Bu hataya sebebiyet veren sürücü genelde gözüküyor. Ama bu sefer gözükmemiş.
Anlık almış olabilirsiniz.
Ama sisteminizde arka planda birden fazla anti-hile yazılımı aynı anda çalışıyor.
Daha önce bu bugcheck ile alakalı açılmış mavi ekran konularında problemin anti-hile yazılımlarının sürücülerinin bozulmasından/eskimesinden kaynaklı olabileceğinden bahsedilmiş.
Sisteminizde gördüğüm ve arka planda aynı anda çalışan anti-hile yazılımları:
xhunter1.sys
= XIGNCODE3
BEDaisy.sys
= BattlEye
navagio.sys
= PUBG anti-hile yazılımının bir parçası
- Görev yöneticisinde BattlEye, XIGNCODE vs. bunlarla ile alakalı ne varsa hepsini sonlandırın.
- PUBG oyun dosyalarının dizininde
navagio.sys
olması lazım. Bunu silin.
- Hatta diskte bu dosyayı aratın. Nerede bir kopyası varsa silin gitsin.
- Daha sonra PUBG oyun dosyalarının bütünlüğünü doğrulayın.
- Veya direkt oyunun kendisine girmeye çalışınca otomatik indirecek.
- Ekran kartı sürücünüzü de güncelleyin, Nisan 2023'te kalmış.
Rich (BB code):Panoya kopyala
Timestamp: Tue Apr 25 21:16:05 2023 (644818E5)
- Bir de BIOS'a yeni güncelle gelmiş, 4004.
M.2 desteği, HDMI/DVI-D/D-Sub, SATA 6 Gbps, 1 Gb Ethernet, USB 3.2 Gen 1 Type-A ve BIOS FlashBack™ özelliklerine sahip AMD B450 (Ryzen AM4) micro ATX anakart
www.asus.com
* Tekrar mavi ekran alırsanız bu konu üzerinden paylaşın.
Döküm:
Kod:Panoya kopyala
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff805682b7aa1, Virtual address for the attempted execute.
Arg2: 80000003ad521929, PTE contents.
Arg3: ffffb186134af540, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1828
Key : Analysis.Elapsed.mSec
Value: 1953
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 218
Key : Analysis.Init.Elapsed.mSec
Value: 14854
Key : Analysis.Memory.CommitPeak.Mb
Value: 152
Key : Bugcheck.Code.LegacyAPI
Value: 0xfc
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: 0xFC_nt!MiCheckSystemNxFault
Key : Failure.Hash
Value: {a6ae5288-6b71-974a-9b09-23f14d998164}
BUGCHECK_CODE: fc
BUGCHECK_P1: fffff805682b7aa1
BUGCHECK_P2: 80000003ad521929
BUGCHECK_P3: ffffb186134af540
BUGCHECK_P4: 2
FILE_IN_CAB: 062123-10796-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb186134af540 -- (.trap 0xffffb186134af540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000288620 rbx=0000000000000000 rcx=ffffb186134af820
rdx=ffffffffffd7798f rsi=0000000000000000 rdi=0000000000000000
rip=fffff805682b7aa1 rsp=ffffb186134af6d8 rbp=00000000002886a8
r8=fffff8051d400000 r9=ffffb186134af8c0 r10=fffff805682b7aa1
r11=0000000048fea7e7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
fffff805`682b7aa1 0000 add byte ptr [rax],al ds:00000000`00288620=??
Resetting default scope
STACK_TEXT:
ffffb186`134af2d8 fffff805`1d8e42a8 : 00000000`000000fc fffff805`682b7aa1 80000003`ad521929 ffffb186`134af540 : nt!KeBugCheckEx
ffffb186`134af2e0 fffff805`1d630b06 : fffff805`682b7aa1 ffffb186`134af460 ffffb186`00000000 fffff805`1e069700 : nt!MiCheckSystemNxFault+0x194c98
ffffb186`134af320 fffff805`1d633f0c : fffff805`1e069700 00000000`00000011 00000000`00000000 fffff805`682b7aa1 : nt!MiSystemFault+0x636
ffffb186`134af420 fffff805`1d83ce29 : ffffffff`ffd7798f ffffb186`134af5c0 00000000`00000005 ffffffff`fffbfd79 : nt!MmAccessFault+0x29c
ffffb186`134af540 fffff805`682b7aa1 : 00000000`0004c681 00000000`00000007 00000000`00040286 fffff805`1d688670 : nt!KiPageFault+0x369
ffffb186`134af6d8 00000000`0004c681 : 00000000`00000007 00000000`00040286 fffff805`1d688670 00000000`00040202 : 0xfffff805`682b7aa1
ffffb186`134af6e0 00000000`00000007 : 00000000`00040286 fffff805`1d688670 00000000`00040202 00000000`00000005 : 0x4c681
ffffb186`134af6e8 00000000`00040286 : fffff805`1d688670 00000000`00040202 00000000`00000005 ffffb186`134af950 : 0x7
ffffb186`134af6f0 fffff805`1d68866f : 00000000`00040202 00000000`00000005 ffffb186`134af950 fffff805`1d400000 : 0x40286
ffffb186`134af6f8 00000000`00040202 : 00000000`00000005 ffffb186`134af950 fffff805`1d400000 fffff803`df020000 : nt!IopDequeueIrpFromThread+0x13f
ffffb186`134af700 00000000`00000005 : ffffb186`134af950 fffff805`1d400000 fffff803`df020000 00000000`00000804 : 0x40202
ffffb186`134af708 ffffb186`134af950 : fffff805`1d400000 fffff803`df020000 00000000`00000804 ffffb186`134af950 : 0x5
ffffb186`134af710 fffff805`1d400000 : fffff803`df020000 00000000`00000804 ffffb186`134af950 00000000`00000000 : 0xffffb186`134af950
ffffb186`134af718 fffff803`df020000 : 00000000`00000804 ffffb186`134af950 00000000`00000000 fffff805`1d688670 : nt!`_CmDeleteDeviceInterfaceRegKeyWorker'::`2'::HardwareProfilesKeyPrefix <PERF> (nt+0x0)
ffffb186`134af720 00000000`00000804 : ffffb186`134af950 00000000`00000000 fffff805`1d688670 00000000`00000003 : 0xfffff803`df020000
ffffb186`134af728 ffffb186`134af950 : 00000000`00000000 fffff805`1d688670 00000000`00000003 00000000`00000000 : 0x804
ffffb186`134af730 00000000`00000000 : fffff805`1d688670 00000000`00000003 00000000`00000000 00000000`000000ff : 0xffffb186`134af950
SYMBOL_NAME: nt!MiCheckSystemNxFault+194c98
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.1848
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 194c98
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner
---------