4f420000 fffff802`4f436000 BasicDisplay (deferred)
fffff802`4f440000 fffff802`4f451000 BasicRender (deferred)
fffff802`4f460000 fffff802`4f47c000 Npfs (deferred)
fffff802`4f480000 fffff802`4f491000 Msfs (deferred)
fffff802`4f4a0000 fffff802`4f4bb000 CimFS (deferred)
fffff802`4f4c0000 fffff802`4f4e2000 tdx (deferred)
fffff802`4f4f0000 fffff802`4f500000 TDI (deferred)
fffff802`4f510000 fffff802`4f56c000 netbt (deferred)
fffff802`4f570000 fffff802`4f583000 afunix (deferred)
fffff802`4f590000 fffff802`4f633000 afd (deferred)
fffff802`4f640000 fffff802`4f65a000 vwififlt (deferred)
fffff802`4f660000 fffff802`4f68b000 pacer (deferred)
fffff802`4f690000 fffff802`4f6a4000 ndiscap (deferred)
fffff802`4f6b0000 fffff802`4f6c4000 netbios (deferred)
fffff802`4f6d0000 fffff802`4f771000 Vid (deferred)
fffff802`4f780000 fffff802`4f7a1000 winhvr (deferred)
fffff802`4f7b0000 fffff802`4f82c000 rdbss (deferred)
fffff802`4f830000 fffff802`4f8c4000 csc (deferred)
fffff802`4f8d0000 fffff802`4f8e2000 nsiproxy (deferred)
fffff802`4f8f0000 fffff802`4f8fe000 npsvctrig (deferred)
fffff802`4f900000 fffff802`4f910000 mssmbios (deferred)
fffff802`4f920000 fffff802`4f927000 MsIo64 (deferred)
fffff802`4f930000 fffff802`4f93a000 gpuenergydrv (deferred)
fffff802`4f940000 fffff802`4f948000 GLCKIO2 (deferred)
fffff802`4f950000 fffff802`4f97c000 dfsc (deferred)
fffff802`4f980000 fffff802`4f99b000 rspndr (deferred)
fffff802`4f9a0000 fffff802`4fa0c000 fastfat (deferred)
fffff802`4fa10000 fffff802`4fa27000 bam (deferred)
fffff802`4fa30000 fffff802`4fa39000 AsIO2 (deferred)
fffff802`4fa40000 fffff802`4fa8e000 ahcache (deferred)
fffff802`4fa90000 fffff802`4faa2000 CompositeBus (deferred)
fffff802`4fab0000 fffff802`4fabd000 kdnic (deferred)
fffff802`4fac0000 fffff802`4fad5000 umbus (deferred)
fffff802`4fae0000 fffff802`4fb78000 USBXHCI (deferred)
fffff802`4fb80000 fffff802`4fbc4000 ucx01000 (deferred)
fffff802`4fbd0000 fffff802`4fce6000 rt640x64 (deferred)
fffff802`4fcf0000 fffff802`4fd13000 nvhda64v (deferred)
fffff802`4fd20000 fffff802`4fd52000 dump_storahci (deferred)
fffff802`4fd60000 fffff802`4fe42000 dxgmms2 (deferred)
fffff802`4fe50000 fffff802`4fe6b000 monitor (deferred)
fffff802`4fe70000 fffff802`4fe99000 luafv (deferred)
fffff802`4fea0000 fffff802`4fed6000 wcifs (deferred)
fffff802`4fee0000 fffff802`4fef4000 mmcss (deferred)
fffff802`4ff00000 fffff802`4ff80000 cldflt (deferred)
fffff802`4ff90000 fffff802`4ffaa000 storqosflt (deferred)
fffff802`4ffb0000 fffff802`4ffc8000 mslldp (deferred)
fffff802`4ffd0000 fffff802`4fff8000 bindflt (deferred)
fffff802`50020000 fffff802`50038000 lltdio (deferred)
fffff802`50050000 fffff802`503f3000 dxgkrnl (deferred)
fffff802`50c00000 fffff802`50c37000 usbaudio (deferred)
fffff802`50c40000 fffff802`50c52000 hidusb (deferred)
fffff802`50c60000 fffff802`50c9f000 HIDCLASS (deferred)
fffff802`50ca0000 fffff802`50cb3000 HIDPARSE (deferred)
fffff802`50cd0000 fffff802`50d21000 usbvideo (deferred)
fffff802`50d30000 fffff802`50d41000 kbdhid (deferred)
