Mavi ekran hatası

Tekrar ağ sorunları baş göstermiş. Lütfen sanal ağ kuran yazılımları kullanmayın.

Hamachi'yi ve BattlEye yazılımını kaldırın ve aşağıdaki ağ sürücüsünü indirip kurun. Daha önceden kurduğunuz sürücü ile bu sürücü aynıysa yalnızca kaldırılacak yazılımları kaldırın.


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80558ee37f9, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6374

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6704

Key : Analysis.Init.CPU.mSec
Value: 1156

Key : Analysis.Init.Elapsed.mSec
Value: 15931

Key : Analysis.Memory.CommitPeak.Mb
Value: 77


DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: d1

BUGCHECK_P1: 1b

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80558ee37f9

READ_ADDRESS: fffff80555efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
000000000000001b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: VALORANT-Win64

TRAP_FRAME: ffffa18bd60e5f90 -- (.trap 0xffffa18bd60e5f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000002db rbx=0000000000000000 rcx=0000000000000009
rdx=ffff8f8595aab150 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80558ee37f9 rsp=ffffa18bd60e6120 rbp=ffffa18bd60e6220
r8=000000000000012c r9=0000000000000004 r10=ffff8f8595e7ae58
r11=000000636e00ae6a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip+0x537f9:
fffff805`58ee37f9 4b850c64 test qword ptr [r12+r12*2],rcx ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffa18b`d60e5e48 fffff805`55608c69 : 00000000`0000000a 00000000`0000001b 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa18b`d60e5e50 fffff805`55604f69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa18b`d60e5f90 fffff805`58ee37f9 : ffff8f85`95e7ae58 00000000`00989680 ffff8f85`9800ab10 00000063`6d7ed39d : nt!KiPageFault+0x469
ffffa18b`d60e6120 fffff805`58ee357e : 00000000`00000000 00000000`00000000 ffffa18b`d60e6380 fffff805`58ee3550 : tcpip+0x537f9
ffffa18b`d60e6260 fffff805`55498bc8 : ffff8f85`aad64c01 00000000`00000000 ffffa18b`00000000 00000000`00000001 : tcpip+0x5357e
ffffa18b`d60e62a0 fffff805`55498b3d : fffff805`58ee3550 ffffa18b`d60e6380 ffff8f85`a90a9f48 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa18b`d60e6310 fffff805`58f02df0 : ffff8f85`a90a9760 00000000`00000000 03eb0c04`100003eb 80000000`00000026 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffa18b`d60e6350 fffff805`65eac0cf : ffff8f85`a90a9f48 ffff8f85`aad64c60 00000000`000002db ffff8f85`a90a9f48 : tcpip+0x72df0
ffffa18b`d60e63c0 fffff805`65eabefa : ffff8f85`aad64c60 ffffa18b`d60e6b80 ffff8f85`a47151d0 ffff8f85`a90a9760 : afd!AfdTLStartBufferedVcSend+0x9f
ffffa18b`d60e6470 fffff805`65e91720 : ffff8f85`a90a9f48 00000000`00000000 00000000`000002db ffffa18b`d60e6968 : afd!AfdFastConnectionSend+0x2a2
ffffa18b`d60e6540 fffff805`558e1d82 : 00000000`00000000 00000000`0001201f ffffa18b`d60e6b80 ffff8f85`a40179a0 : afd!AfdFastIoDeviceControl+0xf90
ffffa18b`d60e68e0 fffff805`558e19e6 : 00000000`00000008 00000000`000018c0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
ffffa18b`d60e6a20 fffff805`55608bf1 : ffff8f85`a40ef080 fffff805`557a5270 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffa18b`d60e6a90 00007ffd`e518cf04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000049`fc71ddc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e518cf04


CHKIMG_EXTENSION: !chkimg -lo 50 -d !tcpip
fffff80558ee37fa - tcpip+537fa
[ 8d:85 ]
1 error : !tcpip (fffff80558ee37fa)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: ONE_BIT

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: memory_corruption
---------[/CODE]
 
@Enes3078 Hocam 3 tekrar yaptım bir şey çıkmadı.
 

Dosya Ekleri

  • 20210510_203500.jpg
    20210510_203500.jpg
    283,5 KB · Görüntüleme: 23
Test tamamen bitmesine rağmen bir şey çıkmadı ha? O halde bir süre XMP kapalı deneyin sistemi. Yine devam ederse yeni dump dosyasını paylaşın. Son duruma göre belirteceğim ki şu an benim kanımca anakart arızalı.

Yine de son dumplar belirleyecek her şeyi.
 

Yeni konular

Geri
Yukarı