1660 Ti sistemde mavi ekran hatası

İşletim sistemi
Windows 10

dgknaltnts

Decapat
Katılım
1 Kasım 2020
Mesajlar
93
Çözümler
1
Daha fazla  
Cinsiyet
Erkek

Sistem özellikleri:
AMD Ryzen 2600.
16 GB RAM.
1660 Ti ekran kartı.
MSI B450M PRO anakart.
Xpower 650W 80Plus.
Corsair M.2 SSD Seagate 1TB harddisk.

Arkadaşımın sistemidir. Son günlerde mavi ekran hataları alıyormuş, dosyaları paylaştım yardımcı olur musunuz?
 
Mavi ekran ise sorun software ya da hardware olabilir sorun software ise format yapmani öniririm hardware ise sorun bilgisayarcıya almanı öniririm cunku sorun bir RAM. Ekran karti ya da hard diskle kaynakli olabilr ve bazin sorun PSU'dan olabilir
 
Artı -1 Eksi
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff860c120cb8f0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffff860c120cb8f0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7281

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 63522

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff860c120cb8f0

BUGCHECK_P2: 11

BUGCHECK_P3: ffff860c120cb8f0

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff8031bf713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031be283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8031be283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff860c120cb8f0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SteelSeriesEngine3.exe

TRAP_FRAME:  ffff978704e2ffd0 -- (.trap 0xffff978704e2ffd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=7c2b73457d680000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff860c120cb8f0 rsp=ffff978704e30160 rbp=0000000000000001
r8=ffffc604d4e3e6d0  r9=0000000000000002 r10=fffff8031d70b3c0
r11=ffffc604d4e3cc90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffff860c`120cb8f0 04f1            add     al,0F1h
Resetting default scope

STACK_TEXT:
ffff9787`04e2fd28 fffff803`1bc0de82     : 00000000`00000050 ffff860c`120cb8f0 00000000`00000011 ffff9787`04e2ffd0 : nt!KeBugCheckEx
ffff9787`04e2fd30 fffff803`1bacaaff     : ffff9787`04e305c0 00000000`00000011 00000000`00000000 ffff860c`120cb8f0 : nt!MiSystemFault+0x198d62
ffff9787`04e2fe30 fffff803`1bbd1b5e     : ffffc604`c1ce8170 00000000`00000400 00000000`10000004 ffff9787`04e30060 : nt!MmAccessFault+0x34f
ffff9787`04e2ffd0 ffff860c`120cb8f0     : ffff9787`04e30219 fffff803`1d6e4a8c ffff860c`120cb8f0 00000000`00000000 : nt!KiPageFault+0x35e
ffff9787`04e30160 ffff9787`04e30219     : fffff803`1d6e4a8c ffff860c`120cb8f0 00000000`00000000 00000000`00000000 : 0xffff860c`120cb8f0
ffff9787`04e30168 fffff803`1d6e4a8c     : ffff860c`120cb8f0 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9787`04e30219
ffff9787`04e30170 fffff803`1d6e2f8c     : ffff9787`04e30310 ffff860c`0e780400 ffff9787`04e309f2 fffff803`1d6e6400 : FLTMGR!FltpPerformPreCallbacks+0x2fc
ffff9787`04e30280 fffff803`1d71c981     : 00000000`00000000 ffff9787`04e3062c 00000000`00000000 ffff860c`06639d60 : FLTMGR!FltpPassThroughFastIo+0x8c
ffff9787`04e302e0 fffff803`1c0bb96f     : 00000000`6d4e6f49 fffff803`1bd6e06d ffff860c`00000003 00000000`00000000 : FLTMGR!FltpFastIoQueryOpen+0x131
ffff9787`04e30380 fffff803`1c000e95     : 00000000`00000045 00000000`00000045 ffff860c`06821ab0 ffff9787`00000000 : nt!IopQueryInformation+0x8f
ffff9787`04e303e0 fffff803`1bff666f     : ffff860c`0661a8f0 ffff860c`0661a845 ffff860c`13d47010 00000000`00000001 : nt!IopParseDevice+0xff5
ffff9787`04e30550 fffff803`1bff4ad1     : ffff860c`13d47000 ffff9787`04e30798 00000000`00000040 ffff860c`018edf00 : nt!ObpLookupObjectName+0x78f
ffff9787`04e30710 fffff803`1c016e04     : 00000000`00000001 000000b0`873ff610 00000000`00000028 000000b0`873ff5e0 : nt!ObOpenObjectByNameEx+0x201
ffff9787`04e30850 fffff803`1bbd5358     : 00000000`9338358a ffff9787`04e30b80 ffff860c`10947080 ffff860c`0f3d0860 : nt!NtQueryFullAttributesFile+0x1b4
ffff9787`04e30b00 00007ff8`63d9eee4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`873ff588 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`63d9eee4


