STOP Kodlu Mavi Ekran Hataları

Mavi ekran hatalarınızın neredeyse tamamı AMD GPU'nuz kaynaklı. DDU ile AMD GPU sürücünüzü kaldırıp yeniden kurmayı deneyebilirsiniz.

Sorununuz çözülmezse artık GPU'yu değiştirmekten başka çare göremiyorum.

Ek olarak, MemTest86 ile belleklerinizde tarama yapmanız iyi olacaktır.

Malwarebytes kaynaklı hata aldığınızı da görüyorum ancak yazılımlar genellikle kendi içlerinde hata verir. Yine de bir süreliğine kaldırırsanız güzel olur ama sorunun payında Malwarebytes'ın olduğunu zannetmiyorum.

Sorununuz çözülürse GTA 4 oynarken kanser olmamanız dileğiyle. :)

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff8c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8801122c912, address which referenced memory

Debugging Details:
------------------

fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b1300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2640

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7916

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffffffffffff8c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8801122c912

WRITE_ADDRESS: fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b12f0
GetUlongPtrFromAddress: unable to read from fffff800034b14a8
ffffffffffffff8c

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880049be240 -- (.trap 0xfffff880049be240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8008111490
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8801122c912 rsp=fffff880049be3d0 rbp=fffff880049be3d0
r8=fffffa8006c07000  r9=0000000000000002 r10=fffff880115e4db8
r11=fffffa800830da58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
amdkmdag+0x21b912:
fffff880`1122c912 20488b          and     byte ptr [rax-75h],cl ds:ffffffff`ffffff8c=??
Resetting default scope

MISALIGNED_IP:
amdkmdag+21b912
fffff880`1122c912 20488b          and     byte ptr [rax-75h],cl

STACK_TEXT:
fffff880`049be0f8 fffff800`032b5fe9     : 00000000`0000000a ffffffff`ffffff8c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`049be100 fffff800`032b3dce     : 00000000`00000001 ffffffff`ffffff8c 00000000`00000000 fffff880`049be5c0 : nt!KiBugCheckDispatch+0x69
fffff880`049be240 fffff880`1122c912     : fffffa80`06be1020 fffffa80`08131200 fffffa80`08120020 fffff880`112cbabd : nt!KiPageFault+0x44e
fffff880`049be3d0 fffffa80`06be1020     : fffffa80`08131200 fffffa80`08120020 fffff880`112cbabd fffffa80`08120020 : amdkmdag+0x21b912
fffff880`049be3d8 fffffa80`08131200     : fffffa80`08120020 fffff880`112cbabd fffffa80`08120020 fffff880`049be5c0 : 0xfffffa80`06be1020
fffff880`049be3e0 fffffa80`08120020     : fffff880`112cbabd fffffa80`08120020 fffff880`049be5c0 00000000`00000000 : 0xfffffa80`08131200
fffff880`049be3e8 fffff880`112cbabd     : fffffa80`08120020 fffff880`049be5c0 00000000`00000000 fffffa80`06992170 : 0xfffffa80`08120020
fffff880`049be3f0 fffffa80`08120020     : fffff880`049be5c0 00000000`00000000 fffffa80`06992170 00000000`00000246 : amdkmdag+0x2baabd
fffff880`049be3f8 fffff880`049be5c0     : 00000000`00000000 fffffa80`06992170 00000000`00000246 00000000`00000001 : 0xfffffa80`08120020
fffff880`049be400 00000000`00000000     : fffffa80`06992170 00000000`00000246 00000000`00000001 00000000`00000100 : 0xfffff880`049be5c0


SYMBOL_NAME:  amdkmdag+21b912

MODULE_NAME: hardware

IMAGE_NAME:  hardware

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  IP_MISALIGNED_amdkmdag.sys

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {28c2d36a-10ec-7743-516b-554c363072af}

Followup:     MachineOwner
---------


REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: fffffa8008e41300, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: fffffa80089078ff, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This bugcheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------

fffff8000362f0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800036ea300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5378

