Çözüldü SYSTEM_SERVICE_EXCEPTION mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

sero26

Decapat
Katılım
25 Haziran 2019
Mesajlar
60
Çözümler
1
Oynayamayacağız. Unloaded modules kısmında göründüğü için kaldırtmıştım, kullanıcı sorunu çözüldükten sonra kurmakta özgür. Özellikle Vanguard kernel seviyesinde çalışan bir AC yazılımı olduğundan mavi ekran tarzı hatalara sebep olabiliyor.

Gördüğüm kadarıyla sizin bir mavi ekran konunuz var ama eski. Hala mavi ekran alıyorsanız yeni bir konu açabilirsiniz.

Hocam bu konuya en hakim sizsiniz, yorumları okudum. Sorun bende de başladı. 2 hafta öncesine kadar bir Valorant oynarken problem yoktu, arkadaşlar bahsettiği gibi mavi ekran alıyorum ne yapabilirim? Ekran kartım falan da yeni değil, güncellemeler sonrası mı oldu bu olay lütfen yardım. Bu arada Minidump dosyası burada bakabilir misiniz?
 
Sisteme BIOS güncellemesini siz mi yaptınız? Şu anki BIOS versiyonu F50a fakat bu sürüm anakartın sitesinde yok, kaldırılmış olabilir. Siz güncellediyseniz belirtin, siz güncellemediyseniz buradan F51 sürümüne güncelleyin BIOS'u.

Sistem bileşenlerinin tamamını belirtin. İşletim sisteminizi 20H2 sürümüne güncelleyin. Belleklere test yapın.
Kod:
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer.  This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned.  This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and bugcheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 0000658489ee9cc8, Actual security check cookie from the stack
Arg2: 0000809ae47dde35, Expected security check cookie
Arg3: ffff7f651b8221ca, Complement of the expected security check cookie
Arg4: 0000000000000000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 23588

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  f7

BUGCHECK_P1: 658489ee9cc8

BUGCHECK_P2: 809ae47dde35

BUGCHECK_P3: ffff7f651b8221ca

BUGCHECK_P4: 0

SECURITY_COOKIE:  Expected 0000809ae47dde35 found 0000658489ee9cc8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT: 
ffffea08`b3b77a38 fffff801`350b0a25     : 00000000`000000f7 00006584`89ee9cc8 0000809a`e47dde35 ffff7f65`1b8221ca : nt!KeBugCheckEx
ffffea08`b3b77a40 fffff801`34fd17fe     : ffffea08`b3b78050 fffff801`34f2c1af fffff801`34cdd154 ffffea08`00000000 : nt!_report_gsfailure+0x25
ffffea08`b3b77a80 fffff801`34fd1793     : ffffea08`b3b77b50 00000000`00000000 ffffea08`b3b78088 ffffea08`b3b78060 : nt!_GSHandlerCheckCommon+0x5a
ffffea08`b3b77ab0 fffff801`34ffe642     : fffff801`34fd1780 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_GSHandlerCheck+0x13
ffffea08`b3b77ae0 fffff801`34f2bf97     : ffffea08`b3b78050 00000000`00000000 ffffea08`b3b78260 fffff801`34f99910 : nt!RtlpExecuteHandlerForException+0x12
ffffea08`b3b77b10 fffff801`34f2ab86     : ffffea08`b3b78a28 ffffea08`b3b78760 ffffea08`b3b78a28 ffff8f8c`3a0f9100 : nt!RtlDispatchException+0x297
ffffea08`b3b78230 fffff801`350078ac     : ffff6a92`57ca5605 00000000`000000fa 00000000`00001000 ffffea08`b3b78ad0 : nt!KiDispatchException+0x186
ffffea08`b3b788f0 fffff801`35003a43     : 00000000`00000103 00000000`00000000 00000000`00000000 ffff8f8c`3a020200 : nt!KiExceptionDispatch+0x12c
ffffea08`b3b78ad0 fffff801`34f99910     : fffff801`343d5e85 00000000`00000000 00000000`00000000 ffff8f8c`00000000 : nt!KiPageFault+0x443
ffffea08`b3b78c68 ffff8f8c`46be03b0     : 00000000`00000000 00000000`00001014 ffffea08`b3b78ea0 ffff8f8c`458110f0 : nt!HalpTscAdvSynchCalculateRemoteDeltas+0x7c
ffffea08`b3b78d68 00000000`00000000     : 00000000`00001014 ffffea08`b3b78ea0 ffff8f8c`458110f0 fffff801`343d5b37 : 0xffff8f8c`46be03b0


SYMBOL_NAME:  nt!_report_gsfailure+25

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  25

FAILURE_BUCKET_ID:  0xF7_MISSING_GSFRAME_nt!_report_gsfailure

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff8ed74351d241, Address of the instruction which caused the bugcheck
Arg3: fffff58a32bc5d80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11146

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffff8ed74351d241

BUGCHECK_P3: fffff58a32bc5d80

BUGCHECK_P4: 0

CONTEXT:  fffff58a32bc5d80 -- (.cxr 0xfffff58a32bc5d80)
rax=ffff8e9902211ae8 rbx=00000364000002e4 rcx=ffff8e9902211ae0
rdx=000000000000c036 rsi=ffff8e9904e8a150 rdi=00000364000002e4
rip=ffff8ed74351d241 rsp=fffff58a32bc6788 rbp=fffff58a32bc6819
 r8=0000000000000001  r9=0000000000000001 r10=ffff8ed74351d230
r11=fffff58a32bc6a80 r12=0000000000000000 r13=fffff58a32bc6920
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
win32kbase!RealGetProp+0x11:
ffff8ed7`4351d241 8b4904          mov     ecx,dword ptr [rcx+4] ds:002b:ffff8e99`02211ae4=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

STACK_TEXT: 
fffff58a`32bc6788 ffff8ed7`42ab141f     : 00000000`00000001 ffffa58e`d27841c0 00000000`00000000 ffffa58e`d9ad7080 : win32kbase!RealGetProp+0x11
fffff58a`32bc6790 ffff8ed7`42ab1282     : ffff8e99`00838bd0 fffff58a`32bc6920 00000000`00000000 ffff8e99`04e8a150 : win32kfull!xxxDCEWindowHitTest2Internal+0x8f
fffff58a`32bc6880 ffff8ed7`42aafd3b     : 00000364`000002e4 00000364`000002e4 00000232`f2ae99a0 fffff803`71663168 : win32kfull!xxxDCEWindowHitTestIndirect+0x182
fffff58a`32bc6900 ffff8ed7`42aafca3     : 00000364`000002e4 ffff8e99`00838bd0 00000232`ff9e0760 ffff8e99`06259010 : win32kfull!xxxDCEWindowHitTest+0x47
fffff58a`32bc6970 ffff8ed7`42aaf7e4     : 00000364`000002e4 00000364`000002e4 00000232`ff9e0760 00000000`00000020 : win32kfull!xxxWindowFromPoint+0xe7
fffff58a`32bc6aa0 ffff8ed7`42968cfd     : ffffa58e`dda2e080 00000033`3517e5f8 00000000`00000000 00000000`00000000 : win32kfull!NtUserWindowFromPhysicalPoint+0x24
fffff58a`32bc6ad0 fffff803`718071b8     : ffffa58e`dda2e080 ffffa58e`e05e2960 00000000`00000000 ffffa58e`00000000 : win32k!NtUserWindowFromPoint+0x15
fffff58a`32bc6b00 00007ff9`872312c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000033`3517e598 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`872312c4


SYMBOL_NAME:  win32kbase!RealGetProp+11

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .cxr 0xfffff58a32bc5d80 ; kb

BUCKET_ID_FUNC_OFFSET:  11

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!RealGetProp

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {816ee291-fbc9-93de-c316-b6892e3ab43c}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000178, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8013292ad3d, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5436

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6988

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 178

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8013292ad3d

READ_ADDRESS: fffff801332fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8013320f330: Unable to get Flags value from nt!KdVersionBlock
fffff8013320f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000178

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
fffffa8a`26961e18 fffff801`32a07769     : 00000000`0000000a 00000000`00000178 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffffa8a`26961e20 fffff801`32a03a69     : ffffd487`c4c18b34 fffff801`32d1da92 00012ce6`0000ffff 00000000`000000ff : nt!KiBugCheckDispatch+0x69
fffffa8a`26961f60 fffff801`3292ad3d     : fffffa8a`26962a58 fffffa8a`26962a58 fffffa8a`26962120 000001cd`560deb00 : nt!KiPageFault+0x469
fffffa8a`269620f0 fffff801`32a078ac     : 00000000`00001000 fffffa8a`26962b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x33d
fffffa8a`26962920 fffff801`32a03a43     : ffffbd8f`04e0c080 000001cd`73c81c10 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0x12c
fffffa8a`26962b00 00007ff6`11d5f6b9     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
000000ca`1878f7a0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`11d5f6b9


SYMBOL_NAME:  nt!KiDispatchException+33d

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  33d

FAILURE_BUCKET_ID:  AV_nt!KiDispatchException

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {00781d15-b897-afab-75cd-f83221cbf387}

Followup:     MachineOwner
---------
 
Sisteme BIOS güncellemesini siz mi yaptınız? Şu anki BIOS versiyonu F50a fakat bu sürüm anakartın sitesinde yok, kaldırılmış olabilir. Siz güncellediyseniz belirtin, siz güncellemediyseniz buradan F51 sürümüne güncelleyin BIOS'u.

