Minidump dosyaları okuma

ExplosiveTR

Hectopat
Katılım
1 Şubat 2020
Mesajlar
369
Çözümler
6
Daha fazla  
Cinsiyet
Erkek
Merhaba, bilgisayarım mavi ekran verdiğiniz için bu yazıyı gördüm ama windbg Preview progamı ile açamıyorum, Win 10 güvenlik sebebiyle engelliyor. Dosyaları okuyabilecek birisi var mı? Çökme sebebi nedir, dosyayı buraya tıklayarak indirebilirsiniz.
 
Son düzenleyen: Moderatör:
Bağlı USB cihazları çıkarın. Klavye ve mouse'u başka porta takın.

Aşağıdaki sürücüleri güncelleyin.
Chipset: https://download.lenovo.com/consumer/mobiles/e0yr02af.exe
Wi-Fi: https://download.lenovo.com/consumer/mobiles/c5lw0aaf07h4.exe
Ethernet: https://download.lenovo.com/consumer/mobiles/9uli01af.exe

Aşağıdaki rehberi uygulayın.


Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Desktop\Minidump\121520-56687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`3e200000 PsLoadedModuleList = 0xfffff801`3ee2a2b0
Debug session time: Tue Dec 15 10:40:24.663 2020 (UTC + 3:00)
System Uptime: 4 days 15:04:31.218
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`3e5f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff970d`7b2a7840=00000000000000ef
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffa18e0e003080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7514

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 31813

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffa18e0e003080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  system32.exe

CRITICAL_PROCESS:  system32.exe

ERROR_CODE: (NTSTATUS) 0x19121080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffff970d`7b2a7838 fffff801`3eb068e2     : 00000000`000000ef ffffa18e`0e003080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff970d`7b2a7840 fffff801`3ea49b39     : 00000000`00000000 fffff801`3e55971d 00000000`00000002 fffff801`3e558d37 : nt!PspCatchCriticalBreak+0x10e
ffff970d`7b2a78e0 fffff801`3e909724     : ffffa18e`00000000 00000000`00000000 ffffa18e`0e003080 ffffa18e`0e0034b8 : nt!PspTerminateAllThreads+0x140b4d
ffff970d`7b2a7950 fffff801`3e909a4c     : ffffa18e`0e003080 00000000`00000000 00000000`76f74d23 fffff801`3e8358fa : nt!PspTerminateProcess+0xe0
ffff970d`7b2a7990 fffff801`3e6071b5     : ffffa18e`0e003080 ffffa18e`19121080 ffff970d`7b2a7a80 ffffa18e`0e003080 : nt!NtTerminateProcess+0x9c
ffff970d`7b2a7a00 00000000`76ec1cfc     : 00000000`76ec1cbb 00000000`76f45c69 00000000`00000023 00000000`00000282 : nt!KiSystemServiceCopyEnd+0x25
00000000`0385ecc8 00000000`76ec1cbb     : 00000000`76f45c69 00000000`00000023 00000000`00000282 00000000`0761ef74 : 0x76ec1cfc
00000000`0385ecd0 00000000`76f45c69     : 00000000`00000023 00000000`00000282 00000000`0761ef74 00000000`0000002b : 0x76ec1cbb
00000000`0385ecd8 00000000`00000023     : 00000000`00000282 00000000`0761ef74 00000000`0000002b 00000000`0a353340 : 0x76f45c69
00000000`0385ece0 00000000`00000282     : 00000000`0761ef74 00000000`0000002b 00000000`0a353340 00000000`0000002c : 0x23
00000000`0385ece8 00000000`0761ef74     : 00000000`0000002b 00000000`0a353340 00000000`0000002c 00000000`00000000 : 0x282
00000000`0385ecf0 00000000`0000002b     : 00000000`0a353340 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x761ef74
00000000`0385ecf8 00000000`0a353340     : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`0385ed00 00000000`0000002c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0xa353340
00000000`0385ed08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0761d7ec : 0x2c


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_19121080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {87b333d3-8bc1-5541-1da4-b4fd7fce4e42}

Followup:     MachineOwner
---------
 
Bağlı USB cihazları çıkarın. Klavye ve Mouse'u başka porta takın.

Aşağıdaki sürücüleri güncelleyin.
Chipset: https://download.lenovo.com/consumer/mobiles/e0yr02af.exe
Wi-Fi: https://download.lenovo.com/consumer/mobiles/c5lw0aaf07h4.exe
Ethernet: https://download.lenovo.com/consumer/mobiles/9uli01af.exe

Aşağıdaki rehberi uygulayın.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\maksu\Desktop\Minidump\121520-56687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff801`3e200000 PsLoadedModuleList = 0xfffff801`3ee2a2b0.
Debug session time: Tue Dec 15 10:40:24.663 2020 (UTC + 3:00)
System Uptime: 4 days 15:04:31.218.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
......................
Loading User Symbols.
Loading unloaded module list.
..................................................
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff801`3e5f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff970d`7b2a7840=00000000000000ef.
0: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
A critical system process died.
Arguments:
Arg1: ffffa18e0e003080, Process object or thread object.
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 7514.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-G2EFLS9.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 31813.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 78.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: ef.

BUGCHECK_P1: ffffa18e0e003080.

BUGCHECK_P2: 0.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

PROCESS_NAME: system32.exe.

CRITICAL_PROCESS: system32.exe.

ERROR_CODE: (NTSTATUS) 0x19121080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

STACK_TEXT:
ffff970d`7b2a7838 fffff801`3eb068e2 : 00000000`000000ef ffffa18e`0e003080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx.
ffff970d`7b2a7840 fffff801`3ea49b39 : 00000000`00000000 fffff801`3e55971d 00000000`00000002 fffff801`3e558d37 : nt!PspCatchCriticalBreak+0x10e.
ffff970d`7b2a78e0 fffff801`3e909724 : ffffa18e`00000000 00000000`00000000 ffffa18e`0e003080 ffffa18e`0e0034b8 : nt!PspTerminateAllThreads+0x140b4d.
ffff970d`7b2a7950 fffff801`3e909a4c : ffffa18e`0e003080 00000000`00000000 00000000`76f74d23 fffff801`3e8358fa : nt!PspTerminateProcess+0xe0.
ffff970d`7b2a7990 fffff801`3e6071b5 : ffffa18e`0e003080 ffffa18e`19121080 ffff970d`7b2a7a80 ffffa18e`0e003080 : nt!NtTerminateProcess+0x9c.
ffff970d`7b2a7a00 00000000`76ec1cfc : 00000000`76ec1cbb 00000000`76f45c69 00000000`00000023 00000000`00000282 : nt!KiSystemServiceCopyEnd+0x25.
00000000`0385ecc8 00000000`76ec1cbb : 00000000`76f45c69 00000000`00000023 00000000`00000282 00000000`0761ef74 : 0x76ec1cfc.
00000000`0385ecd0 00000000`76f45c69 : 00000000`00000023 00000000`00000282 00000000`0761ef74 00000000`0000002b : 0x76ec1cbb.
00000000`0385ecd8 00000000`00000023 : 00000000`00000282 00000000`0761ef74 00000000`0000002b 00000000`0a353340 : 0x76f45c69.
00000000`0385ece0 00000000`00000282 : 00000000`0761ef74 00000000`0000002b 00000000`0a353340 00000000`0000002c : 0x23.
00000000`0385ece8 00000000`0761ef74 : 00000000`0000002b 00000000`0a353340 00000000`0000002c 00000000`00000000 : 0x282.
00000000`0385ecf0 00000000`0000002b : 00000000`0a353340 00000000`0000002c 00000000`00000000 00000000`00000000 : 0x761ef74.
00000000`0385ecf8 00000000`0a353340 : 00000000`0000002c 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b.
00000000`0385ed00 00000000`0000002c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000002c : 0xa353340.
00000000`0385ed08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`0000002c 00000000`0761d7ec : 0x2c.

SYMBOL_NAME: nt!PspCatchCriticalBreak+10e.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 10e.

FAILURE_BUCKET_ID: 0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_19121080_nt!PspCatchCriticalBreak.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {87b333d3-8bc1-5541-1da4-b4fd7fce4e42}

Followup: MachineOwner.
---------

Daha yapmadım. Belki düzelir diye düşündüm, ama DMP dosyasını açabildim. Yine çöktü, çökme sebebi ektedir.
Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\berke\Desktop\121520-48562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`73800000 PsLoadedModuleList = 0xfffff805`7442a2b0
Debug session time: Tue Dec 15 23:08:54.731 2020 (UTC + 3:00)
System Uptime: 0 days 12:27:56.457
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`73bf5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff908b`1c007840=00000000000000ef
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffe405ce4a3080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7077

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-9Q9UBEA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19455

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffe405ce4a3080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  system32.exe

CRITICAL_PROCESS:  system32.exe

ERROR_CODE: (NTSTATUS) 0xc516e080 - <Unable to get error code text>

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffff908b`1c007838 fffff805`741068e2     : 00000000`000000ef ffffe405`ce4a3080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff908b`1c007840 fffff805`74049b39     : 00000000`00000000 fffff805`73b5971d 00000000`00000002 fffff805`73b58d37 : nt!PspCatchCriticalBreak+0x10e
ffff908b`1c0078e0 fffff805`73f09724     : ffffe405`00000000 00000000`00000000 ffffe405`ce4a3080 ffffe405`ce4a34b8 : nt!PspTerminateAllThreads+0x140b4d
ffff908b`1c007950 fffff805`73f09a4c     : ffffe405`ce4a3080 00000000`00000000 00000000`772c4d23 fffff805`73e358fa : nt!PspTerminateProcess+0xe0
ffff908b`1c007990 fffff805`73c071b5     : ffffe405`ce4a3080 ffffe405`c516e080 ffff908b`1c007a80 ffff908b`1c007a80 : nt!NtTerminateProcess+0x9c
ffff908b`1c007a00 00000000`77211cfc     : 00000000`77211cbb 00000000`77295c69 00000000`00000023 00000000`00000282 : nt!KiSystemServiceCopyEnd+0x25
00000000`03f3f168 00000000`77211cbb     : 00000000`77295c69 00000000`00000023 00000000`00000282 00000000`0a0ee0e4 : 0x77211cfc
00000000`03f3f170 00000000`77295c69     : 00000000`00000023 00000000`00000282 00000000`0a0ee0e4 00000000`0000002b : 0x77211cbb
00000000`03f3f178 00000000`00000023     : 00000000`00000282 00000000`0a0ee0e4 00000000`0000002b 00000000`035fb528 : 0x77295c69
00000000`03f3f180 00000000`00000282     : 00000000`0a0ee0e4 00000000`0000002b 00000000`035fb528 00000000`00000033 : 0x23
00000000`03f3f188 00000000`0a0ee0e4     : 00000000`0000002b 00000000`035fb528 00000000`00000033 00000000`00000000 : 0x282
00000000`03f3f190 00000000`0000002b     : 00000000`035fb528 00000000`00000033 00000000`00000000 00000000`00000000 : 0xa0ee0e4
00000000`03f3f198 00000000`035fb528     : 00000000`00000033 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2b
00000000`03f3f1a0 00000000`00000033     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000033 : 0x35fb528
00000000`03f3f1a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000033 00000000`0a0ec970 : 0x33


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_system32.exe_BUGCHECK_CRITICAL_PROCESS_c516e080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {98d2cf22-7260-18d1-7836-c131e65f29cb}

Followup:     MachineOwner
---------
 
DDU ile ekran kartı sürücüsünü kaldırıp yeniden kurun.

SFC rehberini uygulayın. Yukarıda nasıl yapılacağına ait rehber var.

Sonucu bildirin. Hata alırsanız dosyaları paylaşmayı unutmayın.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı