Arif Taban
Megapat
Daha fazla  
				
					
						
						
							
	
		
	
		
			
			
				
			
			
		
		
	- Cinsiyet
 - Erkek
 
IRQL_NOT_LESS_OR_EQUAL (a) ve Npfs.SYSDRIVER_OVERRAN_STACK_BUFFER (f7) ve ntkrnlmp.exeVIDEO_MEMORY_MANAGEMENT_INTERNAL (10e) ve dxgmms2.sysVIDEO_MEMORY_MANAGEMENT_INTERNAL (10e) ve dxgmms2.sysIRQL_NOT_LESS_OR_EQUAL (a) ve ntkrnlmp.exeDPC_WATCHDOG_VIOLATION (133) ve ntkrnlmp.exe*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80283f1c340, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1750
    Key  : Analysis.Elapsed.mSec
    Value: 2807
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 140
    Key  : Analysis.Init.Elapsed.mSec
    Value: 14991
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 142
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x133
    Key  : Dump.Attributes.AsUlong
    Value: 1808
    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1
    Key  : Dump.Attributes.ErrorCode
    Value: 0
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.
    Key  : Dump.Attributes.ProgressPercentage
    Value: 0
    Key  : Failure.Bucket
    Value: 0x133_ISR_nt!KeAccumulateTicks
    Key  : Failure.Hash
    Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1497cf94
    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1
    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 1
    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 0
    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0
    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0
    Key  : Hypervisor.Flags.CpuManager
    Value: 1
    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 0
    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1
    Key  : Hypervisor.Flags.Epf
    Value: 0
    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1
    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1
    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0
    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0
    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0
    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1
    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1
    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0
    Key  : Hypervisor.Flags.RootScheduler
    Value: 0
    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1
    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0
    Key  : Hypervisor.Flags.Value
    Value: 4853999
    Key  : Hypervisor.Flags.ValueHex
    Value: 4a10ef
    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1
    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1
    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1
    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0
    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1
    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0
    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1
    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1
    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.Nested
    Value: 0
    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.Value
    Value: 1015
    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7
BUGCHECK_CODE:  133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80283f1c340
BUGCHECK_P4: 0
FILE_IN_CAB:  052623-10218-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump
DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
STACK_TEXT:
fffff802`7f8e29a8 fffff802`834bb8ff     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`83f1c340 : nt!KeBugCheckEx
fffff802`7f8e29b0 fffff802`834ba744     : 0000024b`656df0f8 00000000`00000000 00000000`00009fb3 00000000`00000000 : nt!KeAccumulateTicks+0x23f
fffff802`7f8e2a10 fffff802`834ba623     : 00000000`0000000c 00000000`00000000 fffff802`7db57180 00000001`7cc22400 : nt!KiUpdateRunTime+0xf4
fffff802`7f8e2bd0 fffff802`834b884e     : 00000000`00000000 fffff802`7db57180 ffffffff`ffffffff 00000000`00000002 : nt!KiUpdateTime+0x13e3
fffff802`7f8e2e90 fffff802`834b805a     : fffff802`83e5ff78 fffff802`83f0dfa0 fffff802`83f0dfa0 00000000`00000000 : nt!KeClockInterruptNotify+0x3de
fffff802`7f8e2f40 fffff802`8354b3be     : 00000001`7cc62457 fffff802`83f0def0 fffff802`7db57180 fffff802`8362d7eb : nt!HalpTimerClockInterrupt+0x10a
fffff802`7f8e2f70 fffff802`8362da4a     : fffff802`7f8d41e0 fffff802`83f0def0 fffff802`7f8d4350 ffffc106`4f4bc080 : nt!KiCallInterruptServiceRoutine+0x19e
fffff802`7f8e2fb0 fffff802`8362e2b7     : fffff802`7db57180 00000000`00000000 ffffad01`c7311180 fffff802`8362e2c4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`7f8d4160 fffff802`834b699c     : ffffffff`ffffffd1 fffff802`834b772e 00000000`00000010 00000000`00000282 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`7f8d42f0 fffff802`834b772a     : fffff802`8320efc4 fffff802`00000001 ffff0ed6`00000003 00000000`00000001 : nt!KeYieldProcessorEx+0x1c
fffff802`7f8d4320 fffff802`8376673e     : ffffad01`c7311180 00000000`bbe26051 00000000`00000008 00000000`00000000 : nt!KiAcquirePrcbLocksForIsolationUnit+0x8a
fffff802`7f8d4350 fffff802`83665892     : ffffad01`c7311180 fffff802`7f8d43f0 fffff802`7f8d44f8 fffff802`7f8d44f8 : nt!KiAcquirePrcbLocksForPreemptionAttempt+0x32
fffff802`7f8d4380 fffff802`8342fae6     : fffff802`7db57180 ffffad01`c7311180 00000000`00000fff fffff802`7db57180 : nt!KiHeteroChooseTargetProcessor+0x274
fffff802`7f8d4430 fffff802`8342717b     : 00000000`00000000 ffffc106`4ffd0158 00000000`00000000 ffffc106`4f4bc1f0 : nt!KiDeferredReadySingleThread+0x7f6
fffff802`7f8d4800 fffff802`834282b3     : ffffc106`00000020 ffffc106`00000001 fffff802`00000000 ffffc106`00000002 : nt!KiProcessThreadWaitList+0x12b
fffff802`7f8d4880 fffff802`834295a6     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00004d4f : nt!KiProcessExpiredTimerList+0x343
fffff802`7f8d49b0 fffff802`836306ee     : 00000000`00000000 fffff802`7db57180 fffff802`83f4c6c0 ffffc106`4c8d9080 : nt!KiRetireDpcList+0xba6
fffff802`7f8d4c40 00000000`00000000     : fffff802`7f8d5000 fffff802`7f8cf000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME:  nt!KeAccumulateTicks+23f
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  23f
FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff91083688553c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80119e34f2b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2124
    Key  : Analysis.Elapsed.mSec
    Value: 4426
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 186
    Key  : Analysis.Init.Elapsed.mSec
    Value: 3019
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 140
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xa
    Key  : Failure.Bucket
    Value: AV_nt!SwapContext
    Key  : Failure.Hash
    Value: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
    Key  : WER.OS.Branch
    Value: ni_release
    Key  : WER.OS.Version
    Value: 10.0.22621.1
BUGCHECK_CODE:  a
BUGCHECK_P1: ffff91083688553c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80119e34f2b
FILE_IN_CAB:  052623-46859-01.dmp
READ_ADDRESS: fffff8011a71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff91083688553c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  msedge.exe
TRAP_FRAME:  ffffbe006c83ea70 -- (.trap 0xffffbe006c83ea70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffc080f8459430 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80119e34f2b rsp=ffffbe006c83ec00 rbp=000f807fbcbbbdff
 r8=0000000000000000  r9=ffffbe006c83e901 r10=0000000000000000
r11=0000000000000098 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!SwapContext+0xcb:
fffff801`19e34f2b 488b9750020000  mov     rdx,qword ptr [rdi+250h] ds:00000000`00000250=????????????????
Resetting default scope
STACK_TEXT:
ffffbe00`6c83e928 fffff801`19e40fa9     : 00000000`0000000a ffff9108`3688553c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbe00`6c83e930 fffff801`19e3c634     : fffff801`19e27810 fffff801`19d5014a 0000006c`c1771c57 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbe00`6c83ea70 fffff801`19e34f2b     : ffffc080`f8451180 00000000`00000000 ffff800f`eb7f9080 fffff801`19e306aa : nt!KiPageFault+0x474
ffffbe00`6c83ec00 fffff801`19e307c6     : 00000000`00000000 ffff800f`d84c2040 ffff800f`eb7f9080 ffff800f`eb6f1080 : nt!SwapContext+0xcb
ffffbe00`6c83ec40 00000000`00000000     : ffffbe00`6c83f000 ffffbe00`6c839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x176
SYMBOL_NAME:  nt!SwapContext+cb
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  cb
FAILURE_BUCKET_ID:  AV_nt!SwapContext
OS_VERSION:  10.0.22621.1
BUILDLAB_STR:  ni_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Followup:     MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff91083688553c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80119e34f2b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1952
    Key  : Analysis.Elapsed.mSec
    Value: 1972
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 3718
    Key  : Analysis.Init.Elapsed.mSec
    Value: 8881
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 140
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xa
    Key  : Failure.Bucket
    Value: AV_nt!SwapContext
    Key  : Failure.Hash
    Value: {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
    Key  : WER.OS.Branch
    Value: ni_release
    Key  : WER.OS.Version
    Value: 10.0.22621.1
BUGCHECK_CODE:  a
BUGCHECK_P1: ffff91083688553c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80119e34f2b
FILE_IN_CAB:  052623-46859-01.dmp
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffff91083688553c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  msedge.exe
TRAP_FRAME:  ffffbe006c83ea70 -- (.trap 0xffffbe006c83ea70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffc080f8459430 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80119e34f2b rsp=ffffbe006c83ec00 rbp=000f807fbcbbbdff
 r8=0000000000000000  r9=ffffbe006c83e901 r10=0000000000000000
r11=0000000000000098 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!SwapContext+0xcb:
fffff801`19e34f2b 488b9750020000  mov     rdx,qword ptr [rdi+250h] ds:00000000`00000250=????????????????
Resetting default scope
STACK_TEXT:
ffffbe00`6c83e928 fffff801`19e40fa9     : 00000000`0000000a ffff9108`3688553c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbe00`6c83e930 fffff801`19e3c634     : fffff801`19e27810 fffff801`19d5014a 0000006c`c1771c57 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffbe00`6c83ea70 fffff801`19e34f2b     : ffffc080`f8451180 00000000`00000000 ffff800f`eb7f9080 fffff801`19e306aa : nt!KiPageFault+0x474
ffffbe00`6c83ec00 fffff801`19e307c6     : 00000000`00000000 ffff800f`d84c2040 ffff800f`eb7f9080 ffff800f`eb6f1080 : nt!SwapContext+0xcb
ffffbe00`6c83ec40 00000000`00000000     : ffffbe00`6c83f000 ffffbe00`6c839000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x176
SYMBOL_NAME:  nt!SwapContext+cb
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  cb
FAILURE_BUCKET_ID:  AV_nt!SwapContext
OS_VERSION:  10.0.22621.1
BUILDLAB_STR:  ni_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {47b746a3-60bf-1f5a-5fa5-88903b6a3204}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000017, Unexpected system command failure.
Arg2: ffffffffc000000d
Arg3: ffffcb867acdf000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1749
    Key  : Analysis.Elapsed.mSec
    Value: 4529
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 186
    Key  : Analysis.Init.Elapsed.mSec
    Value: 182551
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 153
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x10e
    Key  : Failure.Bucket
    Value: 0x10e_17_dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue
    Key  : Failure.Hash
    Value: {8b70aac8-c9b8-15d4-254c-a3e0828fa53b}
    Key  : WER.OS.Branch
    Value: ni_release
    Key  : WER.OS.Version
    Value: 10.0.22621.1
BUGCHECK_CODE:  10e
BUGCHECK_P1: 17
BUGCHECK_P2: ffffffffc000000d
BUGCHECK_P3: ffffcb867acdf000
BUGCHECK_P4: 0
FILE_IN_CAB:  052223-34296-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
STACK_TEXT:
ffffe585`22d17758 fffff807`68885685     : 00000000`0000010e 00000000`00000017 ffffffff`c000000d ffffcb86`7acdf000 : nt!KeBugCheckEx
ffffe585`22d17760 fffff807`86f1dade     : ffff838c`db0d8100 ffffcb86`77788fe0 ffffcb86`77788fe8 ffffcb86`77788ff0 : watchdog!WdLogSingleEntry5+0x3b45
ffffe585`22d17810 fffff807`86f1dfbd     : ffff838c`d9ee9b00 00000000`00000000 ffff838c`d9ee9b38 ffffcb86`7ace8c68 : dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue+0x12a
ffffe585`22d17860 fffff807`86f1d96a     : ffffcb86`7ace8c68 ffffcb86`8cc86600 ffff838c`db0d80a0 ffffcb86`7ace8c68 : dxgmms2!VIDMM_WORKER_THREAD::ProcessEvictQueues+0xc9
ffffe585`22d17890 fffff807`86f1dd59     : ffffe585`22d17900 00000000`00000000 ffffcb86`8cc86650 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::FlushDeferredEvictions+0x10a
ffffe585`22d17900 fffff807`86f0d1f9     : 00000000`00000000 ffffe585`22d17a70 ffffcb86`77068680 ffffcb86`8a143a10 : dxgmms2!VIDMM_WORKER_THREAD::HandleRecoverablePageInFailure+0x29
ffffe585`22d17970 fffff807`86ee2839     : ffff838c`db0d80a0 00000000`00050201 ffffe585`22d17b01 00000000`00000001 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x2a9a9
ffffe585`22d17bc0 fffff807`59e0dc67     : ffffcb86`7ac19100 fffff807`86ee2830 ffff838c`db0d80a0 000f807f`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffe585`22d17bf0 fffff807`5a030854     : ffffa581`191b4180 ffffcb86`7ac19100 fffff807`59e0dc10 0001686c`fffffff0 : nt!PspSystemThreadStartup+0x57
ffffe585`22d17c40 00000000`00000000     : ffffe585`22d18000 ffffe585`22d12000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME:  dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue+12a
MODULE_NAME: dxgmms2
IMAGE_NAME:  dxgmms2.sys
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  12a
FAILURE_BUCKET_ID:  0x10e_17_dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue
OS_VERSION:  10.0.22621.1
BUILDLAB_STR:  ni_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {8b70aac8-c9b8-15d4-254c-a3e0828fa53b}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000017, Unexpected system command failure.
Arg2: ffffffffc000000d
Arg3: ffffbb8cddc36000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1515
    Key  : Analysis.Elapsed.mSec
    Value: 1573
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 156
    Key  : Analysis.Init.Elapsed.mSec
    Value: 189242
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 152
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x10e
    Key  : Failure.Bucket
    Value: 0x10e_17_dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue
    Key  : Failure.Hash
    Value: {8b70aac8-c9b8-15d4-254c-a3e0828fa53b}
    Key  : WER.OS.Branch
    Value: ni_release
    Key  : WER.OS.Version
    Value: 10.0.22621.1
BUGCHECK_CODE:  10e
BUGCHECK_P1: 17
BUGCHECK_P2: ffffffffc000000d
BUGCHECK_P3: ffffbb8cddc36000
BUGCHECK_P4: 0
FILE_IN_CAB:  052223-23093-01.dmp
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
STACK_TEXT:
ffffb884`99405758 fffff800`83095685     : 00000000`0000010e 00000000`00000017 ffffffff`c000000d ffffbb8c`ddc36000 : nt!KeBugCheckEx
ffffb884`99405760 fffff800`954edade     : ffffa80d`5172c000 ffffbb8c`db1f5720 ffffbb8c`db1f5728 ffffbb8c`db1f5730 : watchdog!WdLogSingleEntry5+0x3b45
ffffb884`99405810 fffff800`954edfbd     : ffffa80d`51317100 00000000`00000000 ffffa80d`513171f8 ffffbb8c`ddc3fc68 : dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue+0x12a
ffffb884`99405860 fffff800`954ed96a     : ffffbb8c`ddc3fc68 ffffbb8c`e5e02200 ffffa80d`5172c050 ffffbb8c`ddc3fc68 : dxgmms2!VIDMM_WORKER_THREAD::ProcessEvictQueues+0xc9
ffffb884`99405890 fffff800`954edd59     : ffffb884`99405900 00000000`00000000 ffffbb8c`e5e022e0 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::FlushDeferredEvictions+0x10a
ffffb884`99405900 fffff800`954dd1f9     : 00000000`00000000 ffffb884`99405a70 ffffbb8c`db218100 ffffbb8c`e6c27610 : dxgmms2!VIDMM_WORKER_THREAD::HandleRecoverablePageInFailure+0x29
ffffb884`99405970 fffff800`954b2839     : ffffa80d`5172c050 00000000`00050201 ffffb884`99405b01 00000000`00000001 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x2a9a9
ffffb884`99405bc0 fffff800`7540dc67     : ffffbb8c`db998280 fffff800`954b2830 ffffa80d`5172c050 000f807f`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffb884`99405bf0 fffff800`75630854     : ffffdc80`a1311180 ffffbb8c`db998280 fffff800`7540dc10 00041222`000000d8 : nt!PspSystemThreadStartup+0x57
ffffb884`99405c40 00000000`00000000     : ffffb884`99406000 ffffb884`99400000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME:  dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue+12a
MODULE_NAME: dxgmms2
IMAGE_NAME:  dxgmms2.sys
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  12a
FAILURE_BUCKET_ID:  0x10e_17_dxgmms2!VIDMM_WORKER_THREAD::FlushEvictQueue
OS_VERSION:  10.0.22621.1
BUILDLAB_STR:  ni_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {8b70aac8-c9b8-15d4-254c-a3e0828fa53b}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
DRIVER_OVERRAN_STACK_BUFFER (f7)
A driver has overrun a stack-based buffer.  This overrun could potentially
allow a malicious user to gain control of this machine.
DESCRIPTION
A driver overran a stack-based buffer (or local variable) in a way that would
have overwritten the function's return address and jumped back to an arbitrary
address when the function returned.  This is the classic "buffer overrun"
hacking attack and the system has been brought down to prevent a malicious user
from gaining complete control of it.
Do a kb to get a stack backtrace -- the last routine on the stack before the
buffer overrun handlers and BugCheck call is the one that overran its local
variable(s).
Arguments:
Arg1: 0000000000000000, Actual security check cookie from the stack
Arg2: 0000eed3895a8f6c, Expected security check cookie
Arg3: ffff112c76a57093, Complement of the expected security check cookie
Arg4: 0000000000000000, zero
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1843
    Key  : Analysis.Elapsed.mSec
    Value: 5928
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 202
    Key  : Analysis.Init.Elapsed.mSec
    Value: 198762
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 143
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xf7
    Key  : Failure.Bucket
    Value: 0xF7_MISSING_GSFRAME_nt!_report_gsfailure
    Key  : Failure.Hash
    Value: {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}
    Key  : WER.OS.Branch
    Value: ni_release
    Key  : WER.OS.Version
    Value: 10.0.22621.1
BUGCHECK_CODE:  f7
BUGCHECK_P1: 0
BUGCHECK_P2: eed3895a8f6c
BUGCHECK_P3: ffff112c76a57093
BUGCHECK_P4: 0
FILE_IN_CAB:  052123-16984-01.dmp
SECURITY_COOKIE:  Expected 0000eed3895a8f6c found 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  Adobe Premiere Pro.exe
STACK_TEXT:
ffffb38a`43068658 fffff807`0b6f2405     : 00000000`000000f7 00000000`00000000 0000eed3`895a8f6c ffff112c`76a57093 : nt!KeBugCheckEx
ffffb38a`43068660 fffff807`0b43b358     : 00000000`00000000 00000000`00000000 00000000`00000053 00000031`714e50b3 : nt!_report_gsfailure+0x25
ffffb38a`430686a0 fffff807`0b8a0c2c     : ffff8003`c26aa180 ffff8003`ba074260 00000000`00000000 ffffb38a`43068b01 : nt!KeWaitForSingleObject+0x318
ffffb38a`43068a40 fffff807`0b8a0b4b     : ffff8003`b95e3080 00000000`9c3cfc78 00000000`00000000 fffff807`0b640549 : nt!ObWaitForSingleObject+0xcc
ffffb38a`43068aa0 fffff807`0b6406e8     : 00000000`31bc9120 00000000`00000000 ffffb38a`43068af8 ffffffff`ffffd8f0 : nt!NtWaitForSingleObject+0x6b
ffffb38a`43068ae0 00007fff`53e8ecd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`9c3cfc48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`53e8ecd4
SYMBOL_NAME:  nt!_report_gsfailure+25
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  25
FAILURE_BUCKET_ID:  0xF7_MISSING_GSFRAME_nt!_report_gsfailure
OS_VERSION:  10.0.22621.1
BUILDLAB_STR:  ni_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {82d2c1b5-b0cb-60a5-9a5d-78c8c4284f84}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff898e3880045c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8067dd0b980, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1530
    Key  : Analysis.Elapsed.mSec
    Value: 3859
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 171
    Key  : Analysis.Init.Elapsed.mSec
    Value: 205511
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xa
    Key  : Failure.Bucket
    Value: AV_Npfs!NpWriteDataQueue
    Key  : Failure.Hash
    Value: {460f143d-7892-e61d-c145-2a74b8eb0d99}
    Key  : WER.OS.Branch
    Value: ni_release
    Key  : WER.OS.Version
    Value: 10.0.22621.1
BUGCHECK_CODE:  a
BUGCHECK_P1: ffff898e3880045c
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8067dd0b980
FILE_IN_CAB:  052123-15390-01.dmp
READ_ADDRESS: fffff8067e71c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff898e3880045c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  GoogleDriveFS.exe
TRAP_FRAME:  fffff406abcc3100 -- (.trap 0xfffff406abcc3100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff898e38800440 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff898e3d200d80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067dd0b980 rsp=fffff406abcc3290 rbp=0000000000000001
 r8=ffff898e290101a0  r9=0000000000001000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!RtlpHpSegPageRangeAllocate+0x170:
fffff806`7dd0b980 3b5e1c          cmp     ebx,dword ptr [rsi+1Ch] ds:00000000`0000001c=????????
Resetting default scope
STACK_TEXT:
fffff406`abcc2fb8 fffff806`7de40fa9     : 00000000`0000000a ffff898e`3880045c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff406`abcc2fc0 fffff806`7de3c634     : 00000000`00000000 fffff806`7df66eec ffffde00`6ffcf180 ffff898e`346f7080 : nt!KiBugCheckDispatch+0x69
fffff406`abcc3100 fffff806`7dd0b980     : fffff806`7df0dda0 fffff806`7dd4dcee 00000000`00000000 00000400`00000000 : nt!KiPageFault+0x474
fffff406`abcc3290 fffff806`7dd0b6ba     : fffff406`00000000 00000000`00000001 ffffde00`00000000 00000000`00000002 : nt!RtlpHpSegPageRangeAllocate+0x170
fffff406`abcc32f0 fffff806`7dc42b13     : 00000000`00000002 00000000`00001000 00000000`00000000 00000000`00000000 : nt!RtlpHpSegAlloc+0x5a
fffff406`abcc3350 fffff806`7dc4231f     : 00000000`00000000 00000000`00000000 00000000`5246704e 00000000`00000000 : nt!ExAllocateHeapPool+0x7c3
fffff406`abcc3460 fffff806`7e49e68d     : 00000000`00000040 00000000`00000001 00000000`00000600 00000000`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
fffff406`abcc34b0 fffff806`9231be09     : ffffbf02`3043f878 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExAllocatePool2+0xdd
fffff406`abcc3560 fffff806`9231bb70     : 00000000`00000000 00000000`00000000 00000418`003d7000 ffffbf02`00002700 : Npfs!NpWriteDataQueue+0x119
fffff406`abcc35d0 fffff806`9231b9ad     : 00000000`00002700 00000418`003d7000 ffff898e`3360db60 ffff898e`34ab6080 : Npfs!NpCommonWrite+0x140
fffff406`abcc3660 fffff806`7dc3c275     : ffff898e`2e0a9670 ffff898e`3514f9e0 00000418`003d7000 ffff898e`3360db60 : Npfs!NpFsdWrite+0x6d
fffff406`abcc36d0 fffff806`82d27bd6     : ffff898e`346f7080 00000000`00000006 00000000`00000004 ffff898e`00000000 : nt!IofCallDriver+0x55
fffff406`abcc3710 fffff806`7dc3c275     : ffff898e`3360db60 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xd6
fffff406`abcc3770 fffff806`7e0a4a90     : ffff898e`3360db60 00000000`00000001 fffff406`abcc3811 00000000`00000000 : nt!IofCallDriver+0x55
fffff406`abcc37b0 fffff806`7e19d6c8     : ffff898e`3360db60 fffff406`abcc3990 fffff406`abcc38d0 00000000`00000000 : nt!IopSynchronousServiceTail+0x1d0
fffff406`abcc3860 fffff806`7e19d2e3     : ffff898e`3514f9e0 00000000`001a019f ffff898e`3360db60 00000000`00000000 : nt!IopWriteFile+0x288
fffff406`abcc3980 fffff806`7de406e8     : 00000000`00000001 00000000`00000000 00000000`00000000 00000418`0027e118 : nt!NtWriteFile+0x263
fffff406`abcc3a70 00007ff9`6fbaed54     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000025`becfdcf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6fbaed54
SYMBOL_NAME:  Npfs!NpWriteDataQueue+119
MODULE_NAME: Npfs
IMAGE_NAME:  Npfs.SYS
IMAGE_VERSION:  10.0.22621.1690
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  119
FAILURE_BUCKET_ID:  AV_Npfs!NpWriteDataQueue
OS_VERSION:  10.0.22621.1
BUILDLAB_STR:  ni_release
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {460f143d-7892-e61d-c145-2a74b8eb0d99}
Followup:     MachineOwner
---------
	HYPERVISOR_ERROR (20001) gelmiş. Hyper-V kaynaklı, yani Windows'un sanallaştırma sistemi.SFC /scannow yazın, onu da aradan bir çıkarın. Herhangi bir bozuk dosya bulursa paylaşırsınız.MEMORY_MANAGEMENT (1a) ve dxgkrnl.sys var. Yani RAM hatası gibi görünüyor. RAM'lerin bozuk veya uyumsuz olma ihtimalini hesaba katmamıştık başta ancak belki de öyle, veya XMP ile alakalı bir durum var.*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
HYPERVISOR_ERROR (20001)
The hypervisor has encountered a fatal error.