SYMBOL_NAME:  nt!MiSystemFault+198d62

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1316

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  198d62

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff978e6e0fa504, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8065e611b6c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7030

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 71678

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff978e6e0fa504

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8065e611b6c

BUGCHECK_P4: 2

READ_ADDRESS: fffff806535713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff806534283b8: Unable to get Flags value from nt!KdVersionBlock
fffff806534283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff978e6e0fa504

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  fffff68b8fa8b690 -- (.trap 0xfffff68b8fa8b690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffcd82da732080
rdx=ffff978e1301daa8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8065e611b6c rsp=fffff68b8fa8b820 rbp=00000000000a735e
r8=fffff68b8fa8b828  r9=00000000ffffffff r10=fffff8065303e220
r11=ffffd0ff56e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
dxgkrnl!CFlipToken::InFrame+0x48c:
fffff806`5e611b6c 4883c458        add     rsp,58h
Resetting default scope

STACK_TEXT:
fffff68b`8fa8b3e8 fffff806`5320de82     : 00000000`00000050 ffff978e`6e0fa504 00000000`00000002 fffff68b`8fa8b690 : nt!KeBugCheckEx
fffff68b`8fa8b3f0 fffff806`530caaff     : fffff68b`8fa8b808 00000000`00000002 00000000`00000000 ffff978e`6e0fa504 : nt!MiSystemFault+0x198d62
fffff68b`8fa8b4f0 fffff806`531d1b5e     : fffff806`5305a570 ffffcc13`4565bd0a 00000000`009fb8d8 fffff68b`8fa8b710 : nt!MmAccessFault+0x34f
fffff68b`8fa8b690 fffff806`5e611b6c     : ffff978e`1301da70 ffff978e`00000000 00000000`00000001 ffff978e`1301da70 : nt!KiPageFault+0x35e
fffff68b`8fa8b820 fffff806`5e60eaa6     : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000000 : dxgkrnl!CFlipToken::InFrame+0x48c
fffff68b`8fa8b8c0 ffffcc13`455ee82d     : ffffcd82`d8c1d200 ffffcc33`80607e01 ffff978e`0f1ab920 ffff978e`0ece4c40 : dxgkrnl!CTokenManager::ReleaseToFrame+0x266
fffff68b`8fa8b960 ffffcc13`455ee5e6     : fffff68b`8fa8bb80 fffff68b`8fa8baa8 fffff68b`8fa8ba58 ffff978e`192b80a0 : win32kbase!DirectComposition::CConnection::BeginFrame+0x19d
fffff68b`8fa8ba20 fffff806`531d5358     : 00000000`00000200 ffffcd82`da732080 00000000`000003e8 0000023e`a1229690 : win32kbase!NtDCompositionBeginFrame+0x196
fffff68b`8fa8bb00 00007ffc`30f03404     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000048`e2c1f4d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`30f03404


SYMBOL_NAME:  dxgkrnl!CFlipToken::InFrame+48c

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.18362.1237

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  48c

FAILURE_BUCKET_ID:  AV_INVALID_dxgkrnl!CFlipToken::InFrame

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d32a3d10-6683-49a6-3817-4f3a11d552a8}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000404, The subtype of the bugcheck.
Arg2: ffffcde702342b68
Arg3: 8a0000016cb39963
Arg4: ffffcde702342b6f