Sistem bileşenlerinin tamamını belirtin. İşletim sisteminizi 20H2 sürümüne güncelleyin. Belleklere test yapın.
Kod:
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer. This overrun could potentially.
allow a malicious user to gain control of this machine.
DESCRIPTION.
A driver overran a stack-based buffer (or local variable) in a way that would.
have overwritten the function's return address and jumped back to an arbitrary.
address when the function returned. This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user.
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the.
buffer overrun handlers and bugcheck call is the one that overran its local.
variable(s).
Arguments:
Arg1: 0000658489ee9cc8, Actual security check cookie from the stack.
Arg2: 0000809ae47dde35, Expected security check cookie.
Arg3: ffff7f651b8221ca, Complement of the expected security check cookie.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8609.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 23588.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: f7.

BUGCHECK_P1: 658489ee9cc8.

BUGCHECK_P2: 809ae47dde35.

BUGCHECK_P3: ffff7f651b8221ca.

BUGCHECK_P4: 0.

SECURITY_COOKIE: Expected 0000809ae47dde35 found 0000658489ee9cc8.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: Discord.exe.

STACK_TEXT:
ffffea08`b3b77a38 fffff801`350b0a25 : 00000000`000000f7 00006584`89ee9cc8 0000809a`e47dde35 ffff7f65`1b8221ca : nt!KeBugCheckEx.
ffffea08`b3b77a40 fffff801`34fd17fe : ffffea08`b3b78050 fffff801`34f2c1af fffff801`34cdd154 ffffea08`00000000 : nt!_report_gsfailure+0x25.
ffffea08`b3b77a80 fffff801`34fd1793 : ffffea08`b3b77b50 00000000`00000000 ffffea08`b3b78088 ffffea08`b3b78060 : nt!_GSHandlerCheckCommon+0x5a.
ffffea08`b3b77ab0 fffff801`34ffe642 : fffff801`34fd1780 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_GSHandlerCheck+0x13.
ffffea08`b3b77ae0 fffff801`34f2bf97 : ffffea08`b3b78050 00000000`00000000 ffffea08`b3b78260 fffff801`34f99910 : nt!RtlpExecuteHandlerForException+0x12.
ffffea08`b3b77b10 fffff801`34f2ab86 : ffffea08`b3b78a28 ffffea08`b3b78760 ffffea08`b3b78a28 ffff8f8c`3a0f9100 : nt!RtlDispatchException+0x297.
ffffea08`b3b78230 fffff801`350078ac : ffff6a92`57ca5605 00000000`000000fa 00000000`00001000 ffffea08`b3b78ad0 : nt!KiDispatchException+0x186.
ffffea08`b3b788f0 fffff801`35003a43 : 00000000`00000103 00000000`00000000 00000000`00000000 ffff8f8c`3a020200 : nt!KiExceptionDispatch+0x12c.
ffffea08`b3b78ad0 fffff801`34f99910 : fffff801`343d5e85 00000000`00000000 00000000`00000000 ffff8f8c`00000000 : nt!KiPageFault+0x443.
ffffea08`b3b78c68 ffff8f8c`46be03b0 : 00000000`00000000 00000000`00001014 ffffea08`b3b78ea0 ffff8f8c`458110f0 : nt!HalpTscAdvSynchCalculateRemoteDeltas+0x7c.
ffffea08`b3b78d68 00000000`00000000 : 00000000`00001014 ffffea08`b3b78ea0 ffff8f8c`458110f0 fffff801`343d5b37 : 0xffff8f8c`46be03b0.

SYMBOL_NAME: nt!_report_gsfailure+25.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 25.

FAILURE_BUCKET_ID: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}

Followup: MachineOwner.
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: ffff8ed74351d241, Address of the instruction which caused the bugcheck.
Arg3: fffff58a32bc5d80, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 8718.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 11146.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 93.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: ffff8ed74351d241.

BUGCHECK_P3: fffff58a32bc5d80.

BUGCHECK_P4: 0.

CONTEXT: fffff58a32bc5d80 -- (.cxr 0xfffff58a32bc5d80)
rax=ffff8e9902211ae8 rbx=00000364000002e4 rcx=ffff8e9902211ae0.
rdx=000000000000c036 rsi=ffff8e9904e8a150 rdi=00000364000002e4.
rip=ffff8ed74351d241 rsp=fffff58a32bc6788 rbp=fffff58a32bc6819.
r8=0000000000000001 r9=0000000000000001 r10=ffff8ed74351d230.
r11=fffff58a32bc6a80 r12=0000000000000000 r13=fffff58a32bc6920.
r14=0000000000000000 r15=0000000000000001.
iopl=0 nv up ei ng nz na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286.
win32kbase!RealGetProp+0x11:
ffff8ed7`4351d241 8b4904 mov ecx,dword ptr [rcx+4] ds:002b:ffff8e99`02211ae4=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: VALORANT-Win64-Shipping.exe.