fffff802`50d50000 fffff802`50d64000 kbdclass (deferred)
fffff802`50d70000 fffff802`50d80000 mouhid (deferred)
fffff802`50d90000 fffff802`50da3000 mouclass (deferred)
fffff802`50db0000 fffff802`50dbd000 sshid (deferred)
fffff802`50dc0000 fffff802`50dcb000 mshidkmdf (deferred)
fffff802`50de0000 fffff802`50dee000 dump_diskdump (deferred)
fffff802`50e60000 fffff802`5159b000 RTKVHD64 (deferred)
fffff802`515a0000 fffff802`515d3000 usbccgp (deferred)
fffff802`515e0000 fffff802`515f1000 UAExt (deferred)
fffff802`52600000 fffff802`52621000 drmk (deferred)
fffff802`52630000 fffff802`526a6000 ks (deferred)
fffff802`526b0000 fffff802`5275e000 UcmCxUcsiNvppc (deferred)
fffff802`52760000 fffff802`5278c000 UcmCx (deferred)
fffff802`52790000 fffff802`5279a000 AMDPCIDev (deferred)
fffff802`527a0000 fffff802`527bc000 serial (deferred)
fffff802`527c0000 fffff802`527cf000 serenum (deferred)
fffff802`527d0000 fffff802`527dd000 amdgpio2 (deferred)
fffff802`527e0000 fffff802`52812000 msgpioclx (deferred)
fffff802`52820000 fffff802`5282c000 wmiacpi (deferred)
fffff802`52830000 fffff802`5286b000 amdppm (deferred)
fffff802`52870000 fffff802`5287a000 amdgpio3 (deferred)
fffff802`52880000 fffff802`5288e000 UEFI (deferred)
fffff802`52890000 fffff802`528a1000 nvvad64v (deferred)
fffff802`528b0000 fffff802`528bf000 ksthunk (deferred)
fffff802`528c0000 fffff802`528cd000 NvModuleTracker (deferred)
fffff802`528d0000 fffff802`528e0000 nvvhci (deferred)
fffff802`528f0000 fffff802`528fd000 NdisVirtualBus (deferred)
fffff802`52900000 fffff802`5290c000 swenum (deferred)
fffff802`52910000 fffff802`5291e000 ssdevfactory (deferred)
fffff802`52920000 fffff802`5292e000 rdpbus (deferred)
fffff802`52930000 fffff802`529d3000 UsbHub3 (deferred)
fffff802`529e0000 fffff802`529ee000 USBD (deferred)
fffff802`529f0000 fffff802`52a0d000 dump_dumpfve (deferred)
fffff802`52a10000 fffff802`54b47000 nvlddmkm (deferred)
fffff802`54b50000 fffff802`54b75000 HDAudBus (deferred)
fffff802`54b80000 fffff802`54be6000 portcls (deferred)
fffff802`8ec00000 fffff802`8ecc7000 srv2 (deferred)
fffff802`8ecd0000 fffff802`8ece6000 WdNisDrv (deferred)
fffff802`8ecf0000 fffff802`8ed0c000 MpKslDrv (deferred)
fffff802`8ed30000 fffff802`8ed44000 qwavedrv (deferred)
fffff802`8ef50000 fffff802`8f141000 EasyAntiCheat (deferred)
fffff802`8f150000 fffff802`8f15c000 MSPQM (deferred)
fffff802`8f160000 fffff802`8f16c000 MSPCLOCK (deferred)
fffff802`8fa50000 fffff802`8faa3000 srvnet (deferred)
fffff802`8fab0000 fffff802`8fad7000 Ndu (deferred)
fffff802`8fae0000 fffff802`8fbb6000 peauth (deferred)
fffff802`8fbc0000 fffff802`8fbd5000 tcpipreg (deferred)
fffff88c`ee800000 fffff88c`eeade000 win32kbase (deferred)
fffff88c`eee10000 fffff88c`eeeaa000 win32k (deferred)
fffff88c`efb60000 fffff88c`eff16000 win32kfull (deferred)
fffff88c`eff20000 fffff88c`eff68000 cdd (deferred)
Unloaded modules:
fffff802`8ed50000 fffff802`8ef42000 EasyAntiChea
fffff802`8ed10000 fffff802`8ed21000 MSKSSRV.sys
fffff802`50000000 fffff802`50011000 MSKSSRV.sys