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3889

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18202

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 404

BUGCHECK_P2: ffffcde702342b68

BUGCHECK_P3: 8a0000016cb39963

BUGCHECK_P4: ffffcde702342b6f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffce04`6373f858 fffff807`3a7ee02c     : 00000000`0000001a 00000000`00000404 ffffcde7`02342b68 8a000001`6cb39963 : nt!KeBugCheckEx
ffffce04`6373f860 fffff807`3a623f75     : fffff807`3aa66f80 00000000`00000000 ffffcde7`02342b68 00000000`00000000 : nt!MiDeleteValidSystemPage+0x1c9adc
ffffce04`6373f900 fffff807`3a60463a     : ffffcde7`02342b60 fffff807`3a605200 fffff807`00000007 8a000001`6cb39963 : nt!MiDeleteKernelStack+0x125
ffffce04`6373f9b0 fffff807`3a604f75     : ffffce04`6373fa08 00000000`00000000 fffff807`3aa669c0 fffff807`3aa66698 : nt!MiDeleteCachedKernelStack+0x4a
ffffce04`6373f9f0 fffff807`3a6f1dae     : fffff807`3aa68480 00000000`ffffffff 00000000`00000001 ffffe28d`b6244010 : nt!MiAdjustCachedStacks+0x115
ffffce04`6373fa30 fffff807`3a8c9a16     : 00000000`00000001 00000000`00000002 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xe6
ffffce04`6373faf0 fffff807`3a78d6c5     : 00000000`00000002 00000000`ffffffff fffff807`3aa68480 00000000`0000052e : nt!MmWorkingSetManager+0x12
ffffce04`6373fb20 fffff807`3a733585     : ffffe28d`b6379080 00000000`00000080 fffff807`3a78d570 c93345ff`c9209b0d : nt!KeBalanceSetManager+0x155
ffffce04`6373fc10 fffff807`3a7cb128     : ffff8001`858de180 ffffe28d`b6379080 fffff807`3a733530 8b4cffaf`6b92e8f7 : nt!PspSystemThreadStartup+0x55
ffffce04`6373fc60 00000000`00000000     : ffffce04`63740000 ffffce04`6373a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiDeleteValidSystemPage+1c9adc

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1316

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1c9adc

FAILURE_BUCKET_ID:  0x1a_404_nt!MiDeleteValidSystemPage

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {57d19cf7-fb4a-adfd-0709-78f77073d319}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
    user space of the system process. Parameter 2 contains the
    address of the attempted write.
Arg2: 0000000000040292
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for vgk.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4359

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 39505

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 4477

BUGCHECK_P2: 40292

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffa7031546f800 -- (.trap 0xffffa7031546f800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000040292 rbx=0000000000000000 rcx=ffffa7031546fbb0
rdx=0000000000000090 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241247b08 rsp=ffffa7031546f990 rbp=000007f37fc25908
r8=fffff80241247b04  r9=ffffa7031546fba8 r10=fffffffffffd4852
r11=ffffa7031546fba0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
vgk+0x447b08:
fffff802`41247b08 0000            add     byte ptr [rax],al ds:00000000`00040292=??
Resetting default scope

STACK_TEXT:
ffffa703`1546f418 fffff802`3344c734     : 00000000`0000001a 00000000`00004477 00000000`00040292 00000000`00000000 : nt!KeBugCheckEx
ffffa703`1546f420 fffff802`3325da22     : 00000000`00000000 00000000`00000002 00000000`00000008 ffffa703`1546f610 : nt!MiCheckFatalAccessViolation+0x12d444
ffffa703`1546f460 fffff802`332cb5cc     : ffffa4ff`ffffffff ffffa480`00000000 ffffa480`00000000 ffffa4d2`40000000 : nt!MiInPagePageTable+0x2f2
ffffa703`1546f5b0 fffff802`332ca8fe     : 00000000`ffce7562 ffffa703`1546f6e0 ffff9481`00000002 ffffa703`00000001 : nt!MiUserFault+0x7dc
ffffa703`1546f660 fffff802`333d1b5e     : 00000000`fff66988 ffffa703`1546f880 00000000`000000ee fffff802`333c5645 : nt!MmAccessFault+0x14e
ffffa703`1546f800 fffff802`41247b08     : fffff802`33200000 00000000`000001f4 ffffa703`1546f9e8 ffff9481`574f2000 : nt!KiPageFault+0x35e
ffffa703`1546f990 fffff802`33200000     : 00000000`000001f4 ffffa703`1546f9e8 ffff9481`574f2000 ffffa807`d3096300 : vgk+0x447b08
ffffa703`1546f998 00000000`000001f4     : ffffa703`1546f9e8 ffff9481`574f2000 ffffa807`d3096300 fffff801`00e00000 : nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)
ffffa703`1546f9a0 ffffa703`1546f9e8     : ffff9481`574f2000 ffffa807`d3096300 fffff801`00e00000 fffff802`40e47500 : 0x1f4
ffffa703`1546f9a8 ffff9481`574f2000     : ffffa807`d3096300 fffff801`00e00000 fffff802`40e47500 fffff802`40e3bbbc : 0xffffa703`1546f9e8
ffffa703`1546f9b0 ffffa807`d3096300     : fffff801`00e00000 fffff802`40e47500 fffff802`40e3bbbc 00000000`000000ee : 0xffff9481`574f2000
ffffa703`1546f9b8 fffff801`00e00000     : fffff802`40e47500 fffff802`40e3bbbc 00000000`000000ee 00000000`00000080 : 0xffffa807`d3096300
ffffa703`1546f9c0 fffff802`40e47500     : fffff802`40e3bbbc 00000000`000000ee 00000000`00000080 00000000`00040286 : 0xfffff801`00e00000
ffffa703`1546f9c8 fffff802`40e3bbbc     : 00000000`000000ee 00000000`00000080 00000000`00040286 00000000`00040286 : vgk+0x47500
ffffa703`1546f9d0 00000000`000000ee     : 00000000`00000080 00000000`00040286 00000000`00040286 00000000`00040256 : vgk+0x3bbbc
ffffa703`1546f9d8 00000000`00000080     : 00000000`00040286 00000000`00040286 00000000`00040256 00000000`00000000 : 0xee
ffffa703`1546f9e0 00000000`00040286     : 00000000`00040286 00000000`00040256 00000000`00000000 fffff802`40e46070 : 0x80
ffffa703`1546f9e8 00000000`00040286     : 00000000`00040256 00000000`00000000 fffff802`40e46070 00000000`00000001 : 0x40286
ffffa703`1546f9f0 00000000`00040256     : 00000000`00000000 fffff802`40e46070 00000000`00000001 ffffa807`d3096300 : 0x40286
ffffa703`1546f9f8 00000000`00000000     : fffff802`40e46070 00000000`00000001 ffffa807`d3096300 00000000`00040202 : 0x40256