Arguments:
Arg1: 0000000000000011
Arg2: 000000000123e33f
Arg3: 0000000000001005
Arg4: ffffe70001205cc0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1718
    Key  : Analysis.Elapsed.mSec
    Value: 1949
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 202
    Key  : Analysis.Init.Elapsed.mSec
    Value: 9825
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 153
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x20001
    Key  : Dump.Attributes.AsUlong
    Value: 808
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Failure.Bucket
    Value: 0x20001_11_123e33f_nt!HvlSkCrashdumpCallbackRoutine
    Key  : Failure.Hash
    Value: {428fc90e-8dbb-379a-f152-d9b5bc9a248f}
    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1497cf94
    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1
    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 1
    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 0
    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0
    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0
    Key  : Hypervisor.Flags.CpuManager
    Value: 1
    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 0
    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1
    Key  : Hypervisor.Flags.Epf
    Value: 0
    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1
    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1
    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0
    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0
    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0
    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1
    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1
    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0
    Key  : Hypervisor.Flags.RootScheduler
    Value: 0
    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1
    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0
    Key  : Hypervisor.Flags.Value
    Value: 4853999
    Key  : Hypervisor.Flags.ValueHex
    Value: 4a10ef
    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1
    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1
    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1
    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0
    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1
    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0
    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1
    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1
    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.Nested
    Value: 0
    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.Value
    Value: 1015
    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7
BUGCHECK_CODE:  20001
BUGCHECK_P1: 11
BUGCHECK_P2: 123e33f
BUGCHECK_P3: 1005
BUGCHECK_P4: ffffe70001205cc0
FILE_IN_CAB:  052823-12187-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  Red Giant Serv
STACK_TEXT:
ffff9980`d520dca8 fffff802`83538ad1     : 00000000`00020001 00000000`00000011 00000000`0123e33f 00000000`00001005 : nt!KeBugCheckEx
ffff9980`d520dcb0 fffff802`83476a76     : 00000000`00000100 fffff802`8320770c ffff9980`d507e340 ffff9980`d520dd30 : nt!HvlSkCrashdumpCallbackRoutine+0x81
ffff9980`d520dcf0 fffff802`83439542     : 00000000`00000100 ffff9980`d520def0 00000000`00000000 00000000`00000000 : nt!KiProcessNMI+0x26fa96
ffff9980`d520dd30 fffff802`834392ae     : 00000000`00000100 ffff9980`d520def0 00000000`00000000 00000000`00000000 : nt!KxNmiInterrupt+0x82
ffff9980`d520de70 fffff802`8344031d     : ffffd58f`9eb21080 00000222`78de0000 00000000`02000000 ffffd58f`00000000 : nt!KiNmiInterrupt+0x26e
fffffa84`55a7dae0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0x11d
SYMBOL_NAME:  nt!HvlSkCrashdumpCallbackRoutine+81
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  81
FAILURE_BUCKET_ID:  0x20001_11_123e33f_nt!HvlSkCrashdumpCallbackRoutine
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {428fc90e-8dbb-379a-f152-d9b5bc9a248f}
Followup:     MachineOwner
---------
	*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003453, The subtype of the BugCheck.
