XeaWhitefish
Hectopat
- Katılım
- 23 Aralık 2020
- Mesajlar
- 232
Daha fazla
- Cinsiyet
- Erkek
Machine ID Information [From Smbios 2.7, DMIVersion 0, Size=3040]
BiosMajorRelease = 1
BiosMinorRelease = 37
FirmwareMajorRelease = 1
FirmwareMinorRelease = 25
BiosVendor = LENOVO
BiosVersion = 8DCN37WW
BiosReleaseDate = 10/24/2013
SystemManufacturer = LENOVO
SystemProductName = AILZx
SystemFamily = IDEAPAD
SystemVersion = INVALID
SystemSKU = LENOVO_BI_IDEAPAD8D
BaseBoardManufacturer = LENOVO
BaseBoardProduct = VIUU4
BaseBoardVersion = Not Defined
[CPU Information]
~MHz = REG_DWORD 2494
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 60 Stepping 3
ProcessorNameString = REG_SZ Intel(R) Core(TM) i5-4200M CPU @ 2.50GHz
Update Status = REG_DWORD 0
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 2500000000
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800511aaec7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11561
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 82851
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800511aaec7
READ_ADDRESS: fffff800515713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff800514283b8: Unable to get Flags value from nt!KdVersionBlock
fffff800514283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff85889e6e6100 -- (.trap 0xffff85889e6e6100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000022000 rbx=0000000000000000 rcx=ffff85889e6e6370
rdx=ffffd00cefd75890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800511aaec7 rsp=ffff85889e6e6290 rbp=ffff85889e6e6309
r8=ffffd00cefd75860 r9=0000000000000003 r10=0000000000000000
r11=ffff85889e6e64e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff800`511aaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffff8588`9e6e5fb8 fffff800`511d5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8588`9e6e5fc0 fffff800`511d1c69 : 00000000`ffff8001 ffffd00c`e529ea70 ffffd00c`00000000 ffffd00c`e529ea70 : nt!KiBugCheckDispatch+0x69
ffff8588`9e6e6100 fffff800`511aaec7 : 00000000`00000000 ffffd00c`efd75040 ffffd00c`efd75040 fffff800`511d5358 : nt!KiPageFault+0x469
ffff8588`9e6e6290 fffff800`511c9a98 : ffff8588`9e6e6370 00000000`00000000 ffff8588`9e6e63f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8588`9e6e6370 fffff800`54e0154f : fffff800`55335c77 00000000`00000000 ffffffff`800030ec 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8588`9e6e6508 fffff800`55335c77 : 00000000`00000000 ffffffff`800030ec 00000000`00000008 fffff7ff`14e00000 : vgk+0x154f
ffff8588`9e6e6510 00000000`00000000 : ffffffff`800030ec 00000000`00000008 fffff7ff`14e00000 fffff800`516e9c40 : vgk+0x535c77
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80144faaec7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8453
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 78077
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80144faaec7
READ_ADDRESS: fffff801453713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801452283b8: Unable to get Flags value from nt!KdVersionBlock
fffff801452283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8b08f1aa0100 -- (.trap 0xffff8b08f1aa0100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff8b08f1aa0370
rdx=ffff960fd87af8d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80144faaec7 rsp=ffff8b08f1aa0290 rbp=ffff8b08f1aa0309
r8=ffff960fd87af8a0 r9=0000000000000003 r10=0000000000000000
r11=ffff8b08f1aa04e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff801`44faaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffff8b08`f1a9ffb8 fffff801`44fd5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8b08`f1a9ffc0 fffff801`44fd1c69 : 00000000`ffff8001 ffff960f`d689e750 ffff960f`00000000 ffff960f`d689e750 : nt!KiBugCheckDispatch+0x69
ffff8b08`f1aa0100 fffff801`44faaec7 : 00000000`00000000 ffff960f`d87af080 ffff960f`d87af080 fffff801`44fd5358 : nt!KiPageFault+0x469
ffff8b08`f1aa0290 fffff801`44fc9a98 : ffff8b08`f1aa0370 00000000`00000000 ffff8b08`f1aa03f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8b08`f1aa0370 fffff801`41ed154f : fffff801`42405c77 00000000`00000000 ffffffff`800030fc 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8b08`f1aa0508 fffff801`42405c77 : 00000000`00000000 ffffffff`800030fc 00000000`00000008 fffff800`01ed0000 : vgk+0x154f
ffff8b08`f1aa0510 00000000`00000000 : ffffffff`800030fc 00000000`00000008 fffff800`01ed0000 fffff801`454e9c40 : vgk+0x535c77
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807725aaec7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11171
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 65885
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807725aaec7
READ_ADDRESS: fffff807729713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff807728283b8: Unable to get Flags value from nt!KdVersionBlock
fffff807728283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc9034d44c100 -- (.trap 0xffffc9034d44c100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffc9034d44c370
rdx=ffffa58ad4aed8d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807725aaec7 rsp=ffffc9034d44c290 rbp=ffffc9034d44c309
r8=ffffa58ad4aed8a0 r9=0000000000000003 r10=0000000000000000
r11=ffffc9034d44c4e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff807`725aaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffc903`4d44bfb8 fffff807`725d5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc903`4d44bfc0 fffff807`725d1c69 : 00000000`ffff8001 ffffa58a`d2c9e250 ffffa58a`00000000 ffffa58a`d2c9e250 : nt!KiBugCheckDispatch+0x69
ffffc903`4d44c100 fffff807`725aaec7 : 00000000`00000000 ffffa58a`d4aed080 ffffa58a`d4aed080 fffff807`725d5358 : nt!KiPageFault+0x469
ffffc903`4d44c290 fffff807`725c9a98 : ffffc903`4d44c370 00000000`00000000 ffffc903`4d44c3f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffc903`4d44c370 fffff807`6c4f154f : fffff807`6ca25c77 00000000`00000000 ffffffff`80002794 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffc903`4d44c508 fffff807`6ca25c77 : 00000000`00000000 ffffffff`80002794 00000000`00000008 fffff806`2c4f0000 : vgk+0x154f
ffffc903`4d44c510 00000000`00000000 : ffffffff`80002794 00000000`00000008 fffff806`2c4f0000 fffff807`72ae9c40 : vgk+0x535c77
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011dfaaec7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 82446
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8011dfaaec7
READ_ADDRESS: fffff8011e3713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011e2283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8011e2283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa887a0f9c100 -- (.trap 0xffffa887a0f9c100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffa887a0f9c370
rdx=ffff98840843e890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011dfaaec7 rsp=ffffa887a0f9c290 rbp=ffffa887a0f9c309
r8=ffff98840843e860 r9=0000000000000003 r10=0000000000000000
r11=ffffa887a0f9c4e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff801`1dfaaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffa887`a0f9bfb8 fffff801`1dfd5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa887`a0f9bfc0 fffff801`1dfd1c69 : 00000000`ffff8001 ffff9883`fc69e930 ffff9883`00000000 ffff9883`fc69e930 : nt!KiBugCheckDispatch+0x69
ffffa887`a0f9c100 fffff801`1dfaaec7 : 00000000`00000000 ffff9884`0843e040 ffff9884`0843e040 fffff801`1dfd5358 : nt!KiPageFault+0x469
ffffa887`a0f9c290 fffff801`1dfc9a98 : ffffa887`a0f9c370 00000000`00000000 ffffa887`a0f9c3f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffa887`a0f9c370 fffff801`19cf154f : fffff801`1a225c77 00000000`00000000 ffffffff`8000279c 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffa887`a0f9c508 fffff801`1a225c77 : 00000000`00000000 ffffffff`8000279c 00000000`00000008 fffff7ff`d9cf0000 : vgk+0x154f
ffffa887`a0f9c510 00000000`00000000 : ffffffff`8000279c 00000000`00000008 fffff7ff`d9cf0000 fffff801`1e4e9c40 : vgk+0x535c77
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
O halde sıkıştırmadan paylaşabilirsiniz.
Teşekkurler hocam yazdıklarınızı deniyeceğim.Riot Vanguard kaldır. Mavi ekran sorunun bitince tekrar yükleyebilirsin.