SYMBOL_NAME:  vgk+447b08

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  447b08

FAILURE_BUCKET_ID:  0x1a_4477_vgk!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfc1f34f-5511-cf01-9893-b1e85d098e7e}

Followup:     MachineOwner
---------

@thaerd4x zaten sorunun hangi donanım veya yazılım kaynaklı olduğunu görmek için döküm dosyalarını isteyip analiz ediyoruz ya. "Donanım olabilir, yazılım olabilir, donanımsa şunu yapsın, yazılımsa şunu" gibi hiçbir dayanağı olmayan şeyler söyleyerek bu iş olmaz.
 
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff860c120cb8f0, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: ffff860c120cb8f0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7281

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 63522

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff860c120cb8f0

BUGCHECK_P2: 11

BUGCHECK_P3: ffff860c120cb8f0

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff8031bf713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031be283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8031be283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff860c120cb8f0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SteelSeriesEngine3.exe

TRAP_FRAME:  ffff978704e2ffd0 -- (.trap 0xffff978704e2ffd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=7c2b73457d680000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff860c120cb8f0 rsp=ffff978704e30160 rbp=0000000000000001
r8=ffffc604d4e3e6d0  r9=0000000000000002 r10=fffff8031d70b3c0
r11=ffffc604d4e3cc90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffff860c`120cb8f0 04f1            add     al,0F1h
Resetting default scope

