KMODE_EXCEPTION_NOT_HANDLED mavi ekran hatası

Arda GMC

Decapat
Katılım
19 Haziran 2019
Mesajlar
74
Şehirler arası yolculuk yaparken bilgisayarın kasası yaklaşık 70cm gibi bir yükseklikten düştü. Daha sonra PC'yi açınca herhangi bir sorun oluşmadı fakat aradan birkaç saat geçtikten sonra oyun oynarken bu hatalardan biri geldi. Daha sonraki günlerde de oyun oynarken diğer mavi ekran hatalarını verdi. Bu hatalar yazılımsal mıdır donanımsal mıdır onu öğrenebilir miyim ve eğer donanımsalsa hangi parçada sıkıntı olduğunu nasıl anlarım? Şimdiden teşekkürler.

Minidump: DMP.rar
 
Son düzenleyen: Moderatör:
Hatalardan biri Broadcom BlueTooth driver diğeri de Vanguard kaynaklı gibi ama bu illa ki sorunun bu sürücülerden kaynaklandığı anlamına gelmez. İlk iş bir bellek testi yapınız:



Bir de cihazda SSD yoktuysa sabit disk sağlığına mutlaka bakın:


Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: ffff821e55665344, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4703

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17733

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3655

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: ffff821e55665344

BUGCHECK_P3: 1

BUGCHECK_P4: 0

WRITE_ADDRESS: fffff8023defb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

EXCEPTION_PARAMETER1:  0000000000000001

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
fffffd0c`e363d678 fffff802`3d69178f     : 00000000`0000001e ffffffff`c0000005 ffff821e`55665344 00000000`00000001 : nt!KeBugCheckEx
fffffd0c`e363d680 fffff802`3d607eac     : 00000000`00001000 fffffd0c`e363df20 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166d2f
fffffd0c`e363dd40 fffff802`3d604043     : ffffdf05`07f550c0 00000000`00000000 00000000`00000000 ffffdf05`07f550c0 : nt!KiExceptionDispatch+0x12c
fffffd0c`e363df20 ffff821e`55665344     : 00000000`e363e240 00000000`00989680 fffffd0c`e363e1a0 00000437`0000077f : nt!KiPageFault+0x443
fffffd0c`e363e0b8 00000000`e363e240     : 00000000`00989680 fffffd0c`e363e1a0 00000437`0000077f ffff8259`806067e8 : win32kbase+0x65344
fffffd0c`e363e0c0 00000000`00989680     : fffffd0c`e363e1a0 00000437`0000077f ffff8259`806067e8 fffffd0c`e363e1f0 : 0xe363e240
fffffd0c`e363e0c8 fffffd0c`e363e1a0     : 00000437`0000077f ffff8259`806067e8 fffffd0c`e363e1f0 ffff821e`557c3de5 : 0x989680
fffffd0c`e363e0d0 00000437`0000077f     : ffff8259`806067e8 fffffd0c`e363e1f0 ffff821e`557c3de5 00000437`0000077f : 0xfffffd0c`e363e1a0
fffffd0c`e363e0d8 ffff8259`806067e8     : fffffd0c`e363e1f0 ffff821e`557c3de5 00000437`0000077f 00000437`0000077f : 0x00000437`0000077f
fffffd0c`e363e0e0 fffffd0c`e363e1f0     : ffff821e`557c3de5 00000437`0000077f 00000437`0000077f ffff8259`806067e8 : 0xffff8259`806067e8
fffffd0c`e363e0e8 ffff821e`557c3de5     : 00000437`0000077f 00000437`0000077f ffff8259`806067e8 00000000`00000140 : 0xfffffd0c`e363e1f0
fffffd0c`e363e0f0 00000437`0000077f     : 00000437`0000077f ffff8259`806067e8 00000000`00000140 fffffd0c`e363e240 : win32kbase+0x1c3de5
fffffd0c`e363e0f8 00000437`0000077f     : ffff8259`806067e8 00000000`00000140 fffffd0c`e363e240 00000000`00000000 : 0x00000437`0000077f
fffffd0c`e363e100 ffff8259`806067e8     : 00000000`00000140 fffffd0c`e363e240 00000000`00000000 00000000`00000000 : 0x00000437`0000077f
fffffd0c`e363e108 00000000`00000140     : fffffd0c`e363e240 00000000`00000000 00000000`00000000 ffffdf05`01ee7890 : 0xffff8259`806067e8
fffffd0c`e363e110 fffffd0c`e363e240     : 00000000`00000000 00000000`00000000 ffffdf05`01ee7890 00000000`00000000 : 0x140
fffffd0c`e363e118 00000000`00000000     : 00000000`00000000 ffffdf05`01ee7890 00000000`00000000 00000000`00000000 : 0xfffffd0c`e363e240


SYMBOL_NAME:  win32kbase+65344

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  65344

FAILURE_BUCKET_ID:  0x1E_c0000005_W_win32kbase!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ea4dda97-2d75-1dc9-4e24-8eac8def1048}

Followup:     MachineOwner
---------

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8002668ca46, Virtual address for the attempted execute.
Arg2: 80000003b3fb7929, PTE contents.
Arg3: ffffc08fd579c210, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for vgk.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4561

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18214

    Key  : Analysis.Init.CPU.mSec
    Value: 437

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3975

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  fc

BUGCHECK_P1: fffff8002668ca46

BUGCHECK_P2: 80000003b3fb7929

BUGCHECK_P3: ffffc08fd579c210

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

TRAP_FRAME:  ffffc08fd579c210 -- (.trap 0xffffc08fd579c210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08fd579c4e0 rbx=0000000000000000 rcx=00000000000c4fe0
rdx=fffffffff7ffa9ea rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002668ca46 rsp=ffffc08fd579c3a0 rbp=fffffffeb7c9cd3c
 r8=fffff8002e55d6c1  r9=fffffffffffbfdfd r10=ffffc08fd579c5ae
r11=0000000000040202 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
fffff800`2668ca46 0000            add     byte ptr [rax],al ds:ffffc08f`d579c4e0=00
Resetting default scope

STACK_TEXT: 
ffffc08f`d579bf28 fffff800`2aa719f2     : 00000000`000000fc fffff800`2668ca46 80000003`b3fb7929 ffffc08f`d579c210 : nt!KeBugCheckEx
ffffc08f`d579bf30 fffff800`2a82aed6     : fffff800`2668ca46 ffffc08f`d579c130 ffffffff`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x15940a
ffffc08f`d579bf70 fffff800`2a80c960     : ffffac0b`27fcf080 00000000`00000011 ffffc08f`d579c290 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffc08f`d579c070 fffff800`2aa03f5e     : 00000000`00000090 ffffac0b`27fcf080 ffff9486`ae3faca0 00001f80`00000028 : nt!MmAccessFault+0x400
ffffc08f`d579c210 fffff800`2668ca46     : 00000000`00040286 fffff800`2e200004 fffff800`2a600000 00000000`00040282 : nt!KiPageFault+0x35e
ffffc08f`d579c3a0 00000000`00040286     : fffff800`2e200004 fffff800`2a600000 00000000`00040282 ffffac0b`27fcf080 : 0xfffff800`2668ca46
ffffc08f`d579c3a8 fffff800`2e200004     : fffff800`2a600000 00000000`00040282 ffffac0b`27fcf080 ffffc08f`d579c5f0 : 0x40286
ffffc08f`d579c3b0 fffff800`2a600000     : 00000000`00040282 ffffac0b`27fcf080 ffffc08f`d579c5f0 ffffc08f`d579c5f0 : vgk+0x4
ffffc08f`d579c3b8 00000000`00040282     : ffffac0b`27fcf080 ffffc08f`d579c5f0 ffffc08f`d579c5f0 00000000`00040286 : nt!VrpRegistryString <PERF> (nt+0x0)
ffffc08f`d579c3c0 ffffac0b`27fcf080     : ffffc08f`d579c5f0 ffffc08f`d579c5f0 00000000`00040286 ffffac0b`24dbe200 : 0x40282
ffffc08f`d579c3c8 ffffc08f`d579c5f0     : ffffc08f`d579c5f0 00000000`00040286 ffffac0b`24dbe200 00000000`000036e4 : 0xffffac0b`27fcf080
ffffc08f`d579c3d0 ffffc08f`d579c5f0     : 00000000`00040286 ffffac0b`24dbe200 00000000`000036e4 00000000`00000001 : 0xffffc08f`d579c5f0
ffffc08f`d579c3d8 00000000`00040286     : ffffac0b`24dbe200 00000000`000036e4 00000000`00000001 00000000`00000000 : 0xffffc08f`d579c5f0
ffffc08f`d579c3e0 ffffac0b`24dbe200     : 00000000`000036e4 00000000`00000001 00000000`00000000 fffff800`2e200000 : 0x40286
ffffc08f`d579c3e8 00000000`000036e4     : 00000000`00000001 00000000`00000000 fffff800`2e200000 00000000`000036e4 : 0xffffac0b`24dbe200
ffffc08f`d579c3f0 00000000`00000001     : 00000000`00000000 fffff800`2e200000 00000000`000036e4 00000000`00000004 : 0x36e4
ffffc08f`d579c3f8 00000000`00000000     : fffff800`2e200000 00000000`000036e4 00000000`00000004 fffff7fe`ee200000 : 0x1


SYMBOL_NAME:  vgk+4

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4

FAILURE_BUCKET_ID:  0xFC_vgk!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {72ab8b92-5ca4-d395-fbb9-add54d3e4b7f}

Followup:     MachineOwner
---------

6: kd> lmvm vgk
Browse full module list
start             end                 module name
fffff800`2e200000 fffff800`2e81a000   vgk      T (no symbols)           
    Loaded symbol image file: vgk.sys
    Image path: \??\C:\Program Files\Riot Vanguard\vgk.sys
    Image name: vgk.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Apr 27 23:36:44 2021 (608875DC)
    CheckSum:         0062DA6D
    ImageSize:        0061A000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80051afb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcbtums.sys
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4374

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 15379

    Key  : Analysis.Init.CPU.mSec
    Value: 436

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2658

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff80051afb320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff80056c970e0 -- (.trap 0xfffff80056c970e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff80055542350
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800510e475a rsp=fffff80056c97270 rbp=ffffe38af1c19630
 r8=000000000000000f  r9=ffffe38aef26ee10 r10=fffff800510e4740
r11=ffffc1fc98200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KeAcquireSpinLockRaiseToDpc+0x1a:
fffff800`510e475a 8b05f87ea100    mov     eax,dword ptr [nt!KiIrqlFlags (fffff800`51afc658)] ds:fffff800`51afc658=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ForzaHorizon4.exe

DPC_STACK_BASE:  FFFFF80056C97FB0

STACK_TEXT:  
fffff800`56c9ee18 fffff800`5123adce     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff800`56c9ee20 fffff800`5106f9a3     : 00000230`0b50d9dc fffff800`4e91e180 00000000`00000000 fffff800`4e91e180 : nt!KeAccumulateTicks+0x1c8bce
fffff800`56c9ee80 fffff800`5106f48a     : fffff800`51af3a80 fffff800`56c97160 fffff800`574c3f00 00000000`0000b501 : nt!KeClockInterruptNotify+0x453
fffff800`56c9ef30 fffff800`51127f55     : fffff800`51af3a80 fffff800`56c9ef40 00000000`00000010 ffff6b77`750a7332 : nt!HalpTimerClockIpiRoutine+0x1a
fffff800`56c9ef60 fffff800`511f785a     : fffff800`56c97160 fffff800`51af3a80 ffffe38a`f6ab9180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`56c9efb0 fffff800`511f7dc7     : 00000000`00000000 fffff800`51052f55 00000000`00000007 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff800`56c970e0 fffff800`510e475a     : 00000000`00000000 ffffe38a`f16a09f0 ffffffff`ffffffd2 fffff800`510e475a : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff800`56c97270 fffff800`554cb532     : ffffe38a`ef26ee10 ffffe38a`f1c19630 fffff800`511f1ea0 fffff800`510ec5ca : nt!KeAcquireSpinLockRaiseToDpc+0x1a
fffff800`56c972a0 fffff800`554c10d5     : ffffe38a`ead024e0 00000000`00000007 ffffe38a`f1c19a60 fffff800`510ec5ca : ACPI!ACPIIrpDispatchDeviceControl+0x52
fffff800`56c972e0 fffff800`51052f55     : 00000000`00000007 ffffe38a`f1c19a60 ffffe38a`f1c19630 ffffe38a`de9ea3c0 : ACPI!ACPIDispatchIrp+0xc5
fffff800`56c97360 fffff800`4efd63a4     : ffffe38a`e0ffe950 ffffd200`313dd000 00000000`000a9cac 00000000`00001ead : nt!IofCallDriver+0x55
fffff800`56c973a0 ffffe38a`e0ffe950     : ffffd200`313dd000 00000000`000a9cac 00000000`00001ead 00000000`00000009 : bcbtums+0x163a4
fffff800`56c973a8 ffffd200`313dd000     : 00000000`000a9cac 00000000`00001ead 00000000`00000009 ffffe38a`e725f0d0 : 0xffffe38a`e0ffe950
fffff800`56c973b0 00000000`000a9cac     : 00000000`00001ead 00000000`00000009 ffffe38a`e725f0d0 ffffc1fc`98200000 : 0xffffd200`313dd000
fffff800`56c973b8 00000000`00001ead     : 00000000`00000009 ffffe38a`e725f0d0 ffffc1fc`98200000 ffffe38a`f9479d10 : 0xa9cac
fffff800`56c973c0 00000000`00000009     : ffffe38a`e725f0d0 ffffc1fc`98200000 ffffe38a`f9479d10 33c84b10`3bee69d2 : 0x1ead
fffff800`56c973c8 ffffe38a`e725f0d0     : ffffc1fc`98200000 ffffe38a`f9479d10 33c84b10`3bee69d2 2feb4b8f`40aca0f6 : 0x9
fffff800`56c973d0 ffffc1fc`98200000     : ffffe38a`f9479d10 33c84b10`3bee69d2 2feb4b8f`40aca0f6 435f5355`54415453 : 0xffffe38a`e725f0d0
fffff800`56c973d8 ffffe38a`f9479d10     : 33c84b10`3bee69d2 2feb4b8f`40aca0f6 435f5355`54415453 0044454c`45434e41 : 0xffffc1fc`98200000
fffff800`56c973e0 33c84b10`3bee69d2     : 2feb4b8f`40aca0f6 435f5355`54415453 0044454c`45434e41 00000000`00000000 : 0xffffe38a`f9479d10
fffff800`56c973e8 2feb4b8f`40aca0f6     : 435f5355`54415453 0044454c`45434e41 00000000`00000000 00000000`00000000 : 0x33c84b10`3bee69d2
fffff800`56c973f0 435f5355`54415453     : 0044454c`45434e41 00000000`00000000 00000000`00000000 ffffe38a`f9479ce8 : 0x2feb4b8f`40aca0f6
fffff800`56c973f8 0044454c`45434e41     : 00000000`00000000 00000000`00000000 ffffe38a`f9479ce8 00000000`00000202 : 0x435f5355`54415453
fffff800`56c97400 00000000`00000000     : 00000000`00000000 ffffe38a`f9479ce8 00000000`00000202 ffffe38a`f9479a60 : 0x0044454c`45434e41


SYMBOL_NAME:  bcbtums+163a4

MODULE_NAME: bcbtums

IMAGE_NAME:  bcbtums.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  163a4

FAILURE_BUCKET_ID:  0x133_DPC_bcbtums!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d471c926-5825-6837-7392-0f092d814c9f}

Followup:     MachineOwner
---------

0: kd> lmvm bcbtums
Browse full module list
start             end                 module name
fffff800`4efc0000 fffff800`4eff4000   bcbtums  T (no symbols)           
    Loaded symbol image file: bcbtums.sys
    Image path: \SystemRoot\system32\drivers\bcbtums.sys
    Image name: bcbtums.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Mar 24 00:31:26 2015 (5510862E)
    CheckSum:         00031A09
    ImageSize:        00034000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
 
Hatalardan biri Broadcom Bluetooth driver diğeri de Vanguard kaynaklı gibi ama bu illaki sorunun bu sürücülerden kaynaklandığı anlamına gelmez. İlk iş bir bellek testi yapınız:


Bir de cihazda SSD yoktuysa sabit disk sağlığına mutlaka bakın:


Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: ffff821e55665344, The address that the exception occurred at.
Arg3: 0000000000000001, Parameter 0 of the exception.
Arg4: 0000000000000000, Parameter 1 of the exception.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4703.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 17733.

Key : Analysis.Init.CPU.mSec
Value: 421.

Key : Analysis.Init.Elapsed.mSec
Value: 3655.

Key : Analysis.Memory.CommitPeak.Mb
Value: 75.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: ffff821e55665344.

BUGCHECK_P3: 1

BUGCHECK_P4: 0

WRITE_ADDRESS: fffff8023defb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
0000000000000000.

EXCEPTION_PARAMETER1: 0000000000000001.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffffd0c`e363d678 fffff802`3d69178f : 00000000`0000001e ffffffff`c0000005 ffff821e`55665344 00000000`00000001 : nt!KeBugCheckEx
fffffd0c`e363d680 fffff802`3d607eac : 00000000`00001000 fffffd0c`e363df20 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166d2f
fffffd0c`e363dd40 fffff802`3d604043 : ffffdf05`07f550c0 00000000`00000000 00000000`00000000 ffffdf05`07f550c0 : nt!KiExceptionDispatch+0x12c
fffffd0c`e363df20 ffff821e`55665344 : 00000000`e363e240 00000000`00989680 fffffd0c`e363e1a0 00000437`0000077f : nt!KiPageFault+0x443
fffffd0c`e363e0b8 00000000`e363e240 : 00000000`00989680 fffffd0c`e363e1a0 00000437`0000077f ffff8259`806067e8 : win32kbase+0x65344
fffffd0c`e363e0c0 00000000`00989680 : fffffd0c`e363e1a0 00000437`0000077f ffff8259`806067e8 fffffd0c`e363e1f0 : 0xe363e240.
fffffd0c`e363e0c8 fffffd0c`e363e1a0 : 00000437`0000077f ffff8259`806067e8 fffffd0c`e363e1f0 ffff821e`557c3de5 : 0x989680.
fffffd0c`e363e0d0 00000437`0000077f : ffff8259`806067e8 fffffd0c`e363e1f0 ffff821e`557c3de5 00000437`0000077f : 0xfffffd0c`e363e1a0
fffffd0c`e363e0d8 ffff8259`806067e8 : fffffd0c`e363e1f0 ffff821e`557c3de5 00000437`0000077f 00000437`0000077f : 0x00000437`0000077f
fffffd0c`e363e0e0 fffffd0c`e363e1f0 : ffff821e`557c3de5 00000437`0000077f 00000437`0000077f ffff8259`806067e8 : 0xffff8259`806067e8
fffffd0c`e363e0e8 ffff821e`557c3de5 : 00000437`0000077f 00000437`0000077f ffff8259`806067e8 00000000`00000140 : 0xfffffd0c`e363e1f0
fffffd0c`e363e0f0 00000437`0000077f : 00000437`0000077f ffff8259`806067e8 00000000`00000140 fffffd0c`e363e240 : win32kbase+0x1c3de5
fffffd0c`e363e0f8 00000437`0000077f : ffff8259`806067e8 00000000`00000140 fffffd0c`e363e240 00000000`00000000 : 0x00000437`0000077f
fffffd0c`e363e100 ffff8259`806067e8 : 00000000`00000140 fffffd0c`e363e240 00000000`00000000 00000000`00000000 : 0x00000437`0000077f
fffffd0c`e363e108 00000000`00000140 : fffffd0c`e363e240 00000000`00000000 00000000`00000000 ffffdf05`01ee7890 : 0xffff8259`806067e8
fffffd0c`e363e110 fffffd0c`e363e240 : 00000000`00000000 00000000`00000000 ffffdf05`01ee7890 00000000`00000000 : 0x140.
fffffd0c`e363e118 00000000`00000000 : 00000000`00000000 ffffdf05`01ee7890 00000000`00000000 00000000`00000000 : 0xfffffd0c`e363e240

SYMBOL_NAME: win32kbase+65344

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 65344.

FAILURE_BUCKET_ID: 0x1E_c0000005_W_win32kbase!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ea4dda97-2d75-1dc9-4e24-8eac8def1048}

Followup: MachineOwner.
---------

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver.
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8002668ca46, Virtual address for the attempted execute.
Arg2: 80000003b3fb7929, PTE contents.
Arg3: ffffc08fd579c210, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for vgk.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4561.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 18214.

Key : Analysis.Init.CPU.mSec
Value: 437.

Key : Analysis.Init.Elapsed.mSec
Value: 3975.

Key : Analysis.Memory.CommitPeak.Mb
Value: 78.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: fc.

BUGCHECK_P1: fffff8002668ca46.

BUGCHECK_P2: 80000003b3fb7929.

BUGCHECK_P3: ffffc08fd579c210.

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

TRAP_FRAME: ffffc08fd579c210 -- (.trap 0xffffc08fd579c210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08fd579c4e0 rbx=0000000000000000 rcx=00000000000c4fe0
rdx=fffffffff7ffa9ea rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002668ca46 rsp=ffffc08fd579c3a0 rbp=fffffffeb7c9cd3c
r8=fffff8002e55d6c1 r9=fffffffffffbfdfd r10=ffffc08fd579c5ae
r11=0000000000040202 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy.
fffff800`2668ca46 0000 add byte ptr [rax],al ds:ffffc08f`d579c4e0=00
Resetting default scope.

STACK_TEXT:
ffffc08f`d579bf28 fffff800`2aa719f2 : 00000000`000000fc fffff800`2668ca46 80000003`b3fb7929 ffffc08f`d579c210 : nt!KeBugCheckEx
ffffc08f`d579bf30 fffff800`2a82aed6 : fffff800`2668ca46 ffffc08f`d579c130 ffffffff`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x15940a
ffffc08f`d579bf70 fffff800`2a80c960 : ffffac0b`27fcf080 00000000`00000011 ffffc08f`d579c290 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffc08f`d579c070 fffff800`2aa03f5e : 00000000`00000090 ffffac0b`27fcf080 ffff9486`ae3faca0 00001f80`00000028 : nt!MmAccessFault+0x400
ffffc08f`d579c210 fffff800`2668ca46 : 00000000`00040286 fffff800`2e200004 fffff800`2a600000 00000000`00040282 : nt!KiPageFault+0x35e
ffffc08f`d579c3a0 00000000`00040286 : fffff800`2e200004 fffff800`2a600000 00000000`00040282 ffffac0b`27fcf080 : 0xfffff800`2668ca46
ffffc08f`d579c3a8 fffff800`2e200004 : fffff800`2a600000 00000000`00040282 ffffac0b`27fcf080 ffffc08f`d579c5f0 : 0x40286.
ffffc08f`d579c3b0 fffff800`2a600000 : 00000000`00040282 ffffac0b`27fcf080 ffffc08f`d579c5f0 ffffc08f`d579c5f0 : vgk+0x4
ffffc08f`d579c3b8 00000000`00040282 : ffffac0b`27fcf080 ffffc08f`d579c5f0 ffffc08f`d579c5f0 00000000`00040286 : nt!VrpRegistryString <PERF> (nt+0x0)
ffffc08f`d579c3c0 ffffac0b`27fcf080 : ffffc08f`d579c5f0 ffffc08f`d579c5f0 00000000`00040286 ffffac0b`24dbe200 : 0x40282.
ffffc08f`d579c3c8 ffffc08f`d579c5f0 : ffffc08f`d579c5f0 00000000`00040286 ffffac0b`24dbe200 00000000`000036e4 : 0xffffac0b`27fcf080
ffffc08f`d579c3d0 ffffc08f`d579c5f0 : 00000000`00040286 ffffac0b`24dbe200 00000000`000036e4 00000000`00000001 : 0xffffc08f`d579c5f0
ffffc08f`d579c3d8 00000000`00040286 : ffffac0b`24dbe200 00000000`000036e4 00000000`00000001 00000000`00000000 : 0xffffc08f`d579c5f0
ffffc08f`d579c3e0 ffffac0b`24dbe200 : 00000000`000036e4 00000000`00000001 00000000`00000000 fffff800`2e200000 : 0x40286.
ffffc08f`d579c3e8 00000000`000036e4 : 00000000`00000001 00000000`00000000 fffff800`2e200000 00000000`000036e4 : 0xffffac0b`24dbe200
ffffc08f`d579c3f0 00000000`00000001 : 00000000`00000000 fffff800`2e200000 00000000`000036e4 00000000`00000004 : 0x36e4.
ffffc08f`d579c3f8 00000000`00000000 : fffff800`2e200000 00000000`000036e4 00000000`00000004 fffff7fe`ee200000 : 0x1.

SYMBOL_NAME: vgk+4

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 4

FAILURE_BUCKET_ID: 0xFC_vgk!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {72ab8b92-5ca4-d395-fbb9-add54d3e4b7f}

Followup: MachineOwner.
---------

6: kd> lmvm vgk.
Browse full module list.
start end module name.
fffff800`2e200000 fffff800`2e81a000 vgk T (no symbols)
Loaded symbol image file: vgk.sys
Image path: \??\C:\Program Files\Riot Vanguard\vgk.sys
Image name: vgk.sys
Browse all global symbols functions data.
Timestamp: Tue Apr 27 23:36:44 2021 (608875DC)
CheckSum: 0062DA6D.
ImageSize: 0061A000.
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending.
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80051afb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding this single DPC timeout.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcbtums.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4374.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 15379.

Key : Analysis.Init.CPU.mSec
Value: 436.

Key : Analysis.Init.Elapsed.mSec
Value: 2658.

Key : Analysis.Memory.CommitPeak.Mb
Value: 77.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133.

BUGCHECK_P1: 0

BUGCHECK_P2: 501.

BUGCHECK_P3: 500.

BUGCHECK_P4: fffff80051afb320.

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff80056c970e0 -- (.trap 0xfffff80056c970e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff80055542350
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800510e475a rsp=fffff80056c97270 rbp=ffffe38af1c19630
r8=000000000000000f r9=ffffe38aef26ee10 r10=fffff800510e4740
r11=ffffc1fc98200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KeAcquireSpinLockRaiseToDpc+0x1a:
fffff800`510e475a 8b05f87ea100 mov eax,dword ptr [nt!KiIrqlFlags (fffff800`51afc658)] ds:fffff800`51afc658=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: ForzaHorizon4.exe

DPC_STACK_BASE: FFFFF80056C97FB0.

STACK_TEXT:
fffff800`56c9ee18 fffff800`5123adce : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff800`56c9ee20 fffff800`5106f9a3 : 00000230`0b50d9dc fffff800`4e91e180 00000000`00000000 fffff800`4e91e180 : nt!KeAccumulateTicks+0x1c8bce
fffff800`56c9ee80 fffff800`5106f48a : fffff800`51af3a80 fffff800`56c97160 fffff800`574c3f00 00000000`0000b501 : nt!KeClockInterruptNotify+0x453
fffff800`56c9ef30 fffff800`51127f55 : fffff800`51af3a80 fffff800`56c9ef40 00000000`00000010 ffff6b77`750a7332 : nt!HalpTimerClockIpiRoutine+0x1a
fffff800`56c9ef60 fffff800`511f785a : fffff800`56c97160 fffff800`51af3a80 ffffe38a`f6ab9180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`56c9efb0 fffff800`511f7dc7 : 00000000`00000000 fffff800`51052f55 00000000`00000007 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff800`56c970e0 fffff800`510e475a : 00000000`00000000 ffffe38a`f16a09f0 ffffffff`ffffffd2 fffff800`510e475a : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff800`56c97270 fffff800`554cb532 : ffffe38a`ef26ee10 ffffe38a`f1c19630 fffff800`511f1ea0 fffff800`510ec5ca : nt!KeAcquireSpinLockRaiseToDpc+0x1a
fffff800`56c972a0 fffff800`554c10d5 : ffffe38a`ead024e0 00000000`00000007 ffffe38a`f1c19a60 fffff800`510ec5ca : ACPI!ACPIIrpDispatchDeviceControl+0x52
fffff800`56c972e0 fffff800`51052f55 : 00000000`00000007 ffffe38a`f1c19a60 ffffe38a`f1c19630 ffffe38a`de9ea3c0 : ACPI!ACPIDispatchIrp+0xc5
fffff800`56c97360 fffff800`4efd63a4 : ffffe38a`e0ffe950 ffffd200`313dd000 00000000`000a9cac 00000000`00001ead : nt!IofCallDriver+0x55
fffff800`56c973a0 ffffe38a`e0ffe950 : ffffd200`313dd000 00000000`000a9cac 00000000`00001ead 00000000`00000009 : bcbtums+0x163a4
fffff800`56c973a8 ffffd200`313dd000 : 00000000`000a9cac 00000000`00001ead 00000000`00000009 ffffe38a`e725f0d0 : 0xffffe38a`e0ffe950
fffff800`56c973b0 00000000`000a9cac : 00000000`00001ead 00000000`00000009 ffffe38a`e725f0d0 ffffc1fc`98200000 : 0xffffd200`313dd000
fffff800`56c973b8 00000000`00001ead : 00000000`00000009 ffffe38a`e725f0d0 ffffc1fc`98200000 ffffe38a`f9479d10 : 0xa9cac.
fffff800`56c973c0 00000000`00000009 : ffffe38a`e725f0d0 ffffc1fc`98200000 ffffe38a`f9479d10 33c84b10`3bee69d2 : 0x1ead.
fffff800`56c973c8 ffffe38a`e725f0d0 : ffffc1fc`98200000 ffffe38a`f9479d10 33c84b10`3bee69d2 2feb4b8f`40aca0f6 : 0x9.
fffff800`56c973d0 ffffc1fc`98200000 : ffffe38a`f9479d10 33c84b10`3bee69d2 2feb4b8f`40aca0f6 435f5355`54415453 : 0xffffe38a`e725f0d0
fffff800`56c973d8 ffffe38a`f9479d10 : 33c84b10`3bee69d2 2feb4b8f`40aca0f6 435f5355`54415453 0044454c`45434e41 : 0xffffc1fc`98200000
fffff800`56c973e0 33c84b10`3bee69d2 : 2feb4b8f`40aca0f6 435f5355`54415453 0044454c`45434e41 00000000`00000000 : 0xffffe38a`f9479d10
fffff800`56c973e8 2feb4b8f`40aca0f6 : 435f5355`54415453 0044454c`45434e41 00000000`00000000 00000000`00000000 : 0x33c84b10`3bee69d2
fffff800`56c973f0 435f5355`54415453 : 0044454c`45434e41 00000000`00000000 00000000`00000000 ffffe38a`f9479ce8 : 0x2feb4b8f`40aca0f6
fffff800`56c973f8 0044454c`45434e41 : 00000000`00000000 00000000`00000000 ffffe38a`f9479ce8 00000000`00000202 : 0x435f5355`54415453
fffff800`56c97400 00000000`00000000 : 00000000`00000000 ffffe38a`f9479ce8 00000000`00000202 ffffe38a`f9479a60 : 0x0044454c`45434e41

SYMBOL_NAME: bcbtums+163a4

MODULE_NAME: bcbtums.

IMAGE_NAME: bcbtums.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 163a4.

FAILURE_BUCKET_ID: 0x133_DPC_bcbtums!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d471c926-5825-6837-7392-0f092d814c9f}

Followup: MachineOwner.
---------

0: kd> lmvm bcbtums.
Browse full module list.
start end module name.
fffff800`4efc0000 fffff800`4eff4000 bcbtums T (no symbols)
Loaded symbol image file: bcbtums.sys
Image path: \SystemRoot\system32\drivers\bcbtums.sys
Image name: bcbtums.sys
Browse all global symbols functions data.
Timestamp: Tue Mar 24 00:31:26 2015 (5510862E)
CheckSum: 00031A09.
ImageSize: 00034000.
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:

RAM testini şu an yapamıyorum yanımda flash diskim yok malesef ama Helaty'a baktım bilgisayarımda 3 farklı disk var biri M.2 SSD biri HDD diğeri ise SATA SSD hepsinin sağlığı "ok" durumunda.
Bir de Windows'um güncel değil son gelen güncellemede kullanıcılar çok sorun yaşadğını söylemiş ben de indirmek istemedim Windows'u güncellemek işe yarar mı?
Hatalardan biri Broadcom Bluetooth driver diğeri de Vanguard kaynaklı gibi ama bu illaki sorunun bu sürücülerden kaynaklandığı anlamına gelmez. İlk iş bir bellek testi yapınız:


Bir de cihazda SSD yoktuysa sabit disk sağlığına mutlaka bakın:


Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: ffff821e55665344, The address that the exception occurred at.
Arg3: 0000000000000001, Parameter 0 of the exception.
Arg4: 0000000000000000, Parameter 1 of the exception.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4703.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 17733.

Key : Analysis.Init.CPU.mSec
Value: 421.

Key : Analysis.Init.Elapsed.mSec
Value: 3655.

Key : Analysis.Memory.CommitPeak.Mb
Value: 75.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: ffff821e55665344.

BUGCHECK_P3: 1

BUGCHECK_P4: 0

WRITE_ADDRESS: fffff8023defb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
0000000000000000.

EXCEPTION_PARAMETER1: 0000000000000001.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: csrss.exe

TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffffd0c`e363d678 fffff802`3d69178f : 00000000`0000001e ffffffff`c0000005 ffff821e`55665344 00000000`00000001 : nt!KeBugCheckEx
fffffd0c`e363d680 fffff802`3d607eac : 00000000`00001000 fffffd0c`e363df20 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166d2f
fffffd0c`e363dd40 fffff802`3d604043 : ffffdf05`07f550c0 00000000`00000000 00000000`00000000 ffffdf05`07f550c0 : nt!KiExceptionDispatch+0x12c
fffffd0c`e363df20 ffff821e`55665344 : 00000000`e363e240 00000000`00989680 fffffd0c`e363e1a0 00000437`0000077f : nt!KiPageFault+0x443
fffffd0c`e363e0b8 00000000`e363e240 : 00000000`00989680 fffffd0c`e363e1a0 00000437`0000077f ffff8259`806067e8 : win32kbase+0x65344
fffffd0c`e363e0c0 00000000`00989680 : fffffd0c`e363e1a0 00000437`0000077f ffff8259`806067e8 fffffd0c`e363e1f0 : 0xe363e240.
fffffd0c`e363e0c8 fffffd0c`e363e1a0 : 00000437`0000077f ffff8259`806067e8 fffffd0c`e363e1f0 ffff821e`557c3de5 : 0x989680.
fffffd0c`e363e0d0 00000437`0000077f : ffff8259`806067e8 fffffd0c`e363e1f0 ffff821e`557c3de5 00000437`0000077f : 0xfffffd0c`e363e1a0
fffffd0c`e363e0d8 ffff8259`806067e8 : fffffd0c`e363e1f0 ffff821e`557c3de5 00000437`0000077f 00000437`0000077f : 0x00000437`0000077f
fffffd0c`e363e0e0 fffffd0c`e363e1f0 : ffff821e`557c3de5 00000437`0000077f 00000437`0000077f ffff8259`806067e8 : 0xffff8259`806067e8
fffffd0c`e363e0e8 ffff821e`557c3de5 : 00000437`0000077f 00000437`0000077f ffff8259`806067e8 00000000`00000140 : 0xfffffd0c`e363e1f0
fffffd0c`e363e0f0 00000437`0000077f : 00000437`0000077f ffff8259`806067e8 00000000`00000140 fffffd0c`e363e240 : win32kbase+0x1c3de5
fffffd0c`e363e0f8 00000437`0000077f : ffff8259`806067e8 00000000`00000140 fffffd0c`e363e240 00000000`00000000 : 0x00000437`0000077f
fffffd0c`e363e100 ffff8259`806067e8 : 00000000`00000140 fffffd0c`e363e240 00000000`00000000 00000000`00000000 : 0x00000437`0000077f
fffffd0c`e363e108 00000000`00000140 : fffffd0c`e363e240 00000000`00000000 00000000`00000000 ffffdf05`01ee7890 : 0xffff8259`806067e8
fffffd0c`e363e110 fffffd0c`e363e240 : 00000000`00000000 00000000`00000000 ffffdf05`01ee7890 00000000`00000000 : 0x140.
fffffd0c`e363e118 00000000`00000000 : 00000000`00000000 ffffdf05`01ee7890 00000000`00000000 00000000`00000000 : 0xfffffd0c`e363e240

SYMBOL_NAME: win32kbase+65344

MODULE_NAME: win32kbase.

IMAGE_NAME: win32kbase.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 65344.

FAILURE_BUCKET_ID: 0x1E_c0000005_W_win32kbase!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ea4dda97-2d75-1dc9-4e24-8eac8def1048}

Followup: MachineOwner.
---------

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver.
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8002668ca46, Virtual address for the attempted execute.
Arg2: 80000003b3fb7929, PTE contents.
Arg3: ffffc08fd579c210, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for vgk.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4561.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 18214.

Key : Analysis.Init.CPU.mSec
Value: 437.

Key : Analysis.Init.Elapsed.mSec
Value: 3975.

Key : Analysis.Memory.CommitPeak.Mb
Value: 78.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: fc.

BUGCHECK_P1: fffff8002668ca46.

BUGCHECK_P2: 80000003b3fb7929.

BUGCHECK_P3: ffffc08fd579c210.

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

TRAP_FRAME: ffffc08fd579c210 -- (.trap 0xffffc08fd579c210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08fd579c4e0 rbx=0000000000000000 rcx=00000000000c4fe0
rdx=fffffffff7ffa9ea rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002668ca46 rsp=ffffc08fd579c3a0 rbp=fffffffeb7c9cd3c
r8=fffff8002e55d6c1 r9=fffffffffffbfdfd r10=ffffc08fd579c5ae
r11=0000000000040202 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy.
fffff800`2668ca46 0000 add byte ptr [rax],al ds:ffffc08f`d579c4e0=00
Resetting default scope.

STACK_TEXT:
ffffc08f`d579bf28 fffff800`2aa719f2 : 00000000`000000fc fffff800`2668ca46 80000003`b3fb7929 ffffc08f`d579c210 : nt!KeBugCheckEx
ffffc08f`d579bf30 fffff800`2a82aed6 : fffff800`2668ca46 ffffc08f`d579c130 ffffffff`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x15940a
ffffc08f`d579bf70 fffff800`2a80c960 : ffffac0b`27fcf080 00000000`00000011 ffffc08f`d579c290 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffc08f`d579c070 fffff800`2aa03f5e : 00000000`00000090 ffffac0b`27fcf080 ffff9486`ae3faca0 00001f80`00000028 : nt!MmAccessFault+0x400
ffffc08f`d579c210 fffff800`2668ca46 : 00000000`00040286 fffff800`2e200004 fffff800`2a600000 00000000`00040282 : nt!KiPageFault+0x35e
ffffc08f`d579c3a0 00000000`00040286 : fffff800`2e200004 fffff800`2a600000 00000000`00040282 ffffac0b`27fcf080 : 0xfffff800`2668ca46
ffffc08f`d579c3a8 fffff800`2e200004 : fffff800`2a600000 00000000`00040282 ffffac0b`27fcf080 ffffc08f`d579c5f0 : 0x40286.
ffffc08f`d579c3b0 fffff800`2a600000 : 00000000`00040282 ffffac0b`27fcf080 ffffc08f`d579c5f0 ffffc08f`d579c5f0 : vgk+0x4
ffffc08f`d579c3b8 00000000`00040282 : ffffac0b`27fcf080 ffffc08f`d579c5f0 ffffc08f`d579c5f0 00000000`00040286 : nt!VrpRegistryString <PERF> (nt+0x0)
ffffc08f`d579c3c0 ffffac0b`27fcf080 : ffffc08f`d579c5f0 ffffc08f`d579c5f0 00000000`00040286 ffffac0b`24dbe200 : 0x40282.
ffffc08f`d579c3c8 ffffc08f`d579c5f0 : ffffc08f`d579c5f0 00000000`00040286 ffffac0b`24dbe200 00000000`000036e4 : 0xffffac0b`27fcf080
ffffc08f`d579c3d0 ffffc08f`d579c5f0 : 00000000`00040286 ffffac0b`24dbe200 00000000`000036e4 00000000`00000001 : 0xffffc08f`d579c5f0
ffffc08f`d579c3d8 00000000`00040286 : ffffac0b`24dbe200 00000000`000036e4 00000000`00000001 00000000`00000000 : 0xffffc08f`d579c5f0
ffffc08f`d579c3e0 ffffac0b`24dbe200 : 00000000`000036e4 00000000`00000001 00000000`00000000 fffff800`2e200000 : 0x40286.
ffffc08f`d579c3e8 00000000`000036e4 : 00000000`00000001 00000000`00000000 fffff800`2e200000 00000000`000036e4 : 0xffffac0b`24dbe200
ffffc08f`d579c3f0 00000000`00000001 : 00000000`00000000 fffff800`2e200000 00000000`000036e4 00000000`00000004 : 0x36e4.
ffffc08f`d579c3f8 00000000`00000000 : fffff800`2e200000 00000000`000036e4 00000000`00000004 fffff7fe`ee200000 : 0x1.

SYMBOL_NAME: vgk+4

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 4

FAILURE_BUCKET_ID: 0xFC_vgk!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {72ab8b92-5ca4-d395-fbb9-add54d3e4b7f}

Followup: MachineOwner.
---------

6: kd> lmvm vgk.
Browse full module list.
start end module name.
fffff800`2e200000 fffff800`2e81a000 vgk T (no symbols)
Loaded symbol image file: vgk.sys
Image path: \??\C:\Program Files\Riot Vanguard\vgk.sys
Image name: vgk.sys
Browse all global symbols functions data.
Timestamp: Tue Apr 27 23:36:44 2021 (608875DC)
CheckSum: 0062DA6D.
ImageSize: 0061A000.
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending.
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80051afb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains.
additional information regarding this single DPC timeout.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcbtums.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4374.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 15379.

Key : Analysis.Init.CPU.mSec
Value: 436.

Key : Analysis.Init.Elapsed.mSec
Value: 2658.

Key : Analysis.Memory.CommitPeak.Mb
Value: 77.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133.

BUGCHECK_P1: 0

BUGCHECK_P2: 501.

BUGCHECK_P3: 500.

BUGCHECK_P4: fffff80051afb320.

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME: fffff80056c970e0 -- (.trap 0xfffff80056c970e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff80055542350
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800510e475a rsp=fffff80056c97270 rbp=ffffe38af1c19630
r8=000000000000000f r9=ffffe38aef26ee10 r10=fffff800510e4740
r11=ffffc1fc98200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KeAcquireSpinLockRaiseToDpc+0x1a:
fffff800`510e475a 8b05f87ea100 mov eax,dword ptr [nt!KiIrqlFlags (fffff800`51afc658)] ds:fffff800`51afc658=????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: ForzaHorizon4.exe

DPC_STACK_BASE: FFFFF80056C97FB0.

STACK_TEXT:
fffff800`56c9ee18 fffff800`5123adce : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff800`56c9ee20 fffff800`5106f9a3 : 00000230`0b50d9dc fffff800`4e91e180 00000000`00000000 fffff800`4e91e180 : nt!KeAccumulateTicks+0x1c8bce
fffff800`56c9ee80 fffff800`5106f48a : fffff800`51af3a80 fffff800`56c97160 fffff800`574c3f00 00000000`0000b501 : nt!KeClockInterruptNotify+0x453
fffff800`56c9ef30 fffff800`51127f55 : fffff800`51af3a80 fffff800`56c9ef40 00000000`00000010 ffff6b77`750a7332 : nt!HalpTimerClockIpiRoutine+0x1a
fffff800`56c9ef60 fffff800`511f785a : fffff800`56c97160 fffff800`51af3a80 ffffe38a`f6ab9180 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`56c9efb0 fffff800`511f7dc7 : 00000000`00000000 fffff800`51052f55 00000000`00000007 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff800`56c970e0 fffff800`510e475a : 00000000`00000000 ffffe38a`f16a09f0 ffffffff`ffffffd2 fffff800`510e475a : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff800`56c97270 fffff800`554cb532 : ffffe38a`ef26ee10 ffffe38a`f1c19630 fffff800`511f1ea0 fffff800`510ec5ca : nt!KeAcquireSpinLockRaiseToDpc+0x1a
fffff800`56c972a0 fffff800`554c10d5 : ffffe38a`ead024e0 00000000`00000007 ffffe38a`f1c19a60 fffff800`510ec5ca : ACPI!ACPIIrpDispatchDeviceControl+0x52
fffff800`56c972e0 fffff800`51052f55 : 00000000`00000007 ffffe38a`f1c19a60 ffffe38a`f1c19630 ffffe38a`de9ea3c0 : ACPI!ACPIDispatchIrp+0xc5
fffff800`56c97360 fffff800`4efd63a4 : ffffe38a`e0ffe950 ffffd200`313dd000 00000000`000a9cac 00000000`00001ead : nt!IofCallDriver+0x55
fffff800`56c973a0 ffffe38a`e0ffe950 : ffffd200`313dd000 00000000`000a9cac 00000000`00001ead 00000000`00000009 : bcbtums+0x163a4
fffff800`56c973a8 ffffd200`313dd000 : 00000000`000a9cac 00000000`00001ead 00000000`00000009 ffffe38a`e725f0d0 : 0xffffe38a`e0ffe950
fffff800`56c973b0 00000000`000a9cac : 00000000`00001ead 00000000`00000009 ffffe38a`e725f0d0 ffffc1fc`98200000 : 0xffffd200`313dd000
fffff800`56c973b8 00000000`00001ead : 00000000`00000009 ffffe38a`e725f0d0 ffffc1fc`98200000 ffffe38a`f9479d10 : 0xa9cac.
fffff800`56c973c0 00000000`00000009 : ffffe38a`e725f0d0 ffffc1fc`98200000 ffffe38a`f9479d10 33c84b10`3bee69d2 : 0x1ead.
fffff800`56c973c8 ffffe38a`e725f0d0 : ffffc1fc`98200000 ffffe38a`f9479d10 33c84b10`3bee69d2 2feb4b8f`40aca0f6 : 0x9.
fffff800`56c973d0 ffffc1fc`98200000 : ffffe38a`f9479d10 33c84b10`3bee69d2 2feb4b8f`40aca0f6 435f5355`54415453 : 0xffffe38a`e725f0d0
fffff800`56c973d8 ffffe38a`f9479d10 : 33c84b10`3bee69d2 2feb4b8f`40aca0f6 435f5355`54415453 0044454c`45434e41 : 0xffffc1fc`98200000
fffff800`56c973e0 33c84b10`3bee69d2 : 2feb4b8f`40aca0f6 435f5355`54415453 0044454c`45434e41 00000000`00000000 : 0xffffe38a`f9479d10
fffff800`56c973e8 2feb4b8f`40aca0f6 : 435f5355`54415453 0044454c`45434e41 00000000`00000000 00000000`00000000 : 0x33c84b10`3bee69d2
fffff800`56c973f0 435f5355`54415453 : 0044454c`45434e41 00000000`00000000 00000000`00000000 ffffe38a`f9479ce8 : 0x2feb4b8f`40aca0f6
fffff800`56c973f8 0044454c`45434e41 : 00000000`00000000 00000000`00000000 ffffe38a`f9479ce8 00000000`00000202 : 0x435f5355`54415453
fffff800`56c97400 00000000`00000000 : 00000000`00000000 ffffe38a`f9479ce8 00000000`00000202 ffffe38a`f9479a60 : 0x0044454c`45434e41

SYMBOL_NAME: bcbtums+163a4

MODULE_NAME: bcbtums.

IMAGE_NAME: bcbtums.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 163a4.

FAILURE_BUCKET_ID: 0x133_DPC_bcbtums!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d471c926-5825-6837-7392-0f092d814c9f}

Followup: MachineOwner.
---------

0: kd> lmvm bcbtums.
Browse full module list.
start end module name.
fffff800`4efc0000 fffff800`4eff4000 bcbtums T (no symbols)
Loaded symbol image file: bcbtums.sys
Image path: \SystemRoot\system32\drivers\bcbtums.sys
Image name: bcbtums.sys
Browse all global symbols functions data.
Timestamp: Tue Mar 24 00:31:26 2015 (5510862E)
CheckSum: 00031A09.
ImageSize: 00034000.
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:

Dediğiniz broathcam Bluetooth driver sorununu nasıl halledebilirim? Bilgisayarımda ek bir USB Bluetooth cihazı kullanıyorum ASUS marka onla ilgili midir?
Konu hala güncel arkadaşlar yardımcı olurmusunuz ?
RAM testini şu an yapamıyorum yanımda flash diskim yok maalesef ama Helaty'a baktım bilgisayarımda 3 farklı disk var biri M.2 SSD biri HDD diğeri ise SATA SSD hepsinin sağlığı "ok" durumunda.
Bir de Windows'um güncel değil son gelen güncellemede kullanıcılar çok sorun yaşadğını söylemiş ben de indirmek istemedim Windows'u güncellemek işe yarar mı?

Dediğiniz broathcam Bluetooth driver sorununu nasıl halledebilirim? Bilgisayarımda ek bir USB Bluetooth cihazı kullanıyorum ASUS marka onla ilgili midir?
Konu hala güncel arkadaşlar yardımcı olur musunuz?

Konu günceldir yardım eder misiniz?
 
Son düzenleme:

Yeni konular

Geri
Yukarı