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  18

BUGCHECK_P1: 0

BUGCHECK_P2: fffffa8008e41300

BUGCHECK_P3: 2

BUGCHECK_P4: fffffa80089078ff

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe.exe

STACK_TEXT:
fffff880`0ac92958 fffff800`03515b81     : 00000000`00000018 00000000`00000000 fffffa80`08e41300 00000000`00000002 : nt!KeBugCheckEx
fffff880`0ac92960 fffff800`0373224f     : fffff880`0ac92b60 fffffa80`08e41300 00000000`0672fa40 fffffa80`09ab93b0 : nt! ?? ::FNODOBFM::`string'+0x22581
fffff880`0ac929c0 fffff800`034eec53     : fffffa80`08e24060 00000000`0672fa18 fffff880`0ac92a88 00000000`0d144340 : nt!NtRemoveIoCompletion+0x14f
fffff880`0ac92a70 00000000`76d98daa     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0672f9f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d98daa


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+22581

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x18_CORRUPT_REF_COUNT_nt!_??_::FNODOBFM::_string_+22581

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {a7f3f9de-8cb7-d588-8038-d198feb835f4}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000deadc007, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880111f1119, address which referenced memory

Debugging Details:
------------------

fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ee300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4076

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: deadc007

BUGCHECK_P2: a

BUGCHECK_P3: 0

BUGCHECK_P4: fffff880111f1119

READ_ADDRESS: fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034ee2f0
GetUlongPtrFromAddress: unable to read from fffff800034ee4a8
00000000deadc007

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  fffff8800877f2f0 -- (.trap 0xfffff8800877f2f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008018000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff880111f1119 rsp=fffff8800877f488 rbp=fffffa8008018000
r8=fffffa8008037b60  r9=0000000000002d40 r10=00000000000000b5
r11=fffffa8008144ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
amdkmdag+0x183119:
fffff880`111f1119 8b8218010000    mov     eax,dword ptr [rdx+118h] ds:00000000`deadc007=????????
Resetting default scope

STACK_TEXT:
fffff880`0877f1a8 fffff800`032f2fe9     : 00000000`0000000a 00000000`deadc007 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff880`0877f1b0 fffff800`032f0dce     : 00000000`00000000 00000000`deadc007 fffff880`0877f300 fffff880`0877f550 : nt!KiBugCheckDispatch+0x69
fffff880`0877f2f0 fffff880`111f1119     : fffff880`111f1546 fffffa80`08018000 00000000`00000000 fffff880`0877f550 : nt!KiPageFault+0x44e
fffff880`0877f488 fffff880`111f1546     : fffffa80`08018000 00000000`00000000 fffff880`0877f550 fffffa80`08102000 : amdkmdag+0x183119
fffff880`0877f490 fffffa80`08018000     : 00000000`00000000 fffff880`0877f550 fffffa80`08102000 fffff880`0877f550 : amdkmdag+0x183546
fffff880`0877f498 00000000`00000000     : fffff880`0877f550 fffffa80`08102000 fffff880`0877f550 fffff880`111f0eee : 0xfffffa80`08018000


SYMBOL_NAME:  amdkmdag+183119

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xD1_amdkmdag+183119

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {f3d38223-f324-e082-e608-a36548787e4b}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88010f695b2, address which referenced memory

Debugging Details:
------------------

fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b7300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1937

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6820

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff88010f695b2

WRITE_ADDRESS: fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b72f0
GetUlongPtrFromAddress: unable to read from fffff800034b74a8
0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880026e52f0 -- (.trap 0xfffff880026e52f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008131200
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88010f695b2 rsp=fffff880026e5480 rbp=fffffa8007dafcf0
r8=fffffa8008490000  r9=0000000000000002 r10=fffff880113d5db8
r11=fffffa800830aa58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
amdkmdag+0x1675b2:
fffff880`10f695b2 0100            add     dword ptr [rax],eax ds:00000000`00000000=????????
Resetting default scope

MISALIGNED_IP:
amdkmdag+1675b2
fffff880`10f695b2 0100            add     dword ptr [rax],eax

STACK_TEXT:
fffff880`026e51a8 fffff800`032bbfe9     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`026e51b0 fffff800`032b9dce     : 00000000`00000001 00000000`00000000 00000000`00000000 fffff880`026e55c0 : nt!KiBugCheckDispatch+0x69
fffff880`026e52f0 fffff880`10f695b2     : fffffa80`0812e200 fffffa80`08120020 fffff880`1126e430 00000000`00000000 : nt!KiPageFault+0x44e
fffff880`026e5480 fffffa80`0812e200     : fffffa80`08120020 fffff880`1126e430 00000000`00000000 fffffa80`0812e200 : amdkmdag+0x1675b2
fffff880`026e5488 fffffa80`08120020     : fffff880`1126e430 00000000`00000000 fffffa80`0812e200 fffff880`10f42749 : 0xfffffa80`0812e200
fffff880`026e5490 fffff880`1126e430     : 00000000`00000000 fffffa80`0812e200 fffff880`10f42749 fffff880`026e55c0 : 0xfffffa80`08120020
fffff880`026e5498 00000000`00000000     : fffffa80`0812e200 fffff880`10f42749 fffff880`026e55c0 fffffa80`0812e200 : amdkmdag+0x46c430


SYMBOL_NAME:  amdkmdag+1675b2

MODULE_NAME: hardware

IMAGE_NAME:  hardware

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  IP_MISALIGNED_amdkmdag.sys

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {28c2d36a-10ec-7743-516b-554c363072af}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880038e7b2e, Address of the instruction which caused the bugcheck
Arg3: fffff8800acaca50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b7300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5791

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 64

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff880038e7b2e

BUGCHECK_P3: fffff8800acaca50

BUGCHECK_P4: 0

CONTEXT:  fffff8800acaca50 -- (.cxr 0xfffff8800acaca50)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8800acad550
rdx=fffff900c021df01 rsi=fffff8800acad7f0 rdi=0000000000000000
rip=fffff880038e7b2e rsp=fffff8800acad420 rbp=fffff8a004556c90
r8=fffff8a0042429f0  r9=0000000000000952 r10=fffffa80069fe530
r11=fffff8a004548000 r12=0000000000000003 r13=0000000000000000
r14=0000000000001080 r15=00000000000000e0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
dxgkrnl!DXGCONTEXT::Present+0x32b2:
fffff880`038e7b2e 898424dc000000  mov     dword ptr [rsp+0DCh],eax ss:0018:fffff880`0acad4fc=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffff880`0acad420 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGCONTEXT::Present+0x32b2


SYMBOL_NAME:  dxgkrnl!DXGCONTEXT::Present+32b2

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  6.1.7601.24546

STACK_COMMAND:  .cxr 0xfffff8800acaca50 ; kb

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!DXGCONTEXT::Present+32b2

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {c0395a61-7eb0-0328-14c6-a35e7848687c}

Followup:     MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff88006bc4a95, The address that the exception occurred at
Arg3: fffff88002fc6678, Exception Record Address
Arg4: fffff88002fc5ee0, Context Record Address

Debugging Details:
------------------

fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ee300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8689

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffff80000003

BUGCHECK_P2: fffff88006bc4a95

BUGCHECK_P3: fffff88002fc6678

BUGCHECK_P4: fffff88002fc5ee0

EXCEPTION_RECORD:  fffff88002fc6678 -- (.exr 0xfffff88002fc6678)
ExceptionAddress: fffff88006bc4a95 (farflt+0x0000000000009a95)
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 1
   Parameter[0]: 0000000000000000

CONTEXT:  fffff88002fc5ee0 -- (.cxr 0xfffff88002fc5ee0)
rax=fffff88006bdfd18 rbx=fffffa8007de1840 rcx=0000000000000003
rdx=fffff80003435180 rsi=fffff88006bdfd28 rdi=fffff88006bdfd18
rip=fffff88006bc4a95 rsp=fffff88002fc68b0 rbp=fffffa8008699970
r8=0000000000011e18  r9=0000000000000030 r10=fffff80003250000
r11=0000000000000727 r12=0000000000000001 r13=fffff88000dcc201
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00000287
farflt+0x9a95:
fffff880`06bc4a95 cc              int     3
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0x80000003 - { ZEL DURUM}  Kesme Noktas   Bir kesme noktas na ula  ld .

EXCEPTION_CODE_STR:  80000003

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_STR:  0x80000003

STACK_TEXT:
fffff880`02fc68b0 00000000`00000001     : 00000000`00000000 fffffa80`6c557241 00000000`0000071b 00000000`00000001 : farflt+0x9a95
fffff880`02fc68b8 00000000`00000000     : fffffa80`6c557241 00000000`0000071b 00000000`00000001 fffff880`06bc5065 : 0x1


SYMBOL_NAME:  farflt+9a95

MODULE_NAME: farflt

IMAGE_NAME:  farflt.sys

STACK_COMMAND:  .cxr 0xfffff88002fc5ee0 ; kb

FAILURE_BUCKET_ID:  0x7E_farflt+9a95

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {40ffe52a-30ab-4f34-3b15-5c6cd0594e74}

Followup:     MachineOwner
---------


UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff800033dd7d8

Debugging Details:
------------------

fffff800033e60e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a1300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2124

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5002

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: 80050031

BUGCHECK_P3: 406f8

BUGCHECK_P4: fffff800033dd7d8

TRAP_FRAME:  fffff80000ba6e70 -- (.trap 0xfffff80000ba6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800943f8b0 rbx=0000000000000000 rcx=fffffa80088ef181
rdx=fffffa800943f8b1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033dd7d8 rsp=fffff300142881a0 rbp=0000000000000000
r8=fffffa800943f8b0  r9=00000000000000a0 r10=fffff800033e8d60
r11=fffffa80088ef180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!ExFreePoolWithTag+0x248:
fffff800`033dd7d8 5f              pop     rdi
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTAIV.exe

BAD_STACK_POINTER:  fffff300142881a0

STACK_TEXT:
fffff800`00ba6d28 fffff800`032a5fe9     : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`00ba6d30 fffff800`032a2a51     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba6e70 fffff800`033dd7d8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x291
fffff300`142881a0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x248


SYMBOL_NAME:  nt!KiDoubleFaultAbort+291

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort+291

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {226c6897-082d-0f7d-1b21-14822ef4ea3e}

Followup:     MachineOwner
---------

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff88008d8f590, Virtual address for the attempted execute.
Arg2: 80000001507fc963, PTE contents.
Arg3: fffff88008d8f260, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b9300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2140

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3639

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  fc

BUGCHECK_P1: fffff88008d8f590

BUGCHECK_P2: 80000001507fc963

BUGCHECK_P3: fffff88008d8f260

BUGCHECK_P4: 2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTAIV.exe

TRAP_FRAME:  fffff88008d8f260 -- (.trap 0xfffff88008d8f260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8009e49c60
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88008d8f590 rsp=fffff88008d8f3f0 rbp=fffff88008d8f3e0
r8=fffff88008d8f400  r9=0000000000000000 r10=fffffa80085fec28
r11=0000000000000011 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
fffff880`08d8f590 10f0            adc     al,dh
Resetting default scope

