3 kere üst üste mavi ekran hatası

İşletim sistemi
Windows 10

Erengtx

Kilopat
Katılım
25 Aralık 2016
Mesajlar
42
Daha fazla  
Cinsiyet
Erkek

Merhaba,
Geceden oyun indirmeye bıraktım ve 3 kere mavi ekranla karşılaştım. Daha önce Valorant oyununun anti-cheat yazılımı bu hataya sebep oluyordu, yine o mu sebep oldu acaba?
 
Memtest86 ile RAM testi yapın.
Sfc/ scannow ve DISM komutlarını uygulayın.
DirectX güncelleyin.
HD Tune ile health ve error scan sekmelerini paylaşın.
Dosyalarınızın dökümü aşağıda.

Kod:
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`25c00000 PsLoadedModuleList = 0xfffff804`2682a1b0
Debug session time: Fri May 28 07:07:02.805 2021 (UTC + 3:00)
System Uptime: 0 days 21:41:10.337
Loading Kernel Symbols.
...............................................................
................................................................
............................................................
Loading User Symbols.
Loading unloaded module list.
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`25ff6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffea08`91387530=0000000000000050
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff55dc8090f78, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80432610847, If non-zero, the instruction address which referenced the bad memory.
 address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 8062.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 10321.

 Key : Analysis.Init.CPU.mSec
 Value: 499.

 Key : Analysis.Init.Elapsed.mSec
 Value: 3234.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 87.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: 50.

BUGCHECK_P1: fffff55dc8090f78.

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80432610847.

BUGCHECK_P4: 2

READ_ADDRESS: fffff804268fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 fffff55dc8090f78.

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

TRAP_FRAME: ffffea08913877d0 -- (.trap 0xffffea08913877d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000006c0069 rbx=0000000000000000 rcx=ffff9b89e7d08d40
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80432610847 rsp=ffffea0891387960 rbp=0000000000541d5b
 r8=0000000000000000 r9=0000000000000000 r10=0000fffff5240b49
r11=ffff757dd3200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
dxgkrnl!CCompositionSurface::GetSurfaceUpdate+0x13f:
fffff804`32610847 410f114e78 movups xmmword ptr [r14+78h],xmm1 ds:00000000`00000078=????????????????????????????????
Resetting default scope.

STACK_TEXT:
ffffea08`91387528 fffff804`2608de7d : 00000000`00000050 fffff55d`c8090f78 00000000`00000002 ffffea08`913877d0 : nt!KeBugCheckEx
ffffea08`91387530 fffff804`25f28210 : 00000000`00000000 00000000`00000002 ffffea08`91387850 00000000`00000000 : nt!MiSystemFault+0x147dbd
ffffea08`91387630 fffff804`26004e5e : ffffb180`12bac080 fffff55d`8e8521c0 ffffb180`12bac080 ffffffff`ea042cc8 : nt!MmAccessFault+0x400
ffffea08`913877d0 fffff804`32610847 : fffff55d`8e8521c0 ffff9b89`f54cef98 00000000`00000000 fffff804`326105d3 : nt!KiPageFault+0x35e
ffffea08`91387960 fffff804`3260fc30 : ffff9b89`e6ba0200 ffff9b89`fb7a77f0 00000000`00000000 00000000`00000000 : dxgkrnl!CCompositionSurface::GetSurfaceUpdate+0x13f
ffffea08`913879b0 fffff524`0b472420 : ffff9b89`fb7a77f0 ffffea08`91387b80 00000000`00541d5b ffffea08`91387ad0 : dxgkrnl!CCompositionFrame::GetSurfaceUpdates+0x430
ffffea08`91387a40 fffff524`0b75eda5 : 00000000`00000000 00000024`8ec7f688 00000024`8ec7f694 fffff55d`00000000 : win32kbase!NtDCompositionGetFrameSurfaceUpdates+0x170
ffffea08`91387ad0 fffff804`260086b8 : ffffb180`12bac080 00000000`000003e8 00000000`00000000 00000000`0000025c : win32k!NtDCompositionGetFrameSurfaceUpdates+0x15
ffffea08`91387b00 00007ffb`ddc036e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000024`8ec7f638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ddc036e4

SYMBOL_NAME: dxgkrnl!CCompositionSurface::GetSurfaceUpdate+13f

MODULE_NAME: dxgkrnl.

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.964

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 13f.

FAILURE_BUCKET_ID: AV_INVALID_dxgkrnl!CCompositionSurface::GetSurfaceUpdate

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {6b2b2194-8ee5-5cad-297b-b20effc0d089}

Followup: MachineOwner.
---------

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`6f200000 PsLoadedModuleList = 0xfffff807`6fe2a1b0
Debug session time: Fri May 28 12:42:17.039 2021 (UTC + 3:00)
System Uptime: 0 days 5:34:18.715
Loading Kernel Symbols.
...............................................................
................................................................
.............................................................
Loading User Symbols.
Loading unloaded module list.
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`6f5f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdb8c`eee9e990=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck.
Arg2: fffff8076ebeeb40, Address of the instruction which caused the BugCheck.
Arg3: ffffdb8ceee9f290, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 6093.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 9417.

 Key : Analysis.Init.CPU.mSec
 Value: 421.

 Key : Analysis.Init.Elapsed.mSec
 Value: 17160.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 74.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c000001d.

BUGCHECK_P2: fffff8076ebeeb40.

BUGCHECK_P3: ffffdb8ceee9f290.

BUGCHECK_P4: 0

CONTEXT: ffffdb8ceee9f290 -- (.cxr 0xffffdb8ceee9f290)
rax=ffffb40d284ffd6a rbx=ffffb40d2a0d19c0 rcx=ffffb40d284ffdf0
rdx=ffffffffffffffd6 rsi=ffffb40d284ffd3c rdi=0000000000000000
rip=fffff8076ebeeb40 rsp=ffffdb8ceee9fc98 rbp=00000000000000c4
 r8=0000000000000006 r9=0000000000000002 r10=ffffb40d1a92cc00
r11=ffffb40d284ffdd6 r12=00000000000000fc r13=ffffb40d20242030
r14=0000000000000030 r15=ffffb40d29fb4a20
iopl=0 nv up ei pl nz na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
FLTMGR!memcpy+0x240:
fffff807`6ebeeb40 0f104c11f0 movups xmm1,xmmword ptr [rcx+rdx-10h] ds:002b:ffffb40d`284ffdb6=005c0065007000690070006e0075005c
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Web Helper.exe

STACK_TEXT:
ffffdb8c`eee9fc98 fffff807`6ec196a9 : ffffb40d`2a0d19c0 ffffb40d`29f63c60 ffffb40d`284ffd3c 00000000`00000000 : FLTMGR!memcpy+0x240
ffffdb8c`eee9fca0 fffff807`6ec1a26e : ffffb40d`29197360 00000000`00000000 00000000`00000000 ffffb40d`291973c8 : FLTMGR!FltpGetFileName+0x279
ffffdb8c`eee9fd40 fffff807`6ec1aadb : ffffb40d`2a0d1900 ffffb40d`2a0d19c0 ffffb40d`2022e710 00000000`00000000 : FLTMGR!FltpGetNormalizedFileNameWorker+0x5e
ffffdb8c`eee9fdc0 fffff807`6ebe32de : ffffb40d`291973c8 ffffdb8c`eeea1000 ffffdb8c`eee9b000 fffff807`6ec0a060 : FLTMGR!FltpCreateFileNameInformation+0x2eb
ffffdb8c`eee9fe40 fffff807`6ebe40a1 : 00000000`00008000 ffffdb8c`ffff7fff ffffb40d`29197360 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x39e
ffffdb8c`eee9fef0 fffff807`749ed3c7 : ffffb40d`2a0d19c0 ffffb40d`201a6a20 ffffdb8c`eee9ffd0 ffffc882`61404980 : FLTMGR!FltGetFileNameInformation+0x101
ffffdb8c`eee9ff80 fffff807`749edf07 : ffff9104`c8efbc27 ffffb40d`201a6a20 ffffdb8c`eeea0108 ffffdb8c`eeea0000 : fileinfo!FIStreamQueryInfo+0x97
ffffdb8c`eeea0010 fffff807`6ebe5746 : ffffb40d`273c5010 fffff807`00000001 00000084`14d2d19b 00000000`00000000 : fileinfo!FIPostCreateCallback+0x227
ffffdb8c`eeea00c0 fffff807`6ebe5018 : ffffb40d`2a1e7000 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpPerformPostCallbacksWorker+0x346
ffffdb8c`eeea0190 fffff807`6ebe6d62 : ffffdb8c`eee9b000 ffffdb8c`eeea1000 00000000`00000000 fffff807`6ebfd440 : FLTMGR!FltpPassThroughCompletionWorker+0xf8
ffffdb8c`eeea0230 fffff807`6ec1bbd4 : ffffdb8c`eeea02e0 ffffb40d`29f63cb8 ffffb40d`2010bd60 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x322
ffffdb8c`eeea02a0 fffff807`6f5185b5 : ffffb40d`29f63c00 ffffb40d`201328f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffdb8c`eeea0350 fffff807`6f519ba4 : 00000000`00000000 ffffb40d`273c5010 ffffb40d`201f9f80 ffffb40d`2010bd60 : nt!IofCallDriver+0x55
ffffdb8c`eeea0390 fffff807`6f8e3e2d : ffffdb8c`eeea0650 ffffb40d`201328f0 ffffb40d`29f63cf8 ffffdb8c`00000001 : nt!IoCallDriverWithTracing+0x34
ffffdb8c`eeea03e0 fffff807`6f7f23ce : ffffb40d`201328f0 00000000`00000000 ffffb40d`273be010 ffffb40d`273be001 : nt!IopParseDevice+0x117d
ffffdb8c`eeea0550 fffff807`6f90147a : ffffb40d`273be000 ffffdb8c`eeea07b8 ffffdb8c`00000040 ffffb40d`1a8fb220 : nt!ObpLookupObjectName+0x3fe
ffffdb8c`eeea0720 fffff807`6f8167a5 : 0000007f`00000000 00000000`002be048 00000000`003bde2c 00000000`002be8f0 : nt!ObOpenObjectByNameEx+0x1fa
ffffdb8c`eeea0850 fffff807`6f6086b8 : 00000000`0fe8a400 ffffb40d`2a25d080 ffffb40d`2a0ba080 00000000`002be048 : nt!NtQueryAttributesFile+0x1c5
ffffdb8c`eeea0b00 00007ff8`ce1cd5c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`002be008 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`ce1cd5c4

