Selamlar, öncelikle BIOS güncellemesi yapmanızı önereceğim. BIOS güncellemenizi dilerseniz F32 > F40 ve son sürüm diye ilerletebilirsiniz. Kendinize güvenmiyorsanız bu güncellemeyi bir bilgisayarcıya ya da teknik servise yaptırabilirsiniz. Yapmadan önce de anakartınızın rev. X. X olduğunu kontrol edin. Dumplara göre anakartınız 2.0 ya da 3.0 sürüm değil ama siz tedbiri elden bırakmayın.
Ek olarak Easy Anti-Cheat'i de kaldırıp kurarsanız sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000020000e, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807142fb560, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7374.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 14033.
Key : Analysis.Init.CPU.mSec
Value: 968.
Key : Analysis.Init.Elapsed.mSec
Value: 3007.
Key : Analysis.Memory.CommitPeak.Mb
Value: 78.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021322-7953-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 20000e.
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff807142fb560.
READ_ADDRESS: fffff80714cfb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
000000000020000e.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffff900c8ca2f590 -- (.trap 0xffff900c8ca2f590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=03d06b30ffffae88 rbx=0000000000000000 rcx=0000000000200006
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807142fb560 rsp=ffff900c8ca2f720 rbp=0000000000000000
r8=ffffae87fbf6b6c8 r9=ffff900c8ca2f9a0 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
nt!KiActivateWaiterQueueWithNoLocks+0x84:
fffff807`142fb560 4c397108 cmp qword ptr [rcx+8],r14 ds:00000000`0020000e=????????????????
Resetting default scope.
STACK_TEXT:
ffff900c`8ca2f448 fffff807`14409369 : 00000000`0000000a 00000000`0020000e 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff900c`8ca2f450 fffff807`14405669 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff900c`8ca2f590 fffff807`142fb560 : ffffae88`03d06b00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff900c`8ca2f720 fffff807`142fcd59 : 00000000`00000000 ffffae88`03d08540 ffffae87`fbf6b4c0 ffffae87`fbf6b6c8 : nt!KiActivateWaiterQueueWithNoLocks+0x84
ffff900c`8ca2f750 fffff807`1420f974 : ffffae87`fbf6b4c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchQueue+0x79
ffff900c`8ca2f780 fffff807`1420f098 : ffffae88`03d08540 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KeRemoveQueueEx+0x574
ffff900c`8ca2f820 fffff807`145f7e3e : 00000000`00000000 00000000`00000000 ffff1bc7`e5ac30d1 ffff900c`8ca2f480 : nt!IoRemoveIoCompletion+0x98
ffff900c`8ca2f950 fffff807`14408db8 : 00000000`0e24f5e0 00000000`00000200 00000000`00000040 00000000`00000000 : nt!NtRemoveIoCompletionEx+0xfe
ffff900c`8ca2fa90 00007ffe`c826fb64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0087e4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c826fb64
SYMBOL_NAME: nt!KiActivateWaiterQueueWithNoLocks+84
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1526
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 84.
FAILURE_BUCKET_ID: AV_nt!KiActivateWaiterQueueWithNoLocks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {541c3e90-ca94-455b-29eb-77a09339d2a4}
Followup: MachineOwner.
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000fffff834, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046f287ebc, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5999.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 12326.
Key : Analysis.Init.CPU.mSec
Value: 889.
Key : Analysis.Init.Elapsed.mSec
Value: 2898.
Key : Analysis.Memory.CommitPeak.Mb
Value: 74.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021522-5968-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: fffff834.
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8046f287ebc.
WRITE_ADDRESS: fffff8046fcfb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
00000000fffff834.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
TRAP_FRAME: ffffa602069e2630 -- (.trap 0xffffa602069e2630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000157ebd rbx=0000000000000000 rcx=ffffbf0f7fe5b158
rdx=fffff8046a63ceb0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046f287ebc rsp=ffffa602069e27c0 rbp=ffffbf0f834ee080
r8=000000000000000b r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiDeferredReadySingleThread+0xa7c:
fffff804`6f287ebc f04883663000 lock and qword ptr [rsi+30h],0 ds:00000000`00000030=????????????????
Resetting default scope.
STACK_TEXT:
ffffa602`069e24e8 fffff804`6f409369 : 00000000`0000000a 00000000`fffff834 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffa602`069e24f0 fffff804`6f405669 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`6f51abe9 : nt!KiBugCheckDispatch+0x69
ffffa602`069e2630 fffff804`6f287ebc : fffff804`6a635180 ffffbf0f`00000000 ffffbf0f`7fe5b080 ffffa602`069e27fc : nt!KiPageFault+0x469
ffffa602`069e27c0 fffff804`6f287181 : 00000000`00000000 fffff804`6f5f5f71 ffff8480`d4e43180 00000000`00000001 : nt!KiDeferredReadySingleThread+0xa7c
ffffa602`069e29b0 fffff804`6f328070 : 00000000`00000000 00000000`00000000 ffffbf0f`8a2054e0 ffffbf0f`80fef1c0 : nt!KiExitDispatcher+0x141
ffffa602`069e2a20 fffff804`6f6d5fcb : ffffbf0f`00000000 00000000`00000000 ffffa602`069e2b80 ffffbf0f`8a2054e0 : nt!KeReleaseSemaphore+0x110
ffffa602`069e2aa0 fffff804`6f408db8 : ffffbf0f`87f77080 00000000`09aab404 00000000`00000000 00000000`00000001 : nt!NtReleaseSemaphore+0x9b
ffffa602`069e2b00 00000000`77d11cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1638f228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d11cfc.
SYMBOL_NAME: nt!KiDeferredReadySingleThread+a7c
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1526
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: a7c.
FAILURE_BUCKET_ID: AV_nt!KiDeferredReadySingleThread
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {626f59d5-90cc-ab48-85f0-60e170096c96}
Followup: MachineOwner.
---------[/CODE]