fffff802`4eff0000 fffff802`4efff000 dump_storpor
fffff802`4e640000 fffff802`4e673000 dump_storahc
fffff802`4e6a0000 fffff802`4e6be000 dump_dumpfve
fffff802`50cc0000 fffff802`50ccc000 WdmCompanion
fffff802`4f980000 fffff802`4f99c000 dam.sys
fffff802`46df0000 fffff802`46e01000 WdBoot.sys
fffff802`47e90000 fffff802`47ea1000 hwpolicy.sys
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff80243243951, Address of the instruction which caused the bugcheck
Arg3: ffffda015dbfb920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
SYMSRV: BYINDEX: 0x6
C:\ProgramData\Dbg\sym
mrxsmb.sys
CDB159C093000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\mrxsmb.sys\CDB159C093000\mrxsmb.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\mrxsmb.sys\CDB159C093000\mrxsmb.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\mrxsmb.sys\CDB159C093000\mrxsmb.sys - Mapped image memory
SYMSRV: BYINDEX: 0x7
C:\ProgramData\Dbg\sym
condrv.sys
B47B225413000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\condrv.sys\B47B225413000\condrv.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\condrv.sys\B47B225413000\condrv.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\condrv.sys\B47B225413000\condrv.sys - Mapped image memory
SYMSRV: BYINDEX: 0x8
C:\ProgramData\Dbg\sym
rspndr.sys
9E43BCCD1b000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\rspndr.sys\9E43BCCD1b000\rspndr.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\rspndr.sys\9E43BCCD1b000\rspndr.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\rspndr.sys\9E43BCCD1b000\rspndr.sys - Mapped image memory
SYMSRV: BYINDEX: 0x9
https://msdl.microsoft.com/download/symbols
FLTMGR.SYS
02839B666f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS - OK
SYMSRV: BYINDEX: 0xA
C:\ProgramData\Dbg\sym
win32k.sys
E87370BB9a000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - OK
DBGENG: C:\ProgramData\Dbg\sym\win32k.sys\E87370BB9a000\win32k.sys - Mapped image memory
SYMSRV: BYINDEX: 0xB
C:\ProgramData\Dbg\sym
win32k.pdb
ED706A38659240A066E6FB19B994BAAA1
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: RESULT: 0x00000000
DBGHELP: win32k - public symbols
C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb
SYMSRV: BYINDEX: 0xC
C:\ProgramData\Dbg\sym
FLTMGR.SYS
02839B666f000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS - OK
DBGENG: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS - Mapped image memory
SYMSRV: BYINDEX: 0xD
https://msdl.microsoft.com/download/symbols
Wdf01000.sys
A9A9D36Ed1000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\Wdf01000.sys\A9A9D36Ed1000\Wdf01000.sys - OK
SYMSRV: BYINDEX: 0xE
https://msdl.microsoft.com/download/symbols
dxgkrnl.sys
670B3B6A3a3000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\dxgkrnl.sys\670B3B6A3a3000\dxgkrnl.sys - OK
SYMSRV: BYINDEX: 0xF
https://msdl.microsoft.com/download/symbols
win32kbase.sys
5EBD4C642de000
SYMSRV: PATH: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys
SYMSRV: RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\win32kbase.sys\5EBD4C642de000\win32kbase.sys - OK
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10012
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff80243243951
BUGCHECK_P3: ffffda015dbfb920
BUGCHECK_P4: 0
CONTEXT: ffffda015dbfb920 -- (.cxr 0xffffda015dbfb920)
rax=0000000000000000 rbx=ffffc20d25328060 rcx=ffffc20d25328060
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80243243951 rsp=fffff4011b556448 rbp=ffffda015dc00180
r8=0000000000000000 r9=0000000000000006 r10=00000000ffffffff
r11=0000000000000116 r12=0000000000000001 r13=ffffc20d2d74f080
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040282
nt!KiAcquireKobjectLockSafe+0x21:
fffff802`43243951 cc int 3
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: obs64.exe
BAD_STACK_POINTER: ffffda015dbfb018
STACK_TEXT:
fffff401`1b556448 00000000`00000000 : ffffc20d`26b44950 ffffc20d`2d74f080 ffffc20d`2612f6a0 ffffc20d`2612f6b0 : nt!KiAcquireKobjectLockSafe+0x21
SYMBOL_NAME: nt!KiAcquireKobjectLockSafe+21
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffffda015dbfb920 ; kb
BUCKET_ID_FUNC_OFFSET: 21
FAILURE_BUCKET_ID: 0x3B_80000003_STACKPTR_ERROR_nt!KiAcquireKobjectLockSafe
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {eafbba2c-0896-2578-e7d3-0669752986b0}
Followup: MachineOwner
---------
3: kd> !blackboxpnp
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132532062748504957
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : SW\{96E080C7-143C-11D1-B40F-00A0C9223196}\{3C0D501A-140B-11D1-B40F-00A0C9223196}
VetoString :
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.3, DMIVersion 0, Size=2222]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends Inc.
BiosVersion = 2409
BiosReleaseDate = 12/02/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B450M-K
BaseBoardVersion = Rev X.0x
Easy anti-cheat kaldırın yeterli.
Ben tam olarak sorunu bulamadım. Belki Enes hocam bulabilir.
Enes hocam kısa bir ayrılık yapmış. O yüzden bakamıyor galiba.
Kısa süreli ayrılık
Herkese iyi günler, artık Sosyal'e bir süreliğine dahi olsa bırakma kararı aldım. Nedeni ise 12. sınıf öğrencisi olmam ve derslerime odaklanacak vakti bulamamam. Evet, biliyorum belki daha çözeceğim çok konu vardı ama ne yapalım, artık bunu yapmam gerekirdi. İlk yılımdan üniversiteyi kazanma...www.technopat.net
O yüzden şu anlık benimle devam edeceğiz. Eğer benim bilgim yetmez ise daha bilgili üyelerden yardım isteyeceğim.
Dosyayı tekrar inceledim.
"Dısm" rehberini uygulayın. 3 adımı uygulayın.
Rehber: DISM aracı nedir ve nasıl kullanılır?
Herkese iyi günler. Bu rehberde sizlere DISM komutunun ne işe yaradığını, ne tarz durumlarda kullanılacağını ve nasıl kullanılacağını göstereceğim. İlk önce DISM nedir onu öğrenelim. DISM aracı yani “Deployment Image Servicing and Management” aracı sistemde tıpkı SFC komutunun yaptığı işlev...www.technopat.net
Windows güncelleştirmesi varsa yapın.
Anti virüs ile sistemi taratın. Virüs bulursa temizleyin.
Ekran kartı sürücün güncelliğini kontrol edin.