SYMBOL_NAME: fileinfo!FIStreamQueryInfo+97

MODULE_NAME: fileinfo.

IMAGE_NAME: fileinfo.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr 0xffffdb8ceee9f290 ; kb.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`7d400000 PsLoadedModuleList = 0xfffff806`7e02a1b0
Debug session time: Mon May 24 15:52:38.792 2021 (UTC + 3:00)
System Uptime: 3 days 12:36:36.445
Loading Kernel Symbols.
...............................................................
................................................................
...............................................................
Loading User Symbols.
Loading unloaded module list.
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`7d7f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc80`05c68640=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8516c9033b00, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff8516c91ab03a, If non-zero, the instruction address which referenced the bad memory.
 address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 7187.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 17557.

 Key : Analysis.Init.CPU.mSec
 Value: 405.

 Key : Analysis.Init.Elapsed.mSec
 Value: 14926.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 80.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffff8516c9033b00.

BUGCHECK_P2: 0

BUGCHECK_P3: ffff8516c91ab03a.

BUGCHECK_P4: 0

READ_ADDRESS: fffff8067e0fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffff8516c9033b00.

MM_INTERNAL_CODE: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

TRAP_FRAME: fffffc8005c688e0 -- (.trap 0xfffffc8005c688e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8516c9033af0 rbx=0000000000000000 rcx=ffff853f84717cb0
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=ffff8516c91ab03a rsp=fffffc8005c68a70 rbp=fffffc8005c68b80
 r8=0000000000000008 r9=0000000000000000 r10=0000ffff8516c91f
r11=ffffc1fd8b800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
win32kbase!NtDCompositionConfirmFrame+0x22a:
ffff8516`c91ab03a 488b4010 mov rax,qword ptr [rax+10h] ds:ffff8516`c9033b00=????????????????
Resetting default scope.

STACK_TEXT:
fffffc80`05c68638 fffff806`7d88e12d : 00000000`00000050 ffff8516`c9033b00 00000000`00000000 fffffc80`05c688e0 : nt!KeBugCheckEx
fffffc80`05c68640 fffff806`7d728210 : ffff870a`cbf9bba0 00000000`00000000 fffffc80`05c68960 00000000`00000000 : nt!MiSystemFault+0x14806d
fffffc80`05c68740 fffff806`7d804e5e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`7dacd9a0 : nt!MmAccessFault+0x400
fffffc80`05c688e0 ffff8516`c91ab03a : fffffc80`05c68b80 ffff853f`8e3c3690 ffff853f`80608a30 ffff870a`ccb54d10 : nt!KiPageFault+0x35e
fffffc80`05c68a70 ffff8516`c8c3ea8d : 00000000`00000004 00000000`00000007 ffff853f`80608a30 ffffe70d`914356a0 : win32kbase!NtDCompositionConfirmFrame+0x22a
fffffc80`05c68ad0 fffff806`7d8086b8 : ffff870a`cfaf3080 ffff870a`cfaf3080 000001dc`86fcc6b8 00000000`00000020 : win32k!NtDCompositionConfirmFrame+0x15
fffffc80`05c68b00 00007ffe`9b013464 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003c`7e2ff7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`9b013464