STACK_TEXT:
ffff9787`04e2fd28 fffff803`1bc0de82     : 00000000`00000050 ffff860c`120cb8f0 00000000`00000011 ffff9787`04e2ffd0 : nt!KeBugCheckEx
ffff9787`04e2fd30 fffff803`1bacaaff     : ffff9787`04e305c0 00000000`00000011 00000000`00000000 ffff860c`120cb8f0 : nt!MiSystemFault+0x198d62
ffff9787`04e2fe30 fffff803`1bbd1b5e     : ffffc604`c1ce8170 00000000`00000400 00000000`10000004 ffff9787`04e30060 : nt!MmAccessFault+0x34f
ffff9787`04e2ffd0 ffff860c`120cb8f0     : ffff9787`04e30219 fffff803`1d6e4a8c ffff860c`120cb8f0 00000000`00000000 : nt!KiPageFault+0x35e
ffff9787`04e30160 ffff9787`04e30219     : fffff803`1d6e4a8c ffff860c`120cb8f0 00000000`00000000 00000000`00000000 : 0xffff860c`120cb8f0
ffff9787`04e30168 fffff803`1d6e4a8c     : ffff860c`120cb8f0 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff9787`04e30219
ffff9787`04e30170 fffff803`1d6e2f8c     : ffff9787`04e30310 ffff860c`0e780400 ffff9787`04e309f2 fffff803`1d6e6400 : FLTMGR!FltpPerformPreCallbacks+0x2fc
ffff9787`04e30280 fffff803`1d71c981     : 00000000`00000000 ffff9787`04e3062c 00000000`00000000 ffff860c`06639d60 : FLTMGR!FltpPassThroughFastIo+0x8c
ffff9787`04e302e0 fffff803`1c0bb96f     : 00000000`6d4e6f49 fffff803`1bd6e06d ffff860c`00000003 00000000`00000000 : FLTMGR!FltpFastIoQueryOpen+0x131
ffff9787`04e30380 fffff803`1c000e95     : 00000000`00000045 00000000`00000045 ffff860c`06821ab0 ffff9787`00000000 : nt!IopQueryInformation+0x8f
ffff9787`04e303e0 fffff803`1bff666f     : ffff860c`0661a8f0 ffff860c`0661a845 ffff860c`13d47010 00000000`00000001 : nt!IopParseDevice+0xff5
ffff9787`04e30550 fffff803`1bff4ad1     : ffff860c`13d47000 ffff9787`04e30798 00000000`00000040 ffff860c`018edf00 : nt!ObpLookupObjectName+0x78f
ffff9787`04e30710 fffff803`1c016e04     : 00000000`00000001 000000b0`873ff610 00000000`00000028 000000b0`873ff5e0 : nt!ObOpenObjectByNameEx+0x201
ffff9787`04e30850 fffff803`1bbd5358     : 00000000`9338358a ffff9787`04e30b80 ffff860c`10947080 ffff860c`0f3d0860 : nt!NtQueryFullAttributesFile+0x1b4
ffff9787`04e30b00 00007ff8`63d9eee4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`873ff588 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`63d9eee4


SYMBOL_NAME:  nt!MiSystemFault+198d62

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1316

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  198d62

FAILURE_BUCKET_ID:  AV_INVALID_nt!MiSystemFault

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8a33c6b1-a9f1-4efe-025b-a861cc33d6e2}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff978e6e0fa504, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8065e611b6c, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7030

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 71678

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff978e6e0fa504

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8065e611b6c

BUGCHECK_P4: 2

READ_ADDRESS: fffff806535713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff806534283b8: Unable to get Flags value from nt!KdVersionBlock
fffff806534283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff978e6e0fa504

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  fffff68b8fa8b690 -- (.trap 0xfffff68b8fa8b690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffcd82da732080
rdx=ffff978e1301daa8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8065e611b6c rsp=fffff68b8fa8b820 rbp=00000000000a735e
r8=fffff68b8fa8b828  r9=00000000ffffffff r10=fffff8065303e220
r11=ffffd0ff56e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
dxgkrnl!CFlipToken::InFrame+0x48c:
fffff806`5e611b6c 4883c458        add     rsp,58h
Resetting default scope

STACK_TEXT:
fffff68b`8fa8b3e8 fffff806`5320de82     : 00000000`00000050 ffff978e`6e0fa504 00000000`00000002 fffff68b`8fa8b690 : nt!KeBugCheckEx
fffff68b`8fa8b3f0 fffff806`530caaff     : fffff68b`8fa8b808 00000000`00000002 00000000`00000000 ffff978e`6e0fa504 : nt!MiSystemFault+0x198d62
fffff68b`8fa8b4f0 fffff806`531d1b5e     : fffff806`5305a570 ffffcc13`4565bd0a 00000000`009fb8d8 fffff68b`8fa8b710 : nt!MmAccessFault+0x34f
fffff68b`8fa8b690 fffff806`5e611b6c     : ffff978e`1301da70 ffff978e`00000000 00000000`00000001 ffff978e`1301da70 : nt!KiPageFault+0x35e
fffff68b`8fa8b820 fffff806`5e60eaa6     : 00000000`00000001 00000000`00000001 00000000`00000000 00000000`00000000 : dxgkrnl!CFlipToken::InFrame+0x48c
fffff68b`8fa8b8c0 ffffcc13`455ee82d     : ffffcd82`d8c1d200 ffffcc33`80607e01 ffff978e`0f1ab920 ffff978e`0ece4c40 : dxgkrnl!CTokenManager::ReleaseToFrame+0x266
fffff68b`8fa8b960 ffffcc13`455ee5e6     : fffff68b`8fa8bb80 fffff68b`8fa8baa8 fffff68b`8fa8ba58 ffff978e`192b80a0 : win32kbase!DirectComposition::CConnection::BeginFrame+0x19d
fffff68b`8fa8ba20 fffff806`531d5358     : 00000000`00000200 ffffcd82`da732080 00000000`000003e8 0000023e`a1229690 : win32kbase!NtDCompositionBeginFrame+0x196
fffff68b`8fa8bb00 00007ffc`30f03404     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000048`e2c1f4d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`30f03404


