We've updated WinDbg to have more modern visuals, faster windows, a full-fledged scripting experience, and Time Travel Debugging, all with the easily extensible debugger data model front and center. WinDbg is using the same underlying engine as WinDbg (classic), so all the commands, extensions...
www.microsoft.com
Bu uygulamayı indirin sonra minidump dosyasını bu uygulama aracılığıyla açın.
Bir süre bekleyin sonra orada yazılar akacak. Sonrasında mavi renkli üzerine tıklanılabilen bir yazı çıkacak. Ona tıklayın ve bekleyin.
Sonrasında sonuna kadar bekleyerek oradaki hata sebepleri yazacak. Orayı kopyalayıp buraya yapıştırın.
Mağaza önbelleğini temizlemem gerekiyordu yaptım çalıştı, belki ihtiyacı olan olur yazayım burayada. WSReset.exe bunu çalıştıra yazacaksınız ve bekleyeceksiniz.
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Şehri KARAHAN\Desktop\Yeni klasör\022522-18687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`0bc00000 PsLoadedModuleList = 0xfffff805`0c82a2d0
Debug session time: Fri Feb 25 15:01:30.253 2022 (UTC + 3:00)
System Uptime: 0 days 0:52:51.920
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`0bff7610 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc784`2e68a6c0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80519e578fa, Address of the instruction which caused the BugCheck
Arg3: ffffc7842e68afc0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Şehri KARAHAN\Desktop\Yeni klasör\022522-18703-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`39400000 PsLoadedModuleList = 0xfffff805`3a02a2d0
Debug session time: Fri Feb 25 16:20:01.031 2022 (UTC + 3:00)
System Uptime: 0 days 1:18:04.698
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`397f7610 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffee8f`2020d570=0000000000000050
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff805360226dd, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
READ_ADDRESS: fffff8053a0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffd0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffee8f2020d810 -- (.trap 0xffffee8f2020d810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd981aca50d70
rdx=ffffd981aca50de8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805360226dd rsp=ffffee8f2020d9a0 rbp=ffffd981aca50de8
r8=0000000000000000 r9=0000000000000000 r10=fffff80539723e60
r11=ffffc40774fd28d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::CheckBudgetRefreshConditionOnProcessMemoryChange+0xb5:
fffff805`360226dd 4d8b51d0 mov r10,qword ptr [r9-30h] ds:ffffffff`ffffffd0=????????????????
Resetting default scope
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Şehri KARAHAN\Desktop\Yeni klasör\022522-21671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`7e800000 PsLoadedModuleList = 0xfffff805`7f42a2d0
Debug session time: Fri Feb 25 16:36:32.265 2022 (UTC + 3:00)
System Uptime: 0 days 0:16:04.932
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`7ebf7610 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaf0a`36f0ed60=000000000000003b
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck
Arg2: fffff80583e206fa, Address of the instruction which caused the BugCheck
Arg3: ffffaf0a36f0f660, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Hocam xmp açık değil ramlerin stok hızı 2666mhz ben 2933mhz çektim manuel overcloke ile 1aya yakındır kullanıyordum bugün stoka çektim sonra yine 2933e çektim bir şey denemek için ondan sonra böyle olmaya başladı ramleri mi bozdum yani?
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Şehri KARAHAN\Desktop\Yeni klasör\022522-18703-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`39400000 PsLoadedModuleList = 0xfffff805`3a02a2d0
Debug session time: Fri Feb 25 16:20:01.031 2022 (UTC + 3:00)
System Uptime: 0 days 1:18:04.698
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`397f7610 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffee8f`2020d570=0000000000000050
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffd0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff805360226dd, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
READ_ADDRESS: fffff8053a0fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffd0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffee8f2020d810 -- (.trap 0xffffee8f2020d810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd981aca50d70
rdx=ffffd981aca50de8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805360226dd rsp=ffffee8f2020d9a0 rbp=ffffd981aca50de8
r8=0000000000000000 r9=0000000000000000 r10=fffff80539723e60
r11=ffffc40774fd28d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::CheckBudgetRefreshConditionOnProcessMemoryChange+0xb5:
fffff805`360226dd 4d8b51d0 mov r10,qword ptr [r9-30h] ds:ffffffff`ffffffd0=????????????????
Resetting default scope
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Şehri KARAHAN\Desktop\Yeni klasör\022522-21671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`7e800000 PsLoadedModuleList = 0xfffff805`7f42a2d0
Debug session time: Fri Feb 25 16:36:32.265 2022 (UTC + 3:00)
System Uptime: 0 days 0:16:04.932
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`7ebf7610 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaf0a`36f0ed60=000000000000003b
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck
Arg2: fffff80583e206fa, Address of the instruction which caused the BugCheck
Arg3: ffffaf0a36f0f660, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Hocam xmp açık değil ramlerin stok hızı 2666mhz ben 2933mhz çektim manuel overcloke ile 1aya yakındır kullanıyordum bugün stoka çektim sonra yine 2933e çektim bir şey denemek için ondan sonra böyle olmaya başladı ramleri mi bozdum yani?
Ayarlanıcak bir şey yok hocam anakart default voktajda 2933 hızında sıkıntı çıkarmıyor yani tek yaptığım 2666mhz 2933 yapmak sıkıntı yapmaya devam ederse stok ayara çekicem bahsettiğiniz program çok uzun sürdüğü için windowstan bellek tanılama yapıyorum bakayım o hata bulucak mı mesela youtubedan video izlerken video bir hata kodu ile kapanıyor ilginç gerçekten.