SYMBOL_NAME: win32kbase!NtDCompositionConfirmFrame+22a

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`2ee00000 PsLoadedModuleList = 0xfffff800`2fa2a1b0
Debug session time: Fri May 21 03:15:21.506 2021 (UTC + 3:00)
System Uptime: 0 days 17:57:01.182
Loading Kernel Symbols.
...............................................................
................................................................
...............................................................
Loading User Symbols.
Loading unloaded module list.
.........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`2f1f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8205`04d7e0a0=000000000000010e
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that.
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the BugCheck:
Arg2: ffffa700b75c0b70.
Arg3: 0000000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 7875.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 41633.

 Key : Analysis.Init.CPU.mSec
 Value: 436.

 Key : Analysis.Init.Elapsed.mSec
 Value: 12502.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 82.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: 10e.

BUGCHECK_P1: 33.

BUGCHECK_P2: ffffa700b75c0b70.

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

STACK_TEXT:
ffff8205`04d7e098 fffff800`3e943ad0 : 00000000`0000010e 00000000`00000033 ffffa700`b75c0b70 00000000`00000000 : nt!KeBugCheckEx
ffff8205`04d7e0a0 fffff800`4285818b : 00000000`00000000 ffffa700`b75c0c70 ffff830a`af77a000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
ffff8205`04d7e0e0 fffff800`427c1caa : ffffa700`b75c0b70 00000000`00000000 ffffa700`bc6d4cd0 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x2538f
ffff8205`04d7e120 fffff800`42832dd9 : ffffa700`b75c0b70 00000000`00000000 ffffa700`bc6d4cd0 ffff830a`b0111010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
ffff8205`04d7e150 fffff800`42832845 : 00000000`00000000 ffffa700`bc6d4cd0 ffffa700`b75c0b70 ffff830a`b0b04080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
ffff8205`04d7e180 fffff800`427c1cee : ffffa700`bb2a1490 ffff8205`04d7e339 ffff830a`b0111010 01000000`001000ff : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
ffff8205`04d7e240 fffff800`3e6e86d9 : 00000000`00000030 00000000`00000799 00000000`00000000 ffff830a`a5169270 : dxgmms2!VidMmCloseAdapter+0x1e
ffff8205`04d7e270 fffff800`3e6b02df : ffff830a`a0010100 fffff800`2f112172 ffff830a`a0010340 00000000`000000ff : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
ffff8205`04d7e2a0 fffff800`3e6822d9 : ffffa700`bb2a1490 ffffa700`00000002 ffffa700`bb2a1490 ffff830a`b0111010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
ffff8205`04d7e3a0 fffff800`3e6c2429 : ffff830a`b010f000 fffff800`00000001 ffff830a`b010f000 ffffa700`b7dd4e70 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
ffff8205`04d7e430 fffff800`3e6b36e5 : ffff830a`b2d32040 ffff8205`04d7e580 00000000`0000034c ffffa700`b7dd4d80 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
ffff8205`04d7e480 fffff800`3e6b2fc5 : ffffa700`b7dd4d80 ffff830a`b0108600 ffffa700`b7dd4d80 ffff8205`04d7e8f9 : dxgkrnl!DXGPROCESS::Destroy+0x341
ffff8205`04d7e6f0 fffff800`3e59b151 : 00000000`00000000 ffff830a`bd4d37b0 00000000`00000000 fffff800`00000000 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8205`04d7e840 fffff800`2f40244f : 00000000`00000000 ffff830a`a501a1d0 ffff830a`b0b0b1c0 ffff830a`a50f8a10 : dxgkrnl!DxgkProcessNotify+0x1a1
ffff8205`04d7e890 fffff800`2f41d234 : ffff830a`b0b0b100 ffff830a`b0b0b1c0 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8205`04d7e960 fffff800`2f45b812 : ffff830a`b0b044b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
ffff8205`04d7e990 fffff800`2f45ed7e : ffff830a`d00002fe 00000000`00000001 00000000`00000000 0000008a`5ad48000 : nt!PspExitThread+0x5b2
ffff8205`04d7ea90 fffff800`2f2086b8 : ffff830a`b0b0b1c0 ffff830a`b0b04080 ffff8205`04d7eb80 ffff830a`b0b0b1c0 : nt!NtTerminateProcess+0xde
ffff8205`04d7eb00 00007ffa`d6ead3a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008a`5aaefcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d6ead3a4

SYMBOL_NAME: dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+2538f

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.964

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2538f.