SYMBOL_NAME:  dxgkrnl!CFlipToken::InFrame+48c

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.18362.1237

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  48c

FAILURE_BUCKET_ID:  AV_INVALID_dxgkrnl!CFlipToken::InFrame

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d32a3d10-6683-49a6-3817-4f3a11d552a8}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000404, The subtype of the bugcheck.
Arg2: ffffcde702342b68
Arg3: 8a0000016cb39963
Arg4: ffffcde702342b6f

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3889

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18202

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 404

BUGCHECK_P2: ffffcde702342b68

BUGCHECK_P3: 8a0000016cb39963

BUGCHECK_P4: ffffcde702342b6f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffce04`6373f858 fffff807`3a7ee02c     : 00000000`0000001a 00000000`00000404 ffffcde7`02342b68 8a000001`6cb39963 : nt!KeBugCheckEx
ffffce04`6373f860 fffff807`3a623f75     : fffff807`3aa66f80 00000000`00000000 ffffcde7`02342b68 00000000`00000000 : nt!MiDeleteValidSystemPage+0x1c9adc
ffffce04`6373f900 fffff807`3a60463a     : ffffcde7`02342b60 fffff807`3a605200 fffff807`00000007 8a000001`6cb39963 : nt!MiDeleteKernelStack+0x125
ffffce04`6373f9b0 fffff807`3a604f75     : ffffce04`6373fa08 00000000`00000000 fffff807`3aa669c0 fffff807`3aa66698 : nt!MiDeleteCachedKernelStack+0x4a
ffffce04`6373f9f0 fffff807`3a6f1dae     : fffff807`3aa68480 00000000`ffffffff 00000000`00000001 ffffe28d`b6244010 : nt!MiAdjustCachedStacks+0x115
ffffce04`6373fa30 fffff807`3a8c9a16     : 00000000`00000001 00000000`00000002 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xe6
ffffce04`6373faf0 fffff807`3a78d6c5     : 00000000`00000002 00000000`ffffffff fffff807`3aa68480 00000000`0000052e : nt!MmWorkingSetManager+0x12
ffffce04`6373fb20 fffff807`3a733585     : ffffe28d`b6379080 00000000`00000080 fffff807`3a78d570 c93345ff`c9209b0d : nt!KeBalanceSetManager+0x155
ffffce04`6373fc10 fffff807`3a7cb128     : ffff8001`858de180 ffffe28d`b6379080 fffff807`3a733530 8b4cffaf`6b92e8f7 : nt!PspSystemThreadStartup+0x55
ffffce04`6373fc60 00000000`00000000     : ffffce04`63740000 ffffce04`6373a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiDeleteValidSystemPage+1c9adc

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1316

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1c9adc

FAILURE_BUCKET_ID:  0x1a_404_nt!MiDeleteValidSystemPage

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {57d19cf7-fb4a-adfd-0709-78f77073d319}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000004477, A driver tried to write to an unallocated address in the
    user space of the system process. Parameter 2 contains the
    address of the attempted write.
Arg2: 0000000000040292
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for vgk.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4359

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 39505

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 4477

BUGCHECK_P2: 40292

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffa7031546f800 -- (.trap 0xffffa7031546f800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000040292 rbx=0000000000000000 rcx=ffffa7031546fbb0
rdx=0000000000000090 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80241247b08 rsp=ffffa7031546f990 rbp=000007f37fc25908
r8=fffff80241247b04  r9=ffffa7031546fba8 r10=fffffffffffd4852
r11=ffffa7031546fba0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po nc
vgk+0x447b08:
fffff802`41247b08 0000            add     byte ptr [rax],al ds:00000000`00040292=??
Resetting default scope

