Hem Valorant, hem Comodo yükledim. Oyuna girdim ve mavi ekranla karşılaştım. Yani tezimiz doğru çıktı. Konu başlığını "Comodo antivirüs, Valorant'ta mavi ekrana sebep olabilir mi?" yerine "Comodo antivirüs, Valorant'ta mavi ekrana sebep oluyor" olarak güncelliyorum.
Garip bir şekilde çoğu kişide APC_INDEX_MISMATCH hatası verirken, bende SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M hatasını verdi. Benzer bir şekilde genellikle ntkrnlmp.exe olurken, bende direkt olarak vgk.sys'yi işaret etti dosya.
İncelemek isteyen olursa minidump dosyasını şuraya bırakayım:
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.
www.mediafire.com
[CODE title="Hata dökümleri"]
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8061ade49d0, The address that the exception occurred at
Arg3: ffffdf8a0ec63ff8, Exception Record Address
Arg4: ffffdf8a0ec63830, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 4217
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 74776
Key : Analysis.Init.CPU.mSec
Value: 578
Key : Analysis.Init.Elapsed.mSec
Value: 10351
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8061ade49d0
BUGCHECK_P3: ffffdf8a0ec63ff8
BUGCHECK_P4: ffffdf8a0ec63830
EXCEPTION_RECORD: ffffdf8a0ec63ff8 -- (.exr 0xffffdf8a0ec63ff8)
ExceptionAddress: fffff8061ade49d0 (vgk+0x00000000000149d0)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000000000026f
Attempt to read from address 000000000000026f
CONTEXT: ffffdf8a0ec63830 -- (.cxr 0xffffdf8a0ec63830)
rax=000000000000026f rbx=0000000000000004 rcx=00000000000002d0
rdx=0000000000000040 rsi=ffffdf8a0ec644e8 rdi=ffffdf8a0ec644f0
rip=fffff8061ade49d0 rsp=ffffdf8a0ec64230 rbp=ffffffff80005028
r8=fffff8061ae1db80 r9=fffff8061ae1eec0 r10=0000fffff8061ade
r11=ffff96ff36a00000 r12=0000000077454700 r13=0000000000000001
r14=000000000000026f r15=0000000001020000
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050216
vgk+0x149d0:
fffff806`1ade49d0 488b00 mov rax,qword ptr [rax] ds:002b:00000000`0000026f=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8060dcfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000026f
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000000000026f
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffdf8a`0ec64230 fffff806`0d2eac9f : fffff806`0d407acc ffffba88`8b544080 ffffdf8a`00501802 ffffdf8a`00000000 : vgk+0x149d0
ffffdf8a`0ec64238 fffff806`0d407acc : ffffba88`8b544080 ffffdf8a`00501802 ffffdf8a`00000000 ffffdf8a`0ec64250 : nt!ExAcquireRundownProtectionCacheAware+0x4f
ffffdf8a`0ec64240 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x297
SYMBOL_NAME: vgk+149d0
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr 0xffffdf8a0ec63830 ; kb
BUCKET_ID_FUNC_OFFSET: 149d0
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
[/CODE]
Olay yeri görüntüsünü de şöyle paylaşayım.