FAILURE_BUCKET_ID: 0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup: MachineOwner.
---------

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`2ce00000 PsLoadedModuleList = 0xfffff806`2da2a1b0
Debug session time: Fri May 28 12:43:23.046 2021 (UTC + 3:00)
System Uptime: 0 days 0:00:29.722
Loading Kernel Symbols.
...............................................................
................................................................
..............................................................
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`2d1f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff806`32689d30=000000000000007f
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
 use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
 use .trap on that value.
Else.
 .trap on the appropriate frame will show where the trap was taken.
 (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff80632689e70.
Arg3: fffff80632662000.
Arg4: fffff8062b6e18f4.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 5608.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 13496.

 Key : Analysis.Init.CPU.mSec
 Value: 437.

 Key : Analysis.Init.Elapsed.mSec
 Value: 9773.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 75.

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: 7f.

BUGCHECK_P1: 8

BUGCHECK_P2: fffff80632689e70.

BUGCHECK_P3: fffff80632662000.

BUGCHECK_P4: fffff8062b6e18f4.

TRAP_FRAME: fffff80632689e70 -- (.trap 0xfffff80632689e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8062b6e28d0
rdx=000000547ee7c7a8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062b6e18f4 rsp=fffff80632662000 rbp=ffff9e8235139cb0
 r8=0000000000000030 r9=00000000139a581f r10=fffff8062b7abee0
r11=0000000000001000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
clipsp!WarbirdRuntime::CTermination::TrashStack+0x14:
fffff806`2b6e18f4 51 push rcx.
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

BAD_STACK_POINTER: fffff80632662000.

STACK_TEXT:
fffff806`32689d28 fffff806`2d208c69 : 00000000`0000007f 00000000`00000008 fffff806`32689e70 fffff806`32662000 : nt!KeBugCheckEx
fffff806`32689d30 fffff806`2d203a83 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`32689e70 fffff806`2b6e18f4 : 3513ac90`00000000 00000000`ffff9e82 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
fffff806`32662000 3513ac90`00000000 : 00000000`ffff9e82 00000000`00000000 00000000`00000000 3268a000`00000000 : clipsp!WarbirdRuntime::CTermination::TrashStack+0x14
fffff806`32662008 00000000`ffff9e82 : 00000000`00000000 00000000`00000000 3268a000`00000000 32698000`fffff806 : 0x3513ac90`00000000
fffff806`32662010 00000000`00000000 : 00000000`00000000 3268a000`00000000 32698000`fffff806 32691000`fffff806 : 0xffff9e82.

SYMBOL_NAME: clipsp!WarbirdRuntime::CTermination::TrashStack+14

MODULE_NAME: clipsp.

IMAGE_NAME: clipsp.sys

IMAGE_VERSION: 10.0.19041.964

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 14.

FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_clipsp!WarbirdRuntime::CTermination::TrashStack

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {090c450c-1ce9-5c8f-9568-ce7e04bbf9cb}

Followup: MachineOwner.
---------
 
Son düzenleme:
Merhaba yaptığınız işlemleri yapamadım çünkü finallerimle uğraşmaktaydım, özür dilerim. Şimdi işlemlere memtest ile başlıycam fakat öncesinde hala sorunun çözümü önceki yazdıklarınız mı diye sormak için son iki günün minidumpını da paylaşmak istedim.
 
Merhaba yaptığınız işlemleri yapamadım çünkü finallerimle uğraşmaktaydım, özür dilerim. Şimdi işlemlere Memtest ile başlıycam fakat öncesinde hala sorunun çözümü önceki yazdıklarınız mı diye sormak için son iki günün minidumpını da paylaşmak istedim.

Sıkıntı değil. İyi çalışmalar :). İlk öncelikle dosyanızı aşağıdaki rehber ile kullanılabilir hale getirin.
 

Tamamdır. Analiz edip size geri dönüş yapacağım.
@Erengtx ben birkaç gün bilgisayarda olamayacağım. Benim yerime başka birisi baksa iyi olur gibi.
@Erengtx biraz geç cevapladım kusura bakmayın. Bilgisayarımda sürücü sıkıntısı çekiyordum da. Şimdilik sorunu çözdüm ve mavi ekran konularına şimdi bakabildim.
Memtest86 ile RAM testi yapın.
SFC/scannow ve DISM komutlarını uygulayın.
Ses sürücülerinizi güncelleyin.
 
Son düzenleme:

Yeni konular

Geri
Yukarı