STACK_TEXT:
ffffa703`1546f418 fffff802`3344c734     : 00000000`0000001a 00000000`00004477 00000000`00040292 00000000`00000000 : nt!KeBugCheckEx
ffffa703`1546f420 fffff802`3325da22     : 00000000`00000000 00000000`00000002 00000000`00000008 ffffa703`1546f610 : nt!MiCheckFatalAccessViolation+0x12d444
ffffa703`1546f460 fffff802`332cb5cc     : ffffa4ff`ffffffff ffffa480`00000000 ffffa480`00000000 ffffa4d2`40000000 : nt!MiInPagePageTable+0x2f2
ffffa703`1546f5b0 fffff802`332ca8fe     : 00000000`ffce7562 ffffa703`1546f6e0 ffff9481`00000002 ffffa703`00000001 : nt!MiUserFault+0x7dc
ffffa703`1546f660 fffff802`333d1b5e     : 00000000`fff66988 ffffa703`1546f880 00000000`000000ee fffff802`333c5645 : nt!MmAccessFault+0x14e
ffffa703`1546f800 fffff802`41247b08     : fffff802`33200000 00000000`000001f4 ffffa703`1546f9e8 ffff9481`574f2000 : nt!KiPageFault+0x35e
ffffa703`1546f990 fffff802`33200000     : 00000000`000001f4 ffffa703`1546f9e8 ffff9481`574f2000 ffffa807`d3096300 : vgk+0x447b08
ffffa703`1546f998 00000000`000001f4     : ffffa703`1546f9e8 ffff9481`574f2000 ffffa807`d3096300 fffff801`00e00000 : nt!SeConvertSecurityDescriptorToStringSecurityDescriptor <PERF> (nt+0x0)
ffffa703`1546f9a0 ffffa703`1546f9e8     : ffff9481`574f2000 ffffa807`d3096300 fffff801`00e00000 fffff802`40e47500 : 0x1f4
ffffa703`1546f9a8 ffff9481`574f2000     : ffffa807`d3096300 fffff801`00e00000 fffff802`40e47500 fffff802`40e3bbbc : 0xffffa703`1546f9e8
ffffa703`1546f9b0 ffffa807`d3096300     : fffff801`00e00000 fffff802`40e47500 fffff802`40e3bbbc 00000000`000000ee : 0xffff9481`574f2000
ffffa703`1546f9b8 fffff801`00e00000     : fffff802`40e47500 fffff802`40e3bbbc 00000000`000000ee 00000000`00000080 : 0xffffa807`d3096300
ffffa703`1546f9c0 fffff802`40e47500     : fffff802`40e3bbbc 00000000`000000ee 00000000`00000080 00000000`00040286 : 0xfffff801`00e00000
ffffa703`1546f9c8 fffff802`40e3bbbc     : 00000000`000000ee 00000000`00000080 00000000`00040286 00000000`00040286 : vgk+0x47500
ffffa703`1546f9d0 00000000`000000ee     : 00000000`00000080 00000000`00040286 00000000`00040286 00000000`00040256 : vgk+0x3bbbc
ffffa703`1546f9d8 00000000`00000080     : 00000000`00040286 00000000`00040286 00000000`00040256 00000000`00000000 : 0xee
ffffa703`1546f9e0 00000000`00040286     : 00000000`00040286 00000000`00040256 00000000`00000000 fffff802`40e46070 : 0x80
ffffa703`1546f9e8 00000000`00040286     : 00000000`00040256 00000000`00000000 fffff802`40e46070 00000000`00000001 : 0x40286
ffffa703`1546f9f0 00000000`00040256     : 00000000`00000000 fffff802`40e46070 00000000`00000001 ffffa807`d3096300 : 0x40286
ffffa703`1546f9f8 00000000`00000000     : fffff802`40e46070 00000000`00000001 ffffa807`d3096300 00000000`00040202 : 0x40256


SYMBOL_NAME:  vgk+447b08

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  447b08

FAILURE_BUCKET_ID:  0x1a_4477_vgk!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfc1f34f-5511-cf01-9893-b1e85d098e7e}

Followup:     MachineOwner
---------

@thaerd4x zaten sorunun hangi donanım veya yazılım kaynaklı olduğunu görmek için döküm dosyalarını isteyip analiz ediyoruz ya. "Donanım olabilir, yazılım olabilir, donanımsa şunu yapsın, yazılımsa şunu" gibi hiçbir dayanağı olmayan şeyler söyleyerek bu iş olmaz.
Teşekkürler
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı