Çözüldü Oyun Oynarken Sistem Çöküyor

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

AliK1907

Femtopat
Katılım
14 Ekim 2020
Mesajlar
5
Daha fazla  
Cinsiyet
Erkek
3 hafta önce sistem topladım. Oyun oynarken çökme problemi yaşıyorum, yardımcı olursanız sevinirim.

 
Son düzenleyen: Moderatör:
Çözüm
Tek tek yaptığınızda sorun çıkmaması ilginç. Bellekleri garantiye gönderin, değişim/iade isteyin.
Belleklerinizde sorun görünüyor, test yapın.

Ayrıca ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804730019c1, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7213

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 1

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804730019c1

READ_ADDRESS: fffff804738fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000001

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffffba08708ca3e0 -- (.trap 0xffffba08708ca3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ffffffeffff rbx=0000000000000000 rcx=ffffba08708ca6e0
rdx=ffff8b87a322c340 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804730019c1 rsp=ffffba08708ca578 rbp=0000000000010000
 r8=0000000000000000  r9=0000000000010169 r10=0000000000010000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac po cy
nt!KiGeneralProtectionFault+0x1:
fffff804`730019c1 4881ec58010000  sub     rsp,158h
Resetting default scope

STACK_TEXT: 
ffffba08`708ca298 fffff804`73005e69     : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffba08`708ca2a0 fffff804`73002169     : 000a4c64`0000ffff 00000000`000000ff 00000000`ffffffff ffffba08`00000000 : nt!KiBugCheckDispatch+0x69
ffffba08`708ca3e0 fffff804`730019c1     : 00000000`00010000 00000000`0000a668 fffff804`732dda09 00000000`00000010 : nt!KiPageFault+0x469
ffffba08`708ca578 fffff804`732dda09     : ffff8b87`a3691a80 ffffba08`708ca669 ffff8b87`a3f84080 fffff804`72f43fd1 : nt!KiGeneralProtectionFault+0x1
ffffba08`708ca5b0 fffff804`732dd884     : 00000000`00000000 ffff8b87`a322c340 00000000`00010000 00000000`00000000 : nt!MiFindEmptyAddressRange+0xf9
ffffba08`708ca630 fffff804`732e5e7e     : ffff8b87`00000000 00000000`00000000 00000000`00000001 00000000`00001000 : nt!MiSelectUserAddress+0x114
ffffba08`708ca6d0 fffff804`732e57cc     : 00000000`00000004 ffffc088`00000000 ffffba08`708ca9a8 ffffba08`708ca9b8 : nt!MiMapViewOfDataSection+0x32e
ffffba08`708ca800 fffff804`732e48a9     : 00000000`00000000 ffffba08`708cab80 0000003d`090e7fa8 00000000`00000000 : nt!MiMapViewOfSection+0x34c
ffffba08`708ca950 fffff804`730058b8     : ffff8b87`a3f84080 0000003d`090e7f68 0000003d`090e7fe8 00000000`00000000 : nt!NtMapViewOfSection+0x159
ffffba08`708caa90 00007ffb`8cb8c2c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003d`090e7f48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8cb8c2c4


SYMBOL_NAME:  nt!KiGeneralProtectionFault+1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1

FAILURE_BUCKET_ID:  AV_nt!KiGeneralProtectionFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dd04af12-f86f-9688-c9a3-e403f84a6db3}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80679a07080, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80679a07080, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7845

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff80679a07080

BUGCHECK_P2: 10

BUGCHECK_P3: fffff80679a07080

BUGCHECK_P4: 2

READ_ADDRESS: fffff806292fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffff80679a07080

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffffef01dd79bf50 -- (.trap 0xffffef01dd79bf50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000670 rbx=0000000000000000 rcx=ffffef01dd79c120
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80679a07080 rsp=ffffef01dd79c0e8 rbp=ffffef01dd79c790
 r8=000000000000066f  r9=0000000000000007 r10=0000000000000000
r11=0000021e67397550 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffff806`79a07080 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff806`79a07080 ??              ???

STACK_TEXT: 
ffffef01`dd79bca8 fffff806`28a86729     : 00000000`00000050 fffff806`79a07080 00000000`00000010 ffffef01`dd79bf50 : nt!KeBugCheckEx
ffffef01`dd79bcb0 fffff806`288eeb80     : ffff8002`7bfa08f0 00000000`00000010 ffffef01`dd79bfd0 00000000`00000000 : nt!MiSystemFault+0x13faf9
ffffef01`dd79bdb0 fffff806`28a0205e     : 00000000`00000000 ffff8002`79719c60 00000000`00000000 00020002`00000438 : nt!MmAccessFault+0x400
ffffef01`dd79bf50 fffff806`79a07080     : fffff806`28883d83 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 : nt!KiPageFault+0x35e
ffffef01`dd79c0e8 fffff806`28883d83     : 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 00000000`001f0003 : 0xfffff806`79a07080
ffffef01`dd79c0f0 fffff806`28a05fac     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x223
ffffef01`dd79c920 fffff806`28a01ce0     : ffff8002`7b42d080 ffff8002`7b425080 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffef01`dd79cb00 00007ffa`1c214f9c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
000000cc`0e8af860 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1c214f9c


CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
7 errors : !nt (fffff80628883d8a-fffff80628883dba)
fffff80628883d80  32  18  00  e9  da  fe  ff  ff  4c  8b *e3  98  00  00  00  4c 2.......L......L
fffff80628883d90  89  65 *c5  48  8b  45  20  8b  80  7c *9c  00  00  a8  01  75 .e.H.E ..|.....u
fffff80628883da0  5c  65 *2f  8b  04  25  88  01  00  00 *eb  8b  88  b8  00  00 \e/..%..........
fffff80628883db0  00  48 *28  b9  80  05  00  00  00  74 *fe  81  3b  02  00  00 .H(......t..;...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------



KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff804874afbaa, The address that the exception occurred at
Arg3: ffffe30debe1e080, Parameter 0 of the exception
Arg4: ffffe30de8c75b20, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19018

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff804874afbaa

BUGCHECK_P3: ffffe30debe1e080

BUGCHECK_P4: ffffe30de8c75b20

EXCEPTION_PARAMETER1:  ffffe30debe1e080

EXCEPTION_PARAMETER2:  ffffe30de8c75b20

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  League of Legends.exe

BAD_STACK_POINTER:  fffff8047aa80158

FAILED_INSTRUCTION_ADDRESS:
nvlddmkm+fbaa
fffff804`874afbaa 46898c112c010000 mov     dword ptr [rcx+r10+12Ch],r9d

STACK_TEXT: 
fffff804`7aa80158 fffff804`76cf4d4e     : 00000000`0000001e ffffffff`c000001d fffff804`874afbaa ffffe30d`ebe1e080 : nt!KeBugCheckEx
fffff804`7aa80160 fffff804`76bfcd62     : fffff804`76cf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff804`7aa801a0 fffff804`76a85027     : fffff804`7aa80710 00000000`00000000 fffff804`7aa72fb0 fffff804`76bfaee5 : nt!RtlpExecuteHandlerForException+0x12
fffff804`7aa801d0 fffff804`76a83ce6     : fffff804`7aa6fce8 fffff804`7aa80e20 fffff804`7aa6fce8 00000000`00000000 : nt!RtlDispatchException+0x297
fffff804`7aa808f0 fffff804`76bf4d32     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`7aa80fb0 fffff804`76bf4d00     : fffff804`76c05fa5 00000000`0000003f 00000000`0000003f 00000000`00000020 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`7aa6fba8 fffff804`76c05fa5     : 00000000`0000003f 00000000`0000003f 00000000`00000020 fffff804`76ac7423 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff804`7aa6fbb0 fffff804`76c004e9     : ffffe30d`e8c75b20 fffff804`87c7a0e8 00000000`00000003 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff804`7aa6fd90 fffff804`874afbaa     : fffff804`87c79cf8 ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 : nt!KiInvalidOpcodeFault+0x329
fffff804`7aa6ff28 fffff804`87c79cf8     : ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 : nvlddmkm+0xfbaa
fffff804`7aa6ff30 ffffe30d`e8c46000     : fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f : nvlddmkm+0x7d9cf8
fffff804`7aa6ff38 fffff804`87cb4338     : 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 : 0xffffe30d`e8c46000
fffff804`7aa6ff40 00000000`00000001     : ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 00000000`00000004 : nvlddmkm+0x814338
fffff804`7aa6ff48 ffffe30d`e8c75b20     : ffffaba0`48dd044f 00000000`00000000 00000000`00000004 fffff804`87c8052c : 0x1
fffff804`7aa6ff50 ffffaba0`48dd044f     : 00000000`00000000 00000000`00000004 fffff804`87c8052c 00000000`00000007 : 0xffffe30d`e8c75b20
fffff804`7aa6ff58 00000000`00000000     : 00000000`00000004 fffff804`87c8052c 00000000`00000007 fffff804`7aa70070 : 0xffffaba0`48dd044f


SYMBOL_NAME:  nvlddmkm+fbaa

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  fbaa

FAILURE_BUCKET_ID:  0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b1419c26-9117-4912-480f-77f62d207e93}

Followup:     MachineOwner
---------



UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd680673c6e70
Arg3: 0000000063f5ba10
Arg4: fffff80205088acc

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 14042

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffd680673c6e70

BUGCHECK_P3: 63f5ba10

BUGCHECK_P4: fffff80205088acc

TRAP_FRAME:  ffffd680673c6e70 -- (.trap 0xffffd680673c6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb50fe67b1000
rdx=ffffb50fe67b1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80205088acc rsp=0000000063f5ba10 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000001 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!EtwpWaitForBufferReferenceCount+0x14:
fffff802`05088acc 5b              pop     rbx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  0000000063f5ba10

STACK_TEXT: 
ffffd680`673c6d28 fffff802`04e05e69     : 00000000`0000007f 00000000`00000008 ffffd680`673c6e70 00000000`63f5ba10 : nt!KeBugCheckEx
ffffd680`673c6d30 fffff802`04e00c83     : 00009abf`fffffe21 ccccffff`fde0e9c0 49dc8b4c`cccccccc 49186b89`49105b89 : nt!KiBugCheckDispatch+0x69
ffffd680`673c6e70 fffff802`05088acc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`63f5ba10 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpWaitForBufferReferenceCount+0x14


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c3

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80265ecb98e, Address of the instruction which caused the bugcheck
Arg3: fffff6029c5f65b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12948

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80265ecb98e

BUGCHECK_P3: fffff6029c5f65b0

BUGCHECK_P4: 0

CONTEXT:  fffff6029c5f65b0 -- (.cxr 0xfffff6029c5f65b0)
rax=0000000000000f30 rbx=2175f3dacb5196d7 rcx=fffff5ffc00034f8
rdx=0000000000000020 rsi=fffff59244767dd0 rdi=fffff59244767dc0
rip=fffff80265ecb98e rsp=fffff6029c5f6fb0 rbp=fffff6029c5f7b80
 r8=0000000000000030  r9=fffff5ffc0001000 r10=0000000000000020
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExFreeHeapPool+0x21e:
fffff802`65ecb98e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:002b:2175f3da`cb5196ff=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  League of Legends.exe

STACK_TEXT: 
fffff602`9c5f6fb0 fffff802`665b2019     : 00000000`00000001 00000000`00000001 fffff5cd`39df37b0 01000000`00100000 : nt!ExFreeHeapPool+0x21e
fffff602`9c5f7090 fffff5cd`39df3802     : 00000000`00000000 fffff592`44cf1010 00000000`00021cff ffffbd85`24351080 : nt!ExFreePool+0x9
fffff602`9c5f70c0 fffff5cd`39245697     : 00000000`00000000 fffff592`44767dd0 fffff592`44767dd0 fffff592`44cf1010 : win32kfull!Win32FreePoolImpl+0x52
fffff602`9c5f70f0 fffff5cd`39d67b58     : 00000000`00000000 fffff592`44cf1010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff602`9c5f7120 fffff5cd`39556fcf     : fffff602`9c5f7aa8 00000000`00000000 fffff602`ffffffff 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff602`9c5f7a50 fffff802`660058b8     : fffff592`44cf1010 fffff5cd`39df14a3 00000000`71da7a70 ffffbd85`24351080 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff602`9c5f7a90 00007fff`a3239014     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`14d2e2b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a3239014


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.508

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff6029c5f65b0 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------
 
Belleklerinizde sorun görünüyor, test yapın.

Ayrıca ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804730019c1, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7213

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 1

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804730019c1

READ_ADDRESS: fffff804738fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000001

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffffba08708ca3e0 -- (.trap 0xffffba08708ca3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ffffffeffff rbx=0000000000000000 rcx=ffffba08708ca6e0
rdx=ffff8b87a322c340 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804730019c1 rsp=ffffba08708ca578 rbp=0000000000010000
r8=0000000000000000  r9=0000000000010169 r10=0000000000010000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac po cy
nt!KiGeneralProtectionFault+0x1:
fffff804`730019c1 4881ec58010000  sub     rsp,158h
Resetting default scope

STACK_TEXT:
ffffba08`708ca298 fffff804`73005e69     : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffba08`708ca2a0 fffff804`73002169     : 000a4c64`0000ffff 00000000`000000ff 00000000`ffffffff ffffba08`00000000 : nt!KiBugCheckDispatch+0x69
ffffba08`708ca3e0 fffff804`730019c1     : 00000000`00010000 00000000`0000a668 fffff804`732dda09 00000000`00000010 : nt!KiPageFault+0x469
ffffba08`708ca578 fffff804`732dda09     : ffff8b87`a3691a80 ffffba08`708ca669 ffff8b87`a3f84080 fffff804`72f43fd1 : nt!KiGeneralProtectionFault+0x1
ffffba08`708ca5b0 fffff804`732dd884     : 00000000`00000000 ffff8b87`a322c340 00000000`00010000 00000000`00000000 : nt!MiFindEmptyAddressRange+0xf9
ffffba08`708ca630 fffff804`732e5e7e     : ffff8b87`00000000 00000000`00000000 00000000`00000001 00000000`00001000 : nt!MiSelectUserAddress+0x114
ffffba08`708ca6d0 fffff804`732e57cc     : 00000000`00000004 ffffc088`00000000 ffffba08`708ca9a8 ffffba08`708ca9b8 : nt!MiMapViewOfDataSection+0x32e
ffffba08`708ca800 fffff804`732e48a9     : 00000000`00000000 ffffba08`708cab80 0000003d`090e7fa8 00000000`00000000 : nt!MiMapViewOfSection+0x34c
ffffba08`708ca950 fffff804`730058b8     : ffff8b87`a3f84080 0000003d`090e7f68 0000003d`090e7fe8 00000000`00000000 : nt!NtMapViewOfSection+0x159
ffffba08`708caa90 00007ffb`8cb8c2c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003d`090e7f48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8cb8c2c4


SYMBOL_NAME:  nt!KiGeneralProtectionFault+1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1

FAILURE_BUCKET_ID:  AV_nt!KiGeneralProtectionFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dd04af12-f86f-9688-c9a3-e403f84a6db3}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80679a07080, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80679a07080, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7845

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff80679a07080

BUGCHECK_P2: 10

BUGCHECK_P3: fffff80679a07080

BUGCHECK_P4: 2

READ_ADDRESS: fffff806292fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80679a07080

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffffef01dd79bf50 -- (.trap 0xffffef01dd79bf50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000670 rbx=0000000000000000 rcx=ffffef01dd79c120
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80679a07080 rsp=ffffef01dd79c0e8 rbp=ffffef01dd79c790
r8=000000000000066f  r9=0000000000000007 r10=0000000000000000
r11=0000021e67397550 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffff806`79a07080 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff806`79a07080 ??              ???

STACK_TEXT:
ffffef01`dd79bca8 fffff806`28a86729     : 00000000`00000050 fffff806`79a07080 00000000`00000010 ffffef01`dd79bf50 : nt!KeBugCheckEx
ffffef01`dd79bcb0 fffff806`288eeb80     : ffff8002`7bfa08f0 00000000`00000010 ffffef01`dd79bfd0 00000000`00000000 : nt!MiSystemFault+0x13faf9
ffffef01`dd79bdb0 fffff806`28a0205e     : 00000000`00000000 ffff8002`79719c60 00000000`00000000 00020002`00000438 : nt!MmAccessFault+0x400
ffffef01`dd79bf50 fffff806`79a07080     : fffff806`28883d83 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 : nt!KiPageFault+0x35e
ffffef01`dd79c0e8 fffff806`28883d83     : 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 00000000`001f0003 : 0xfffff806`79a07080
ffffef01`dd79c0f0 fffff806`28a05fac     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x223
ffffef01`dd79c920 fffff806`28a01ce0     : ffff8002`7b42d080 ffff8002`7b425080 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffef01`dd79cb00 00007ffa`1c214f9c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
000000cc`0e8af860 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1c214f9c


CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
7 errors : !nt (fffff80628883d8a-fffff80628883dba)
fffff80628883d80  32  18  00  e9  da  fe  ff  ff  4c  8b *e3  98  00  00  00  4c 2.......L......L
fffff80628883d90  89  65 *c5  48  8b  45  20  8b  80  7c *9c  00  00  a8  01  75 .e.H.E ..|.....u
fffff80628883da0  5c  65 *2f  8b  04  25  88  01  00  00 *eb  8b  88  b8  00  00 \e/..%..........
fffff80628883db0  00  48 *28  b9  80  05  00  00  00  74 *fe  81  3b  02  00  00 .H(......t..;...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------



KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff804874afbaa, The address that the exception occurred at
Arg3: ffffe30debe1e080, Parameter 0 of the exception
Arg4: ffffe30de8c75b20, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19018

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff804874afbaa

BUGCHECK_P3: ffffe30debe1e080

BUGCHECK_P4: ffffe30de8c75b20

EXCEPTION_PARAMETER1:  ffffe30debe1e080

EXCEPTION_PARAMETER2:  ffffe30de8c75b20

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  League of Legends.exe

BAD_STACK_POINTER:  fffff8047aa80158

FAILED_INSTRUCTION_ADDRESS:
nvlddmkm+fbaa
fffff804`874afbaa 46898c112c010000 mov     dword ptr [rcx+r10+12Ch],r9d

STACK_TEXT:
fffff804`7aa80158 fffff804`76cf4d4e     : 00000000`0000001e ffffffff`c000001d fffff804`874afbaa ffffe30d`ebe1e080 : nt!KeBugCheckEx
fffff804`7aa80160 fffff804`76bfcd62     : fffff804`76cf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff804`7aa801a0 fffff804`76a85027     : fffff804`7aa80710 00000000`00000000 fffff804`7aa72fb0 fffff804`76bfaee5 : nt!RtlpExecuteHandlerForException+0x12
fffff804`7aa801d0 fffff804`76a83ce6     : fffff804`7aa6fce8 fffff804`7aa80e20 fffff804`7aa6fce8 00000000`00000000 : nt!RtlDispatchException+0x297
fffff804`7aa808f0 fffff804`76bf4d32     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`7aa80fb0 fffff804`76bf4d00     : fffff804`76c05fa5 00000000`0000003f 00000000`0000003f 00000000`00000020 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`7aa6fba8 fffff804`76c05fa5     : 00000000`0000003f 00000000`0000003f 00000000`00000020 fffff804`76ac7423 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff804`7aa6fbb0 fffff804`76c004e9     : ffffe30d`e8c75b20 fffff804`87c7a0e8 00000000`00000003 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff804`7aa6fd90 fffff804`874afbaa     : fffff804`87c79cf8 ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 : nt!KiInvalidOpcodeFault+0x329
fffff804`7aa6ff28 fffff804`87c79cf8     : ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 : nvlddmkm+0xfbaa
fffff804`7aa6ff30 ffffe30d`e8c46000     : fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f : nvlddmkm+0x7d9cf8
fffff804`7aa6ff38 fffff804`87cb4338     : 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 : 0xffffe30d`e8c46000
fffff804`7aa6ff40 00000000`00000001     : ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 00000000`00000004 : nvlddmkm+0x814338
fffff804`7aa6ff48 ffffe30d`e8c75b20     : ffffaba0`48dd044f 00000000`00000000 00000000`00000004 fffff804`87c8052c : 0x1
fffff804`7aa6ff50 ffffaba0`48dd044f     : 00000000`00000000 00000000`00000004 fffff804`87c8052c 00000000`00000007 : 0xffffe30d`e8c75b20
fffff804`7aa6ff58 00000000`00000000     : 00000000`00000004 fffff804`87c8052c 00000000`00000007 fffff804`7aa70070 : 0xffffaba0`48dd044f


SYMBOL_NAME:  nvlddmkm+fbaa

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  fbaa

FAILURE_BUCKET_ID:  0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b1419c26-9117-4912-480f-77f62d207e93}

Followup:     MachineOwner
---------



UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd680673c6e70
Arg3: 0000000063f5ba10
Arg4: fffff80205088acc

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 14042

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffd680673c6e70

BUGCHECK_P3: 63f5ba10

BUGCHECK_P4: fffff80205088acc

TRAP_FRAME:  ffffd680673c6e70 -- (.trap 0xffffd680673c6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb50fe67b1000
rdx=ffffb50fe67b1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80205088acc rsp=0000000063f5ba10 rbp=0000000000000000
r8=0000000000000000  r9=0000000000000001 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!EtwpWaitForBufferReferenceCount+0x14:
fffff802`05088acc 5b              pop     rbx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  0000000063f5ba10

STACK_TEXT:
ffffd680`673c6d28 fffff802`04e05e69     : 00000000`0000007f 00000000`00000008 ffffd680`673c6e70 00000000`63f5ba10 : nt!KeBugCheckEx
ffffd680`673c6d30 fffff802`04e00c83     : 00009abf`fffffe21 ccccffff`fde0e9c0 49dc8b4c`cccccccc 49186b89`49105b89 : nt!KiBugCheckDispatch+0x69
ffffd680`673c6e70 fffff802`05088acc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`63f5ba10 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpWaitForBufferReferenceCount+0x14


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c3

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80265ecb98e, Address of the instruction which caused the bugcheck
Arg3: fffff6029c5f65b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12948

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80265ecb98e

BUGCHECK_P3: fffff6029c5f65b0

BUGCHECK_P4: 0

CONTEXT:  fffff6029c5f65b0 -- (.cxr 0xfffff6029c5f65b0)
rax=0000000000000f30 rbx=2175f3dacb5196d7 rcx=fffff5ffc00034f8
rdx=0000000000000020 rsi=fffff59244767dd0 rdi=fffff59244767dc0
rip=fffff80265ecb98e rsp=fffff6029c5f6fb0 rbp=fffff6029c5f7b80
r8=0000000000000030  r9=fffff5ffc0001000 r10=0000000000000020
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExFreeHeapPool+0x21e:
fffff802`65ecb98e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:002b:2175f3da`cb5196ff=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  League of Legends.exe

STACK_TEXT:
fffff602`9c5f6fb0 fffff802`665b2019     : 00000000`00000001 00000000`00000001 fffff5cd`39df37b0 01000000`00100000 : nt!ExFreeHeapPool+0x21e
fffff602`9c5f7090 fffff5cd`39df3802     : 00000000`00000000 fffff592`44cf1010 00000000`00021cff ffffbd85`24351080 : nt!ExFreePool+0x9
fffff602`9c5f70c0 fffff5cd`39245697     : 00000000`00000000 fffff592`44767dd0 fffff592`44767dd0 fffff592`44cf1010 : win32kfull!Win32FreePoolImpl+0x52
fffff602`9c5f70f0 fffff5cd`39d67b58     : 00000000`00000000 fffff592`44cf1010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff602`9c5f7120 fffff5cd`39556fcf     : fffff602`9c5f7aa8 00000000`00000000 fffff602`ffffffff 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff602`9c5f7a50 fffff802`660058b8     : fffff592`44cf1010 fffff5cd`39df14a3 00000000`71da7a70 ffffbd85`24351080 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff602`9c5f7a90 00007fff`a3239014     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`14d2e2b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a3239014


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.508

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff6029c5f65b0 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------
Belleklerinizde sorun görünüyor, test yapın.

Ayrıca ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804730019c1, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7213

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 1

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804730019c1

READ_ADDRESS: fffff804738fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000001

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffffba08708ca3e0 -- (.trap 0xffffba08708ca3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ffffffeffff rbx=0000000000000000 rcx=ffffba08708ca6e0
rdx=ffff8b87a322c340 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804730019c1 rsp=ffffba08708ca578 rbp=0000000000010000
r8=0000000000000000  r9=0000000000010169 r10=0000000000010000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac po cy
nt!KiGeneralProtectionFault+0x1:
fffff804`730019c1 4881ec58010000  sub     rsp,158h
Resetting default scope

STACK_TEXT:
ffffba08`708ca298 fffff804`73005e69     : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffba08`708ca2a0 fffff804`73002169     : 000a4c64`0000ffff 00000000`000000ff 00000000`ffffffff ffffba08`00000000 : nt!KiBugCheckDispatch+0x69
ffffba08`708ca3e0 fffff804`730019c1     : 00000000`00010000 00000000`0000a668 fffff804`732dda09 00000000`00000010 : nt!KiPageFault+0x469
ffffba08`708ca578 fffff804`732dda09     : ffff8b87`a3691a80 ffffba08`708ca669 ffff8b87`a3f84080 fffff804`72f43fd1 : nt!KiGeneralProtectionFault+0x1
ffffba08`708ca5b0 fffff804`732dd884     : 00000000`00000000 ffff8b87`a322c340 00000000`00010000 00000000`00000000 : nt!MiFindEmptyAddressRange+0xf9
ffffba08`708ca630 fffff804`732e5e7e     : ffff8b87`00000000 00000000`00000000 00000000`00000001 00000000`00001000 : nt!MiSelectUserAddress+0x114
ffffba08`708ca6d0 fffff804`732e57cc     : 00000000`00000004 ffffc088`00000000 ffffba08`708ca9a8 ffffba08`708ca9b8 : nt!MiMapViewOfDataSection+0x32e
ffffba08`708ca800 fffff804`732e48a9     : 00000000`00000000 ffffba08`708cab80 0000003d`090e7fa8 00000000`00000000 : nt!MiMapViewOfSection+0x34c
ffffba08`708ca950 fffff804`730058b8     : ffff8b87`a3f84080 0000003d`090e7f68 0000003d`090e7fe8 00000000`00000000 : nt!NtMapViewOfSection+0x159
ffffba08`708caa90 00007ffb`8cb8c2c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003d`090e7f48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8cb8c2c4


SYMBOL_NAME:  nt!KiGeneralProtectionFault+1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1

FAILURE_BUCKET_ID:  AV_nt!KiGeneralProtectionFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dd04af12-f86f-9688-c9a3-e403f84a6db3}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80679a07080, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80679a07080, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7845

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff80679a07080

BUGCHECK_P2: 10

BUGCHECK_P3: fffff80679a07080

BUGCHECK_P4: 2

READ_ADDRESS: fffff806292fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80679a07080

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffffef01dd79bf50 -- (.trap 0xffffef01dd79bf50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000670 rbx=0000000000000000 rcx=ffffef01dd79c120
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80679a07080 rsp=ffffef01dd79c0e8 rbp=ffffef01dd79c790
r8=000000000000066f  r9=0000000000000007 r10=0000000000000000
r11=0000021e67397550 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffff806`79a07080 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff806`79a07080 ??              ???

STACK_TEXT:
ffffef01`dd79bca8 fffff806`28a86729     : 00000000`00000050 fffff806`79a07080 00000000`00000010 ffffef01`dd79bf50 : nt!KeBugCheckEx
ffffef01`dd79bcb0 fffff806`288eeb80     : ffff8002`7bfa08f0 00000000`00000010 ffffef01`dd79bfd0 00000000`00000000 : nt!MiSystemFault+0x13faf9
ffffef01`dd79bdb0 fffff806`28a0205e     : 00000000`00000000 ffff8002`79719c60 00000000`00000000 00020002`00000438 : nt!MmAccessFault+0x400
ffffef01`dd79bf50 fffff806`79a07080     : fffff806`28883d83 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 : nt!KiPageFault+0x35e
ffffef01`dd79c0e8 fffff806`28883d83     : 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 00000000`001f0003 : 0xfffff806`79a07080
ffffef01`dd79c0f0 fffff806`28a05fac     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x223
ffffef01`dd79c920 fffff806`28a01ce0     : ffff8002`7b42d080 ffff8002`7b425080 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffef01`dd79cb00 00007ffa`1c214f9c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
000000cc`0e8af860 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1c214f9c


CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
7 errors : !nt (fffff80628883d8a-fffff80628883dba)
fffff80628883d80  32  18  00  e9  da  fe  ff  ff  4c  8b *e3  98  00  00  00  4c 2.......L......L
fffff80628883d90  89  65 *c5  48  8b  45  20  8b  80  7c *9c  00  00  a8  01  75 .e.H.E ..|.....u
fffff80628883da0  5c  65 *2f  8b  04  25  88  01  00  00 *eb  8b  88  b8  00  00 \e/..%..........
fffff80628883db0  00  48 *28  b9  80  05  00  00  00  74 *fe  81  3b  02  00  00 .H(......t..;...

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  STRIDE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_STRIDE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup:     memory_corruption
---------



KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff804874afbaa, The address that the exception occurred at
Arg3: ffffe30debe1e080, Parameter 0 of the exception
Arg4: ffffe30de8c75b20, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19018

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc000001d

BUGCHECK_P2: fffff804874afbaa

BUGCHECK_P3: ffffe30debe1e080

BUGCHECK_P4: ffffe30de8c75b20

EXCEPTION_PARAMETER1:  ffffe30debe1e080

EXCEPTION_PARAMETER2:  ffffe30de8c75b20

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  League of Legends.exe

BAD_STACK_POINTER:  fffff8047aa80158

FAILED_INSTRUCTION_ADDRESS:
nvlddmkm+fbaa
fffff804`874afbaa 46898c112c010000 mov     dword ptr [rcx+r10+12Ch],r9d

STACK_TEXT:
fffff804`7aa80158 fffff804`76cf4d4e     : 00000000`0000001e ffffffff`c000001d fffff804`874afbaa ffffe30d`ebe1e080 : nt!KeBugCheckEx
fffff804`7aa80160 fffff804`76bfcd62     : fffff804`76cf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff804`7aa801a0 fffff804`76a85027     : fffff804`7aa80710 00000000`00000000 fffff804`7aa72fb0 fffff804`76bfaee5 : nt!RtlpExecuteHandlerForException+0x12
fffff804`7aa801d0 fffff804`76a83ce6     : fffff804`7aa6fce8 fffff804`7aa80e20 fffff804`7aa6fce8 00000000`00000000 : nt!RtlDispatchException+0x297
fffff804`7aa808f0 fffff804`76bf4d32     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`7aa80fb0 fffff804`76bf4d00     : fffff804`76c05fa5 00000000`0000003f 00000000`0000003f 00000000`00000020 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`7aa6fba8 fffff804`76c05fa5     : 00000000`0000003f 00000000`0000003f 00000000`00000020 fffff804`76ac7423 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff804`7aa6fbb0 fffff804`76c004e9     : ffffe30d`e8c75b20 fffff804`87c7a0e8 00000000`00000003 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff804`7aa6fd90 fffff804`874afbaa     : fffff804`87c79cf8 ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 : nt!KiInvalidOpcodeFault+0x329
fffff804`7aa6ff28 fffff804`87c79cf8     : ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 : nvlddmkm+0xfbaa
fffff804`7aa6ff30 ffffe30d`e8c46000     : fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f : nvlddmkm+0x7d9cf8
fffff804`7aa6ff38 fffff804`87cb4338     : 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 : 0xffffe30d`e8c46000
fffff804`7aa6ff40 00000000`00000001     : ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 00000000`00000004 : nvlddmkm+0x814338
fffff804`7aa6ff48 ffffe30d`e8c75b20     : ffffaba0`48dd044f 00000000`00000000 00000000`00000004 fffff804`87c8052c : 0x1
fffff804`7aa6ff50 ffffaba0`48dd044f     : 00000000`00000000 00000000`00000004 fffff804`87c8052c 00000000`00000007 : 0xffffe30d`e8c75b20
fffff804`7aa6ff58 00000000`00000000     : 00000000`00000004 fffff804`87c8052c 00000000`00000007 fffff804`7aa70070 : 0xffffaba0`48dd044f


SYMBOL_NAME:  nvlddmkm+fbaa

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  fbaa

FAILURE_BUCKET_ID:  0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b1419c26-9117-4912-480f-77f62d207e93}

Followup:     MachineOwner
---------



UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd680673c6e70
Arg3: 0000000063f5ba10
Arg4: fffff80205088acc

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 14042

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffd680673c6e70

BUGCHECK_P3: 63f5ba10

BUGCHECK_P4: fffff80205088acc

TRAP_FRAME:  ffffd680673c6e70 -- (.trap 0xffffd680673c6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb50fe67b1000
rdx=ffffb50fe67b1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80205088acc rsp=0000000063f5ba10 rbp=0000000000000000
r8=0000000000000000  r9=0000000000000001 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!EtwpWaitForBufferReferenceCount+0x14:
fffff802`05088acc 5b              pop     rbx
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

BAD_STACK_POINTER:  0000000063f5ba10

STACK_TEXT:
ffffd680`673c6d28 fffff802`04e05e69     : 00000000`0000007f 00000000`00000008 ffffd680`673c6e70 00000000`63f5ba10 : nt!KeBugCheckEx
ffffd680`673c6d30 fffff802`04e00c83     : 00009abf`fffffe21 ccccffff`fde0e9c0 49dc8b4c`cccccccc 49186b89`49105b89 : nt!KiBugCheckDispatch+0x69
ffffd680`673c6e70 fffff802`05088acc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`63f5ba10 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpWaitForBufferReferenceCount+0x14


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c3

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80265ecb98e, Address of the instruction which caused the bugcheck
Arg3: fffff6029c5f65b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12948

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80265ecb98e

BUGCHECK_P3: fffff6029c5f65b0

BUGCHECK_P4: 0

CONTEXT:  fffff6029c5f65b0 -- (.cxr 0xfffff6029c5f65b0)
rax=0000000000000f30 rbx=2175f3dacb5196d7 rcx=fffff5ffc00034f8
rdx=0000000000000020 rsi=fffff59244767dd0 rdi=fffff59244767dc0
rip=fffff80265ecb98e rsp=fffff6029c5f6fb0 rbp=fffff6029c5f7b80
r8=0000000000000030  r9=fffff5ffc0001000 r10=0000000000000020
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExFreeHeapPool+0x21e:
fffff802`65ecb98e 488b5328        mov     rdx,qword ptr [rbx+28h] ds:002b:2175f3da`cb5196ff=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  League of Legends.exe

STACK_TEXT:
fffff602`9c5f6fb0 fffff802`665b2019     : 00000000`00000001 00000000`00000001 fffff5cd`39df37b0 01000000`00100000 : nt!ExFreeHeapPool+0x21e
fffff602`9c5f7090 fffff5cd`39df3802     : 00000000`00000000 fffff592`44cf1010 00000000`00021cff ffffbd85`24351080 : nt!ExFreePool+0x9
fffff602`9c5f70c0 fffff5cd`39245697     : 00000000`00000000 fffff592`44767dd0 fffff592`44767dd0 fffff592`44cf1010 : win32kfull!Win32FreePoolImpl+0x52
fffff602`9c5f70f0 fffff5cd`39d67b58     : 00000000`00000000 fffff592`44cf1010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff602`9c5f7120 fffff5cd`39556fcf     : fffff602`9c5f7aa8 00000000`00000000 fffff602`ffffffff 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff602`9c5f7a50 fffff802`660058b8     : fffff592`44cf1010 fffff5cd`39df14a3 00000000`71da7a70 ffffbd85`24351080 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff602`9c5f7a90 00007fff`a3239014     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`14d2e2b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a3239014


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.508

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff6029c5f65b0 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------
Ramleri test ettim bu sonuç çıktı. Ramleri tek tek test yaptım ikisinde de problem gözükmedi.
 

Dosya Ekleri

  • A5615FF2-CCB4-4771-88DC-ABCB0A487D43.jpeg
    A5615FF2-CCB4-4771-88DC-ABCB0A487D43.jpeg
    153,6 KB · Görüntüleme: 46

Geri
Yukarı