@Recep Baltaş hocam bakar mısın?
Buraya yeni minidump dosyalarını bırakıyorum.
@KojiroHyuga04
Hocam şöyle bırakayım elinden ne gelirse.
Buraya yeni minidump dosyalarını bırakıyorum.
Yeni klasör (1).rar
drive.google.com
Yeni klasör (2).rar
drive.google.com
@KojiroHyuga04
Babaannemin evindeyim bilgisayara erişimim yok, telefondan anca ne oluyor diye takip ediyorum. Maalesef yardımcı olamayacağım özür dilerim.
Hocam şöyle bırakayım elinden ne gelirse.
Kod:
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\kadir\Desktop\061721-8437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`77600000 PsLoadedModuleList = 0xfffff805`7822a230
Debug session time: Thu Jun 17 21:52:51.088 2021 (UTC + 3:00)
System Uptime: 0 days 0:21:32.736
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`779f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaf81`aaa45560=000000000000000a
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8057790a94d, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4452
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8465
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 2592
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8057790a94d
WRITE_ADDRESS: fffff805782fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffaf81aaa456a0 -- (.trap 0xffffaf81aaa456a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000ffff7f rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057790a94d rsp=ffffaf81aaa45830 rbp=ffffdc0bd9843290
r8=0000000000000102 r9=0000000000000000 r10=0000000000000000
r11=ffffaf81aaa458c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei ng nz ac po nc
nt!KiTimerWaitTest+0x19d:
fffff805`7790a94d f02107 lock and dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffffaf81`aaa45558 fffff805`77a08b69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffaf81`aaa45560 fffff805`77a04e69 : 00000000`00000000 ffff9e81`e0200180 ffffdc0b`d94a0080 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaf81`aaa456a0 fffff805`7790a94d : ffffdc0b`d98431c8 ffffaf81`00000000 ffffdc0b`d9843290 00000000`00000000 : nt!KiPageFault+0x469
ffffaf81`aaa45830 fffff805`7790a53c : ffffdc0b`d98431c0 00000000`00000006 ffffaf81`aaa45b18 00000000`00000002 : nt!KiTimerWaitTest+0x19d
ffffaf81`aaa458e0 fffff805`7792279d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000c0b9 : nt!KiProcessExpiredTimerList+0xdc
ffffaf81`aaa459d0 fffff805`779fa78e : ffffffff`00000000 ffff9e81`e0200180 ffff9e81`e020b1c0 ffffdc0b`d9f88080 : nt!KiRetireDpcList+0x5dd
ffffaf81`aaa45c60 00000000`00000000 : ffffaf81`aaa46000 ffffaf81`aaa40000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+19d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 19d
FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: