R5 3500X GTX 1660 Super mavi ekran hatası

İşletim sistemi
Windows 10

xcage23

Yoctopat
Katılım
15 Mayıs 2023
Mesajlar
1
Daha fazla  
Cinsiyet
Erkek
RAM
16
SSD veya HDD modeli
KINGSTON SA2000M85000G
Ekran kartı
nvidia geforce gtx 1660 super
Anakart
b450
İşlemci
amd ryzen 5 3500x
Son düzenleyen: Moderatör:
Hatalarınız çok çeşitli. O yüzden ilk etapta BIOS geldi aklıma. BIOS sürümünüz epey bir eski kalmış.

Yüklü BIOS bilgileri:
Kod:
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2427]
BiosVersion = 2203
BiosReleaseDate = 07/28/2020
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B450M-A
BaseBoardVersion = Rev X.0x

Kullandığınız 2203 BIOS'tan sonra 2 yıllık süre içerisinde 4002'ye kadar sistem stabilite ve performans iyileştirmeleri yapılmış.

Anakartınızın destek sayfası: PRIME B450M-A
Güncel BIOS sürümü indirmek için: PRIME B450M-A BIOS 4002
Videolu rehber: ASUS Anakart BIOS Güncelleme 2023

BIOS'unuzu güncelledikten sonra mavi ekran alıp almadığınızı bildirirsiniz konu üzerinden.

Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80550cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2390

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4531

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 31

    Key  : Analysis.Init.Elapsed.mSec
    Value: 20129

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 144

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x133

    Key  : Bugcheck.Code.Register
    Value: 0x133

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051523-10125-01.dmp

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80550cfb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffd60fcb1b0f90 -- (.trap 0xffffd60fcb1b0f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005cd054aa rbx=0000000000000000 rcx=ffffd60fcb1b11f8
rdx=ffffd90beb376c10 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805502de397 rsp=ffffd60fcb1b1120 rbp=fffff8054d112180
 r8=0000000000000000  r9=000000608e68d404 r10=fffff8054d112180
r11=ffffd60fcb1b11e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff805`502de397 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvsphelper64.exe

STACK_TEXT: 
fffff805`55085e18 fffff805`50443814     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`50cfb320 : nt!KeBugCheckEx
fffff805`55085e20 fffff805`502813c3     : 000087f7`57288f79 fffff805`4d112180 00000000`00000000 fffff805`4d112180 : nt!KeAccumulateTicks+0x1bfbf4
fffff805`55085e80 fffff805`50280eaa     : fffff805`50cf3940 ffffd60f`cb1b1010 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
fffff805`55085f30 fffff805`5033e965     : fffff805`50cf3940 fffff805`50322fb7 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
fffff805`55085f60 fffff805`503fdc3a     : ffffd60f`cb1b1010 fffff805`50cf3940 ffffd90b`eb376c00 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff805`55085fb0 fffff805`503fe407     : ffffd60f`cb1b11f8 fffff805`4d112180 fffff805`50cf3940 ffffd90b`e326c080 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffd60f`cb1b0f90 fffff805`502de397     : ffffffff`ffffffd2 fffff805`5021c282 00000000`00000010 00000000`00040282 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffd60f`cb1b1120 fffff805`5021c27e     : 00000000`00000100 00000000`00000000 ffffd60f`cb1b1251 fffff805`50212331 : nt!KeYieldProcessorEx+0x17
ffffd60f`cb1b1150 fffff805`502dd0fe     : ffffd90b`00000000 00000000`5cd054aa 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x4de
ffffd60f`cb1b11f0 fffff805`50688750     : 00000000`000000f0 ffffd60f`cb1b1340 ffffd90b`e353d800 000f8067`00000000 : nt!KeWaitForMultipleObjects+0x2be
ffffd60f`cb1b1300 fffff805`50688429     : fffff805`50365240 fffff805`50266b4f ffffd60f`cb1b1848 fffff805`00000000 : nt!ObWaitForMultipleObjects+0x2f0
ffffd60f`cb1b1800 fffff805`5040f4f8     : ffffd60f`cb1b1b18 00000000`00000000 ffffd90b`e326c080 ffffd90b`e3f66bd0 : nt!NtWaitForMultipleObjects+0x119
ffffd60f`cb1b1a90 00007ff9`6de8dbb4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000066`a66ff408 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6de8dbb4


SYMBOL_NAME:  nt!KeAccumulateTicks+1bfbf4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1bfbf4

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000f64, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034308b5b2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 374

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8341

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 29237

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051423-10328-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: f64

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8034308b5b2

READ_ADDRESS: fffff80343afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000f64

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff803468776d0 -- (.trap 0xfffff803468776d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000011cd424ec9fb rbx=0000000000000000 rcx=ffffc50d26beb00f
rdx=000011cd00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034308b5b2 rsp=fffff80346877860 rbp=fffff80346877960
 r8=0000000000000008  r9=0000000000001a4c r10=0000000000000000
r11=fffff803430800a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiExecuteAllDpcs+0x342:
fffff803`4308b5b2 4d2b7720        sub     r14,qword ptr [r15+20h] ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff803`46877588 fffff803`4320fd29     : 00000000`0000000a 00000000`00000f64 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff803`46877590 fffff803`4320b8e3     : 0000005f`fda9d3e2 fffff803`43198b3a 00000064`a17c6a64 fffff803`3e92c210 : nt!KiBugCheckDispatch+0x69
fffff803`468776d0 fffff803`4308b5b2     : fffff803`3e927240 ffffc50d`26a0f000 00000000`00000004 fffff803`00000002 : nt!KiPageFault+0x463
fffff803`46877860 fffff803`4308a864     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x342
fffff803`468779d0 fffff803`4320059e     : 00000000`00000000 fffff803`3e924180 fffff803`43b27a00 ffffc50d`34d115c0 : nt!KiRetireDpcList+0x1f4
fffff803`46877c60 00000000`00000000     : fffff803`46878000 fffff803`46872000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiExecuteAllDpcs+342

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  342

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80151c42046, Address of the instruction which caused the BugCheck
Arg3: fffff80154a8c920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 343

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4396

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 61

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5178

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051323-10156-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80151c42046

BUGCHECK_P3: fffff80154a8c920

BUGCHECK_P4: 0

CONTEXT:  fffff80154a8c920 -- (.cxr 0xfffff80154a8c920)
rax=ffffc4028bdd2668 rbx=ffffc4028bed3080 rcx=c4028bdd2630c545
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffc4028bdd2660
rip=fffff80151c42046 rsp=ffffab820efcb940 rbp=ffffab820efcba01
 r8=0000000000000000  r9=0000000c6e4b2438 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=c4028bdd2630c545
r14=0000000000000000 r15=ffffc4028bed31c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff801`51c42046 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:c4028bdd`2630c565=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  OverwolfBrowser.exe

STACK_TEXT: 
ffffab82`0efcb940 fffff801`51e23aa7     : ffffd680`00000092 fffff801`52011b31 000f8067`b4bbbd01 ffffc402`8bed31c0 : nt!KeAbPreWait+0x6
ffffab82`0efcb970 fffff801`52011641     : ffffc402`8bdd2660 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x208547
ffffab82`0efcba60 fffff801`5201159a     : ffffc402`8bed3080 00000012`5d43fad8 00000000`00000000 000001f3`d1c8a000 : nt!ObWaitForSingleObject+0x91
ffffab82`0efcbac0 fffff801`51e0f4f8     : 000001f3`cfa7b380 00000000`0000000e ffffab82`0efcbb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffab82`0efcbb00 00007ffc`953ad0e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000012`5d43faa8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`953ad0e4


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr 0xfffff80154a8c920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  AV_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65496c65-f012-a1f5-2c21-5d59c06ec487}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd2859ddb1740, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd2859ddb1698, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 686

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 2875

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6655

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051423-10203-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd2859ddb1740

BUGCHECK_P3: ffffd2859ddb1698

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd2859ddb1740 -- (.trap 0xffffd2859ddb1740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8051bdb3d80 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff800a5488d158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051fa1c363 rsp=ffffd2859ddb18d0 rbp=fffff8051bdac180
 r8=0000000000000000  r9=0000000417072467 r10=0000000000000002
r11=ffffd2859ddb1968 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiCommitThreadWait+0x5c3:
fffff805`1fa1c363 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd2859ddb1698 -- (.exr 0xffffd2859ddb1698)
ExceptionAddress: fffff8051fa1c363 (nt!KiCommitThreadWait+0x00000000000005c3)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  vgtray.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffd285`9ddb1418 fffff805`1fc0fd29     : 00000000`00000139 00000000`00000003 ffffd285`9ddb1740 ffffd285`9ddb1698 : nt!KeBugCheckEx
ffffd285`9ddb1420 fffff805`1fc10290     : ffffdd01`00000000 00000000`00000000 00000000`00000002 ffffdd01`83097180 : nt!KiBugCheckDispatch+0x69
ffffd285`9ddb1560 fffff805`1fc0e25d     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd285`9ddb1740 fffff805`1fa1c363     : ffff800a`00000003 00000000`00000002 ffffd285`9ddb19e0 fffff805`00000000 : nt!KiRaiseSecurityCheckFailure+0x31d
ffffd285`9ddb18d0 fffff805`1fa1b793     : ffffdd01`00000000 fffff805`00000000 000f8067`b4bbbd00 ffff800a`537b81c0 : nt!KiCommitThreadWait+0x5c3
ffffd285`9ddb1970 fffff805`1fe11641     : ffff800a`53799ee0 00000000`00000006 00000000`00000001 00000000`00000001 : nt!KeWaitForSingleObject+0x233
ffffd285`9ddb1a60 fffff805`1fe1159a     : ffff800a`537b8080 00000043`99effbc8 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffd285`9ddb1ac0 fffff805`1fc0f4f8     : 00000000`00000001 ffff800a`5289a080 ffffd285`9ddb1b18 ffffffff`fff85ee0 : nt!NtWaitForSingleObject+0x6a
ffffd285`9ddb1b00 00007ffd`dbb8d0e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000043`99effb98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`dbb8d0e4


SYMBOL_NAME:  nt!KiCommitThreadWait+5c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  5c3

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {369b7001-cfef-011b-6243-985c04f34d42}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8028a174206, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 00000000000005fc, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1171

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 21276

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 46

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2054

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 138

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1e

    Key  : Bugcheck.Code.Register
    Value: 0x1e

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051423-10796-01.dmp

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8028a174206

BUGCHECK_P3: 1

BUGCHECK_P4: 5fc

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  00000000000005fc

WRITE_ADDRESS: fffff8026c0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00000000000005fc

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
ffffeb0e`b32c9fe8 fffff802`6b860cd3     : 00000000`0000001e ffffffff`c0000005 fffff802`8a174206 00000000`00000001 : nt!KeBugCheckEx
ffffeb0e`b32c9ff0 fffff802`6b80fe6c     : 00000000`00001000 ffffeb0e`b32ca890 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1795c3
ffffeb0e`b32ca6b0 fffff802`6b80b8bd     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffeb0e`b32ca890 fffff802`8a174206     : fffff802`69c86180 00000000`00000000 fffff802`69c86180 ffff978f`ea48b040 : nt!KiPageFault+0x43d
ffffeb0e`b32caa28 ffff978f`00000000     : fffff802`00000005 00000000`00000000 00000000`00000000 ffff978f`00000000 : dxgmms2!VidMmRangeCurationThread+0x6
ffffeb0e`b32caa58 fffff802`00000005     : 00000000`00000000 00000000`00000000 ffff978f`00000000 fffff802`6b647514 : 0xffff978f`00000000
ffffeb0e`b32caa60 00000000`00000000     : 00000000`00000000 ffff978f`00000000 fffff802`6b647514 ffffeb0e`b32caae8 : 0xfffff802`00000005


SYMBOL_NAME:  dxgmms2!VidMmRangeCurationThread+6

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  AV_W_dxgmms2!VidMmRangeCurationThread

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a07e7696-1f16-3f2d-4f41-57a6cb8136e7}

Followup:     MachineOwner
---------
 

Geri
Yukarı