Arg2: ffffe585341540c0
Arg3: 000000000017a1ab
Arg4: 0000000000000003
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1953
    Key  : Analysis.Elapsed.mSec
    Value: 2097
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 265
    Key  : Analysis.Init.Elapsed.mSec
    Value: 11984
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 161
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a
    Key  : Dump.Attributes.AsUlong
    Value: 808
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Failure.Bucket
    Value: 0x1a_3453_dxgkrnl!DXGPROCESSSHAREDACCESS::_DXGPROCESSSHAREDACCESS
    Key  : Failure.Hash
    Value: {f5ddb4d1-5b85-fa85-87aa-32d2c031cdb1}
    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1497cf94
    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1
    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 1
    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 0
    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0
    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0
    Key  : Hypervisor.Flags.CpuManager
    Value: 1
    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 0
    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1
    Key  : Hypervisor.Flags.Epf
    Value: 0
    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1
    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1
    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0
    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0
    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0
    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1
    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1
    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0
    Key  : Hypervisor.Flags.RootScheduler
    Value: 0
    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1
    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0
    Key  : Hypervisor.Flags.Value
    Value: 4853999
    Key  : Hypervisor.Flags.ValueHex
    Value: 4a10ef
    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1
    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1
    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1
    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0
    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1
    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0
    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1
    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1
    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.Nested
    Value: 0
    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.Value
    Value: 1015
    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7
BUGCHECK_CODE:  1a
BUGCHECK_P1: 3453
BUGCHECK_P2: ffffe585341540c0
BUGCHECK_P3: 17a1ab
BUGCHECK_P4: 3
FILE_IN_CAB:  052723-11203-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  opera.exe
STACK_TEXT:
ffff8505`d6b87358 fffff801`10689b96     : 00000000`0000001a 00000000`00003453 ffffe585`341540c0 00000000`0017a1ab : nt!KeBugCheckEx
ffff8505`d6b87360 fffff801`1090b10c     : ffffe585`341540c0 ffffe585`34154800 ffffe585`34154508 ffffe585`34154740 : nt!MiDeleteFinalPageTables+0x2160fa
ffff8505`d6b87430 fffff801`1090baef     : ffffe585`341540c0 00000000`ffffffff ffffe585`34154508 ffffe585`33e96040 : nt!MmDeleteProcessAddressSpace+0x64
ffff8505`d6b87480 fffff801`108a73ae     : ffffe585`341540c0 ffffe585`34154090 00000000`00000000 00000000`00000003 : nt!PspProcessDelete+0x15f
ffff8505`d6b87520 fffff801`1043ddff     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe585`341540c0 : nt!ObpRemoveObjectRoutine+0x7e
ffff8505`d6b87580 fffff801`296bbed1     : ffffe585`37bc1608 ffffb485`742eca50 00000000`00000003 00000000`00000040 : nt!ObfDereferenceObject+0x8f
ffff8505`d6b875c0 fffff801`296bbe85     : ffff8505`4b677844 ffffb485`71328a60 ffffe585`00000003 00000000`00000080 : dxgkrnl!DXGPROCESSSHAREDACCESS::~DXGPROCESSSHAREDACCESS+0x19
ffff8505`d6b875f0 fffff801`296bc22d     : ffffb485`71328a60 00000000`00000000 ffffe585`33e96040 00000000`00000000 : dxgkrnl!DXGSHAREDRESOURCEACCESS::~DXGSHAREDRESOURCEACCESS+0x45
ffff8505`d6b87620 fffff801`2953afd4     : ffffe585`2eb94790 00000000`00000001 ffff8505`d6b87860 00000000`00000000 : dxgkrnl!DXGSHAREDRESOURCE::~DXGSHAREDRESOURCE+0x49
ffff8505`d6b87680 fffff801`296b512a     : ffffb485`71328a60 ffff8505`d6b87890 ffffb485`71328a60 ffff8505`d6b87860 : dxgkrnl!DXGSHAREDRESOURCE::`vector deleting destructor'+0x14
ffff8505`d6b876b0 fffff801`296d725c     : ffffb485`62c87dd8 ffffb485`62c87dd8 00000000`00000000 fffff801`42117261 : dxgkrnl!DXGSHAREDRESOURCE::Destroy+0x26
ffff8505`d6b876e0 fffff801`296d6b12     : ffffe585`2eb94d00 ffffe585`2eb94790 ffffe585`2eb94790 ffffe585`2eb94d00 : dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x65c
ffff8505`d6b87960 fffff801`104162c5     : ffffe585`22ebb830 ffffe585`33e96040 ffffe585`22ebb830 fffff801`00000000 : dxgkrnl!DxgkpDeferredDestructionWork+0x192
ffff8505`d6b87a00 fffff801`1040dc67     : ffffe585`33e96040 00000000`000001ee ffffe585`33e96040 fffff801`10416170 : nt!ExpWorkerThread+0x155
ffff8505`d6b87bf0 fffff801`10630854     : ffff9f00`92617180 ffffe585`33e96040 fffff801`1040dc10 00000000`ffffffff : nt!PspSystemThreadStartup+0x57
ffff8505`d6b87c40 00000000`00000000     : ffff8505`d6b88000 ffff8505`d6b82000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME:  dxgkrnl!DXGPROCESSSHAREDACCESS::~DXGPROCESSSHAREDACCESS+19
MODULE_NAME: dxgkrnl
IMAGE_NAME:  dxgkrnl.sys
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  19
FAILURE_BUCKET_ID:  0x1a_3453_dxgkrnl!DXGPROCESSSHAREDACCESS::_DXGPROCESSSHAREDACCESS
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {f5ddb4d1-5b85-fa85-87aa-32d2c031cdb1}
Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
HYPERVISOR_ERROR (20001)
The hypervisor has encountered a fatal error.
Arguments:
Arg1: 0000000000000011
Arg2: ffffef92704a8000
Arg3: 0000000000001005
Arg4: ffffe70000205c60
Debugging Details:
------------------
KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 1890
    Key  : Analysis.Elapsed.mSec
    Value: 2800
    Key  : Analysis.IO.Other.Mb
    Value: 0
    Key  : Analysis.IO.Read.Mb
    Value: 0
    Key  : Analysis.IO.Write.Mb
    Value: 0
    Key  : Analysis.Init.CPU.mSec
    Value: 187
    Key  : Analysis.Init.Elapsed.mSec
    Value: 9438
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145
    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x20001
    Key  : Dump.Attributes.AsUlong
    Value: 808
    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1
    Key  : Failure.Bucket
    Value: 0x20001_11_ffffef92704a8000_nt!HvlSkCrashdumpCallbackRoutine
    Key  : Failure.Hash
    Value: {afb20e96-ab19-a8f4-fcc8-8223c08c922b}
    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 1497cf94
    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1
    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 1
    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 0
    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0
    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0
    Key  : Hypervisor.Flags.CpuManager
    Value: 1
    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 0
    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1
    Key  : Hypervisor.Flags.Epf
    Value: 0
    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1
    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1
    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0
    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0
    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0
    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1
    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1
    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0
    Key  : Hypervisor.Flags.RootScheduler
    Value: 0
    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1
    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0
    Key  : Hypervisor.Flags.Value
    Value: 4853999
    Key  : Hypervisor.Flags.ValueHex
    Value: 4a10ef
    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1
    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1
    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1
    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0
    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1
    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0
    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1
    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1
    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1
    Key  : Hypervisor.RootFlags.Nested
    Value: 0
    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1
    Key  : Hypervisor.RootFlags.Value
    Value: 1015
    Key  : Hypervisor.RootFlags.ValueHex
    Value: 3f7
BUGCHECK_CODE:  20001
BUGCHECK_P1: 11
BUGCHECK_P2: ffffef92704a8000
BUGCHECK_P3: 1005
BUGCHECK_P4: ffffe70000205c60
FILE_IN_CAB:  052723-11546-01.dmp
TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x808
  Kernel Generated Triage Dump
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
STACK_TEXT:
ffff8201`35e0dca8 fffff801`3a338ad1     : 00000000`00020001 00000000`00000011 ffffef92`704a8000 00000000`00001005 : nt!KeBugCheckEx
ffff8201`35e0dcb0 fffff801`3a276a76     : 00000000`00000100 fffff801`3a00770c ffff8201`35e16340 ffff8201`35e0dd30 : nt!HvlSkCrashdumpCallbackRoutine+0x81
ffff8201`35e0dcf0 fffff801`3a239542     : 00000000`00000100 ffff8201`35e0def0 00000000`00000000 00000000`00000000 : nt!KiProcessNMI+0x26fa96
ffff8201`35e0dd30 fffff801`3a2392ae     : 00000000`00000100 ffff8201`35e0def0 00000000`00000000 00000000`00000000 : nt!KxNmiInterrupt+0x82
ffff8201`35e0de70 fffff801`3a192fe7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000008`40f40bbc : nt!KiNmiInterrupt+0x26e
ffffe605`2b6fafd0 fffff801`3a14cf47     : 00000000`00027100 00000000`00027100 00000000`00b51e00 fffff801`3a19301b : nt!HalpHvTimerArm+0x77
ffffe605`2b6fb000 fffff801`3a0bc7ea     : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00027100 : nt!HalpTimerClockArm+0x127
ffffe605`2b6fb050 fffff801`3a018d97     : ffff8201`35dd1180 ffffffff`ffffffff ffffe605`2b6fb338 00000000`00000000 : nt!KiSetNextClockTickDueTime+0x6fa
ffffe605`2b6fb290 fffff801`3a0c0ed9     : 00000008`40f59401 ffffe605`2b6fb3d0 00000008`40f5927d 00000008`4110027c : nt!KiRestoreClockTickRate+0x77
ffffe605`2b6fb2d0 fffff801`3a0bf3c9     : 00000000`000000e4 00000000`00000005 00000000`00000000 00000000`00000000 : nt!KeResumeClockTimerFromIdle+0x11a9
ffffe605`2b6fb590 fffff801`3a0bda1b     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`3a227a10 : nt!PpmIdleExecuteTransition+0x1949
ffffe605`2b6fba50 fffff801`3a2306a4     : 00000000`00000000 ffffd201`9db86040 ffffd201`ac77d080 ffffd201`b12e1080 : nt!PoIdle+0x67b
ffffe605`2b6fbc40 00000000`00000000     : ffffe605`2b6fc000 ffffe605`2b6f6000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME:  nt!HvlSkCrashdumpCallbackRoutine+81
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.22621.1702
STACK_COMMAND:  .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:  81
FAILURE_BUCKET_ID:  0x20001_11_ffffef92704a8000_nt!HvlSkCrashdumpCallbackRoutine
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {afb20e96-ab19-a8f4-fcc8-8223c08c922b}
Followup:     MachineOwner
---------