Ekran kartı sürücünü güncelle. Güncellemeyi bilmiyorsan söyle yardım edeyim.
"sfc /scannow" rehberini uygula.
SFC /scannow komutu nedir? Ne işe yarar? | Technopat Sosyal
Windows10 sürümün eski. Windows sürümünü güncelle. Windows10 güncelleştirmesi varsa yap.
Ağ sürücülerini güncelle. Sürücü tam olarak bulamadım.
Genel olarak sorunu Riot Vanguard çıkartmış gözüküyor.
Bundan sonra telefona geçeceğim. Telefondan elimden geldiği kadar yardım edeceğim.
@Enes3078 hocam sizde inceleyebilir misiniz? Ben hızlıca baktım.
Valorant oyunun Anti-Cheat sistemi ile alakalı bir hata alıyorsun. Windows Güncellemesi varsa tamamla.suanda oldumu hocam ?
Valorant oyunun anti-cheat sistemi ile alakalı bir hata alıyorsun. Windows güncellemesi varsa tamamla.
Çalıştıra "msconfig" yaz. Hizmetler kısmından Microsoft hizmetlerini gizleyip, "vkg" hizmetinin kontrol et, açık olduğundan emin ol.
Bulamadım hocam orayı.
Machine ID Information [From Smbios 2.7, DMIVersion 0, Size=3040]
BiosMajorRelease = 1
BiosMinorRelease = 37
FirmwareMajorRelease = 1
FirmwareMinorRelease = 25
BiosVendor = LENOVO
BiosVersion = 8DCN37WW
BiosReleaseDate = 10/24/2013
SystemManufacturer = LENOVO
SystemProductName = AILZx
SystemFamily = IDEAPAD
SystemVersion = INVALID
SystemSKU = LENOVO_BI_IDEAPAD8D
BaseBoardManufacturer = LENOVO
BaseBoardProduct = VIUU4
BaseBoardVersion = Not Defined
[CPU Information]
~MHz = REG_DWORD 2494
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 60 Stepping 3
ProcessorNameString = REG_SZ Intel(R) Core(TM) i5-4200M CPU @ 2.50GHz
Update Status = REG_DWORD 0
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 2500000000
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800511aaec7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11561
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 82851
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff800511aaec7
READ_ADDRESS: fffff800515713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff800514283b8: Unable to get Flags value from nt!KdVersionBlock
fffff800514283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff85889e6e6100 -- (.trap 0xffff85889e6e6100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000022000 rbx=0000000000000000 rcx=ffff85889e6e6370
rdx=ffffd00cefd75890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800511aaec7 rsp=ffff85889e6e6290 rbp=ffff85889e6e6309
r8=ffffd00cefd75860 r9=0000000000000003 r10=0000000000000000
r11=ffff85889e6e64e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff800`511aaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffff8588`9e6e5fb8 fffff800`511d5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8588`9e6e5fc0 fffff800`511d1c69 : 00000000`ffff8001 ffffd00c`e529ea70 ffffd00c`00000000 ffffd00c`e529ea70 : nt!KiBugCheckDispatch+0x69
ffff8588`9e6e6100 fffff800`511aaec7 : 00000000`00000000 ffffd00c`efd75040 ffffd00c`efd75040 fffff800`511d5358 : nt!KiPageFault+0x469
ffff8588`9e6e6290 fffff800`511c9a98 : ffff8588`9e6e6370 00000000`00000000 ffff8588`9e6e63f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8588`9e6e6370 fffff800`54e0154f : fffff800`55335c77 00000000`00000000 ffffffff`800030ec 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8588`9e6e6508 fffff800`55335c77 : 00000000`00000000 ffffffff`800030ec 00000000`00000008 fffff7ff`14e00000 : vgk+0x154f
ffff8588`9e6e6510 00000000`00000000 : ffffffff`800030ec 00000000`00000008 fffff7ff`14e00000 fffff800`516e9c40 : vgk+0x535c77
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80144faaec7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8453
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 78077
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80144faaec7
READ_ADDRESS: fffff801453713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801452283b8: Unable to get Flags value from nt!KdVersionBlock
fffff801452283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8b08f1aa0100 -- (.trap 0xffff8b08f1aa0100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff8b08f1aa0370
rdx=ffff960fd87af8d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80144faaec7 rsp=ffff8b08f1aa0290 rbp=ffff8b08f1aa0309
r8=ffff960fd87af8a0 r9=0000000000000003 r10=0000000000000000
r11=ffff8b08f1aa04e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff801`44faaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffff8b08`f1a9ffb8 fffff801`44fd5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8b08`f1a9ffc0 fffff801`44fd1c69 : 00000000`ffff8001 ffff960f`d689e750 ffff960f`00000000 ffff960f`d689e750 : nt!KiBugCheckDispatch+0x69
ffff8b08`f1aa0100 fffff801`44faaec7 : 00000000`00000000 ffff960f`d87af080 ffff960f`d87af080 fffff801`44fd5358 : nt!KiPageFault+0x469
ffff8b08`f1aa0290 fffff801`44fc9a98 : ffff8b08`f1aa0370 00000000`00000000 ffff8b08`f1aa03f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8b08`f1aa0370 fffff801`41ed154f : fffff801`42405c77 00000000`00000000 ffffffff`800030fc 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8b08`f1aa0508 fffff801`42405c77 : 00000000`00000000 ffffffff`800030fc 00000000`00000008 fffff800`01ed0000 : vgk+0x154f
ffff8b08`f1aa0510 00000000`00000000 : ffffffff`800030fc 00000000`00000008 fffff800`01ed0000 fffff801`454e9c40 : vgk+0x535c77
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807725aaec7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11171
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 65885
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807725aaec7
READ_ADDRESS: fffff807729713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff807728283b8: Unable to get Flags value from nt!KdVersionBlock
fffff807728283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc9034d44c100 -- (.trap 0xffffc9034d44c100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffc9034d44c370
rdx=ffffa58ad4aed8d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807725aaec7 rsp=ffffc9034d44c290 rbp=ffffc9034d44c309
r8=ffffa58ad4aed8a0 r9=0000000000000003 r10=0000000000000000
r11=ffffc9034d44c4e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff807`725aaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffc903`4d44bfb8 fffff807`725d5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc903`4d44bfc0 fffff807`725d1c69 : 00000000`ffff8001 ffffa58a`d2c9e250 ffffa58a`00000000 ffffa58a`d2c9e250 : nt!KiBugCheckDispatch+0x69
ffffc903`4d44c100 fffff807`725aaec7 : 00000000`00000000 ffffa58a`d4aed080 ffffa58a`d4aed080 fffff807`725d5358 : nt!KiPageFault+0x469
ffffc903`4d44c290 fffff807`725c9a98 : ffffc903`4d44c370 00000000`00000000 ffffc903`4d44c3f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffc903`4d44c370 fffff807`6c4f154f : fffff807`6ca25c77 00000000`00000000 ffffffff`80002794 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffc903`4d44c508 fffff807`6ca25c77 : 00000000`00000000 ffffffff`80002794 00000000`00000008 fffff806`2c4f0000 : vgk+0x154f
ffffc903`4d44c510 00000000`00000000 : ffffffff`80002794 00000000`00000008 fffff806`2c4f0000 fffff807`72ae9c40 : vgk+0x535c77
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011dfaaec7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 82446
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 994
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8011dfaaec7
READ_ADDRESS: fffff8011e3713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011e2283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8011e2283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa887a0f9c100 -- (.trap 0xffffa887a0f9c100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffa887a0f9c370
rdx=ffff98840843e890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011dfaaec7 rsp=ffffa887a0f9c290 rbp=ffffa887a0f9c309
r8=ffff98840843e860 r9=0000000000000003 r10=0000000000000000
r11=ffffa887a0f9c4e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff801`1dfaaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope
STACK_TEXT:
ffffa887`a0f9bfb8 fffff801`1dfd5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa887`a0f9bfc0 fffff801`1dfd1c69 : 00000000`ffff8001 ffff9883`fc69e930 ffff9883`00000000 ffff9883`fc69e930 : nt!KiBugCheckDispatch+0x69
ffffa887`a0f9c100 fffff801`1dfaaec7 : 00000000`00000000 ffff9884`0843e040 ffff9884`0843e040 fffff801`1dfd5358 : nt!KiPageFault+0x469
ffffa887`a0f9c290 fffff801`1dfc9a98 : ffffa887`a0f9c370 00000000`00000000 ffffa887`a0f9c3f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffa887`a0f9c370 fffff801`19cf154f : fffff801`1a225c77 00000000`00000000 ffffffff`8000279c 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffa887`a0f9c508 fffff801`1a225c77 : 00000000`00000000 ffffffff`8000279c 00000000`00000008 fffff7ff`d9cf0000 : vgk+0x154f
ffffa887`a0f9c510 00000000`00000000 : ffffffff`8000279c 00000000`00000008 fffff7ff`d9cf0000 fffff801`1e4e9c40 : vgk+0x535c77
SYMBOL_NAME: vgk+154f
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 154f
FAILURE_BUCKET_ID: AV_vgk!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}
Followup: MachineOwner
---------
Bunu kontrol et. Sonra da, arama kısmına Hizmetler yaz. Vkg'yi yeniden başlat. Sürücüler ile alakalı olduğunu düşünmüyorum.Bulamadım hocam orayı.
Tamam. En iyisi sensin.1) WireGuard yüklüyse kaldırın.
2) Vanguard kaldırın.
3) Aşağıdaki sürücüyü indirip kurun. (Wi-Fi)
4) Aşağıdaki sürücüyü indirip kurun. (Dahili GPU)
5) Aşağıdaki sürücüyü indirip kurun. (Harici GPU)
6) Aşağıdaki rehberi uygulayıp sonucun ekran alıntısını paylaşın.
7) Aşağıdaki sürücüyü indirip kurun. (Wi-Fi)
8) Windows Update ile 20H2 sürümüne yükseltin. Güncellik iyidir.
9) BIOS güncelleyin. Güncellemek için aşağıdaki EXE uzantılı dosyayı indirin ve çalıştırın. İşlem sırasında bilgisayarınızın kapanmamasına dikkat edin.
NOT: Tüm işlemleri verdiğim adımlara göre uygulayın. BIOS işlemini şarj tam doluyken uygulayın ve tüm işlemlerin sonrasına uygulayın. Ek olarak sorun çözülürse bildirmeyi unutmayın.
Kod:Machine ID Information [From Smbios 2.7, DMIVersion 0, Size=3040] BiosMajorRelease = 1 BiosMinorRelease = 37 FirmwareMajorRelease = 1 FirmwareMinorRelease = 25 BiosVendor = LENOVO BiosVersion = 8DCN37WW BiosReleaseDate = 10/24/2013 SystemManufacturer = LENOVO SystemProductName = AILZx SystemFamily = IDEAPAD SystemVersion = INVALID SystemSKU = LENOVO_BI_IDEAPAD8D BaseBoardManufacturer = LENOVO BaseBoardProduct = VIUU4 BaseBoardVersion = Not Defined [CPU Information] ~MHz = REG_DWORD 2494 Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0 Identifier = REG_SZ Intel64 Family 6 Model 60 Stepping 3 ProcessorNameString = REG_SZ Intel(R) Core(TM) i5-4200M CPU @ 2.50GHz Update Status = REG_DWORD 0 VendorIdentifier = REG_SZ GenuineIntel MSR8B = REG_QWORD 2500000000
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000994, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800511aaec7, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 11561 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 82851 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: 994 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff800511aaec7 READ_ADDRESS: fffff800515713b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff800514283b8: Unable to get Flags value from nt!KdVersionBlock fffff800514283b8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000994 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffff85889e6e6100 -- (.trap 0xffff85889e6e6100) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000022000 rbx=0000000000000000 rcx=ffff85889e6e6370 rdx=ffffd00cefd75890 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800511aaec7 rsp=ffff85889e6e6290 rbp=ffff85889e6e6309 r8=ffffd00cefd75860 r9=0000000000000003 r10=0000000000000000 r11=ffff85889e6e64e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KiSwInterruptDispatch+0x27: fffff800`511aaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=???????? Resetting default scope STACK_TEXT: ffff8588`9e6e5fb8 fffff800`511d5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff8588`9e6e5fc0 fffff800`511d1c69 : 00000000`ffff8001 ffffd00c`e529ea70 ffffd00c`00000000 ffffd00c`e529ea70 : nt!KiBugCheckDispatch+0x69 ffff8588`9e6e6100 fffff800`511aaec7 : 00000000`00000000 ffffd00c`efd75040 ffffd00c`efd75040 fffff800`511d5358 : nt!KiPageFault+0x469 ffff8588`9e6e6290 fffff800`511c9a98 : ffff8588`9e6e6370 00000000`00000000 ffff8588`9e6e63f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27 ffff8588`9e6e6370 fffff800`54e0154f : fffff800`55335c77 00000000`00000000 ffffffff`800030ec 00000000`00000008 : nt!KiSwInterrupt+0x368 ffff8588`9e6e6508 fffff800`55335c77 : 00000000`00000000 ffffffff`800030ec 00000000`00000008 fffff7ff`14e00000 : vgk+0x154f ffff8588`9e6e6510 00000000`00000000 : ffffffff`800030ec 00000000`00000008 fffff7ff`14e00000 fffff800`516e9c40 : vgk+0x535c77 SYMBOL_NAME: vgk+154f MODULE_NAME: vgk IMAGE_NAME: vgk.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 154f FAILURE_BUCKET_ID: AV_vgk!unknown_function OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000994, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80144faaec7, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 8453 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 78077 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: 994 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80144faaec7 READ_ADDRESS: fffff801453713b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff801452283b8: Unable to get Flags value from nt!KdVersionBlock fffff801452283b8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000994 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffff8b08f1aa0100 -- (.trap 0xffff8b08f1aa0100) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000032000 rbx=0000000000000000 rcx=ffff8b08f1aa0370 rdx=ffff960fd87af8d0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80144faaec7 rsp=ffff8b08f1aa0290 rbp=ffff8b08f1aa0309 r8=ffff960fd87af8a0 r9=0000000000000003 r10=0000000000000000 r11=ffff8b08f1aa04e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KiSwInterruptDispatch+0x27: fffff801`44faaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=???????? Resetting default scope STACK_TEXT: ffff8b08`f1a9ffb8 fffff801`44fd5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff8b08`f1a9ffc0 fffff801`44fd1c69 : 00000000`ffff8001 ffff960f`d689e750 ffff960f`00000000 ffff960f`d689e750 : nt!KiBugCheckDispatch+0x69 ffff8b08`f1aa0100 fffff801`44faaec7 : 00000000`00000000 ffff960f`d87af080 ffff960f`d87af080 fffff801`44fd5358 : nt!KiPageFault+0x469 ffff8b08`f1aa0290 fffff801`44fc9a98 : ffff8b08`f1aa0370 00000000`00000000 ffff8b08`f1aa03f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27 ffff8b08`f1aa0370 fffff801`41ed154f : fffff801`42405c77 00000000`00000000 ffffffff`800030fc 00000000`00000008 : nt!KiSwInterrupt+0x368 ffff8b08`f1aa0508 fffff801`42405c77 : 00000000`00000000 ffffffff`800030fc 00000000`00000008 fffff800`01ed0000 : vgk+0x154f ffff8b08`f1aa0510 00000000`00000000 : ffffffff`800030fc 00000000`00000008 fffff800`01ed0000 fffff801`454e9c40 : vgk+0x535c77 SYMBOL_NAME: vgk+154f MODULE_NAME: vgk IMAGE_NAME: vgk.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 154f FAILURE_BUCKET_ID: AV_vgk!unknown_function OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000994, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff807725aaec7, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 11171 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 65885 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: 994 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff807725aaec7 READ_ADDRESS: fffff807729713b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff807728283b8: Unable to get Flags value from nt!KdVersionBlock fffff807728283b8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000994 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffffc9034d44c100 -- (.trap 0xffffc9034d44c100) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000032000 rbx=0000000000000000 rcx=ffffc9034d44c370 rdx=ffffa58ad4aed8d0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff807725aaec7 rsp=ffffc9034d44c290 rbp=ffffc9034d44c309 r8=ffffa58ad4aed8a0 r9=0000000000000003 r10=0000000000000000 r11=ffffc9034d44c4e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KiSwInterruptDispatch+0x27: fffff807`725aaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=???????? Resetting default scope STACK_TEXT: ffffc903`4d44bfb8 fffff807`725d5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffc903`4d44bfc0 fffff807`725d1c69 : 00000000`ffff8001 ffffa58a`d2c9e250 ffffa58a`00000000 ffffa58a`d2c9e250 : nt!KiBugCheckDispatch+0x69 ffffc903`4d44c100 fffff807`725aaec7 : 00000000`00000000 ffffa58a`d4aed080 ffffa58a`d4aed080 fffff807`725d5358 : nt!KiPageFault+0x469 ffffc903`4d44c290 fffff807`725c9a98 : ffffc903`4d44c370 00000000`00000000 ffffc903`4d44c3f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27 ffffc903`4d44c370 fffff807`6c4f154f : fffff807`6ca25c77 00000000`00000000 ffffffff`80002794 00000000`00000008 : nt!KiSwInterrupt+0x368 ffffc903`4d44c508 fffff807`6ca25c77 : 00000000`00000000 ffffffff`80002794 00000000`00000008 fffff806`2c4f0000 : vgk+0x154f ffffc903`4d44c510 00000000`00000000 : ffffffff`80002794 00000000`00000008 fffff806`2c4f0000 fffff807`72ae9c40 : vgk+0x535c77 SYMBOL_NAME: vgk+154f MODULE_NAME: vgk IMAGE_NAME: vgk.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 154f FAILURE_BUCKET_ID: AV_vgk!unknown_function OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b} Followup: MachineOwner --------- ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000994, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8011dfaaec7, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7624 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-70T822T Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 82446 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: 994 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8011dfaaec7 READ_ADDRESS: fffff8011e3713b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8011e2283b8: Unable to get Flags value from nt!KdVersionBlock fffff8011e2283b8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000994 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffffa887a0f9c100 -- (.trap 0xffffa887a0f9c100) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000032000 rbx=0000000000000000 rcx=ffffa887a0f9c370 rdx=ffff98840843e890 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8011dfaaec7 rsp=ffffa887a0f9c290 rbp=ffffa887a0f9c309 r8=ffff98840843e860 r9=0000000000000003 r10=0000000000000000 r11=ffffa887a0f9c4e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KiSwInterruptDispatch+0x27: fffff801`1dfaaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=???????? Resetting default scope STACK_TEXT: ffffa887`a0f9bfb8 fffff801`1dfd5929 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffa887`a0f9bfc0 fffff801`1dfd1c69 : 00000000`ffff8001 ffff9883`fc69e930 ffff9883`00000000 ffff9883`fc69e930 : nt!KiBugCheckDispatch+0x69 ffffa887`a0f9c100 fffff801`1dfaaec7 : 00000000`00000000 ffff9884`0843e040 ffff9884`0843e040 fffff801`1dfd5358 : nt!KiPageFault+0x469 ffffa887`a0f9c290 fffff801`1dfc9a98 : ffffa887`a0f9c370 00000000`00000000 ffffa887`a0f9c3f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27 ffffa887`a0f9c370 fffff801`19cf154f : fffff801`1a225c77 00000000`00000000 ffffffff`8000279c 00000000`00000008 : nt!KiSwInterrupt+0x368 ffffa887`a0f9c508 fffff801`1a225c77 : 00000000`00000000 ffffffff`8000279c 00000000`00000008 fffff7ff`d9cf0000 : vgk+0x154f ffffa887`a0f9c510 00000000`00000000 : ffffffff`8000279c 00000000`00000008 fffff7ff`d9cf0000 fffff801`1e4e9c40 : vgk+0x535c77 SYMBOL_NAME: vgk+154f MODULE_NAME: vgk IMAGE_NAME: vgk.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 154f FAILURE_BUCKET_ID: AV_vgk!unknown_function OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b} Followup: MachineOwner ---------