STACK_TEXT:
fffff58a`32bc6788 ffff8ed7`42ab141f : 00000000`00000001 ffffa58e`d27841c0 00000000`00000000 ffffa58e`d9ad7080 : win32kbase!RealGetProp+0x11.
fffff58a`32bc6790 ffff8ed7`42ab1282 : ffff8e99`00838bd0 fffff58a`32bc6920 00000000`00000000 ffff8e99`04e8a150 : win32kfull!xxxDCEWindowHitTest2Internal+0x8f.
fffff58a`32bc6880 ffff8ed7`42aafd3b : 00000364`000002e4 00000364`000002e4 00000232`f2ae99a0 fffff803`71663168 : win32kfull!xxxDCEWindowHitTestIndirect+0x182.
fffff58a`32bc6900 ffff8ed7`42aafca3 : 00000364`000002e4 ffff8e99`00838bd0 00000232`ff9e0760 ffff8e99`06259010 : win32kfull!xxxDCEWindowHitTest+0x47.
fffff58a`32bc6970 ffff8ed7`42aaf7e4 : 00000364`000002e4 00000364`000002e4 00000232`ff9e0760 00000000`00000020 : win32kfull!xxxWindowFromPoint+0xe7.
fffff58a`32bc6aa0 ffff8ed7`42968cfd : ffffa58e`dda2e080 00000033`3517e5f8 00000000`00000000 00000000`00000000 : win32kfull!NtUserWindowFromPhysicalPoint+0x24.
fffff58a`32bc6ad0 fffff803`718071b8 : ffffa58e`dda2e080 ffffa58e`e05e2960 00000000`00000000 ffffa58e`00000000 : win32k!NtUserWindowFromPoint+0x15.
fffff58a`32bc6b00 00007ff9`872312c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
00000033`3517e598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`872312c4.

SYMBOL_NAME: win32kbase!RealGetProp+11.

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys.

IMAGE_VERSION: 10.0.19041.662.

STACK_COMMAND: .cxr 0xfffff58a32bc5d80 ; kb.

BUCKET_ID_FUNC_OFFSET: 11.

FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!RealGetProp.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {816ee291-fbc9-93de-c316-b6892e3ab43c}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000178, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8013292ad3d, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5436.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on BORA.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 6988.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 178.

BUGCHECK_P2: ff.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff8013292ad3d.

READ_ADDRESS: fffff801332fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8013320f330: Unable to get Flags value from nt!KdVersionBlock.
fffff8013320f330: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000178.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: VALORANT-Win64-Shipping.exe.

TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000.

STACK_TEXT:
fffffa8a`26961e18 fffff801`32a07769 : 00000000`0000000a 00000000`00000178 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx.
fffffa8a`26961e20 fffff801`32a03a69 : ffffd487`c4c18b34 fffff801`32d1da92 00012ce6`0000ffff 00000000`000000ff : nt!KiBugCheckDispatch+0x69.
fffffa8a`26961f60 fffff801`3292ad3d : fffffa8a`26962a58 fffffa8a`26962a58 fffffa8a`26962120 000001cd`560deb00 : nt!KiPageFault+0x469.
fffffa8a`269620f0 fffff801`32a078ac : 00000000`00001000 fffffa8a`26962b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x33d.
fffffa8a`26962920 fffff801`32a03a43 : ffffbd8f`04e0c080 000001cd`73c81c10 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0x12c.
fffffa8a`26962b00 00007ff6`11d5f6b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443.
000000ca`1878f7a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`11d5f6b9.

SYMBOL_NAME: nt!KiDispatchException+33d.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.685.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 33d.

FAILURE_BUCKET_ID: AV_nt!KiDispatchException.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {00781d15-b897-afab-75cd-f83221cbf387}

Followup: MachineOwner.
---------

Gigabyte B450M S2H anakart, HyperX 8x2 RAM, Ryzen 5 2600 işlemci, GTX 1050 Ti.
Bu arada BIOS kendim güncellemedim.
 
Mesajınızın bildirimi gelmemiş, Sosyal'de gezerken gördüm.

Mavi ekran sorununuz çözüldü mü? Bahsettiğiniz yöntem mavi ekrana çözüm değil gibi, o yüzden soruyorum.
 

Yeni konular

Geri
Yukarı