STACK_TEXT:
fffff880`08d8f108 fffff800`033890b0     : 00000000`000000fc fffff880`08d8f590 80000001`507fc963 fffff880`08d8f260 : nt!KeBugCheckEx
fffff880`08d8f110 fffff800`032bbcdc     : 00000000`00000008 fffff880`08d8f590 00000000`63416500 fffffa80`099b4b20 : nt!MmAccessFault+0x1d20
fffff880`08d8f260 fffff880`08d8f590     : 00000000`1000000c fffffa80`065ef010 00000000`00000000 fffff880`010050f7 : nt!KiPageFault+0x35c
fffff880`08d8f3f0 00000000`1000000c     : fffffa80`065ef010 00000000`00000000 fffff880`010050f7 fffffa80`00000000 : 0xfffff880`08d8f590
fffff880`08d8f3f8 fffffa80`065ef010     : 00000000`00000000 fffff880`010050f7 fffffa80`00000000 fffffa80`0988b558 : 0x1000000c
fffff880`08d8f400 00000000`00000000     : fffff880`010050f7 fffffa80`00000000 fffffa80`0988b558 fffffa80`08692230 : 0xfffffa80`065ef010


SYMBOL_NAME:  nt!KiPageFault+35c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xFC_nt!KiPageFault+35c

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {78ea4ca1-4a63-db29-9f18-d9a441d9c783}

Followup:     MachineOwner
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff800033e97d8

Debugging Details:
------------------

fffff800033f20e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ad300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1905

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3342

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: 80050031

BUGCHECK_P3: 406f8

BUGCHECK_P4: fffff800033e97d8

TRAP_FRAME:  fffff80000ba6e70 -- (.trap 0xfffff80000ba6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800558bc60 rbx=0000000000000000 rcx=fffffa8009df1161
rdx=fffffa800558bc61 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033e97d8 rsp=fffff3000ef13550 rbp=0000000000000000
r8=fffffa800558bc60  r9=00000000000000a0 r10=fffff800033f4d60
r11=fffffa8009df1160 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!ExFreePoolWithTag+0x248:
fffff800`033e97d8 5f              pop     rdi
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTAIV.exe

BAD_STACK_POINTER:  fffff3000ef13550

STACK_TEXT:
fffff800`00ba6d28 fffff800`032b1fe9     : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`00ba6d30 fffff800`032aea51     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba6e70 fffff800`033e97d8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x291
fffff300`0ef13550 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x248


SYMBOL_NAME:  nt!KiDoubleFaultAbort+291

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort+291

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {226c6897-082d-0f7d-1b21-14822ef4ea3e}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff1401fbbd504, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800032e7f2d, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80003504300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4997

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff1401fbbd504

BUGCHECK_P2: 0

BUGCHECK_P3: fffff800032e7f2d

BUGCHECK_P4: 7

READ_ADDRESS: fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800035042f0
GetUlongPtrFromAddress: unable to read from fffff800035044a8
fffff1401fbbd504

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff88004bfdc40 -- (.trap 0xfffff88004bfdc40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00fddea30 rbx=0000000000000000 rcx=fffff8a00fddea7e
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e7f2d rsp=fffff88004bfddd8 rbp=fffff88004bfdfe0
r8=000000000000002a  r9=fffff80003266000 r10=fffff8000344c840
r11=fffff8a00fddea7e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!memcpy+0x2d:
fffff800`032e7f2d 668b040a        mov     ax,word ptr [rdx+rcx] ds:fffff8a0`0fddea86=????
Resetting default scope

LOCK_ADDRESS:  fffff800034d7240 -- (!locks fffff800034d7240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800034d7240)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff800034d7240
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

STACK_TEXT:
fffff880`04bfdae8 fffff800`033d2a48     : 00000000`00000050 fffff140`1fbbd504 00000000`00000000 fffff880`04bfdc40 : nt!KeBugCheckEx
fffff880`04bfdaf0 fffff800`03306cdc     : 00000000`00000000 fffff140`1fbbd504 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x6b8
fffff880`04bfdc40 fffff800`032e7f2d     : fffff800`0355e585 fffff8a0`00022601 fffff8a0`000226f8 fffff8a0`00022728 : nt!KiPageFault+0x35c
fffff880`04bfddd8 fffff800`0355e585     : fffff8a0`00022601 fffff8a0`000226f8 fffff8a0`00022728 fffff8a0`019f8b00 : nt!memcpy+0x2d
fffff880`04bfdde0 fffff800`037152bf     : fffff8a0`00023160 fffff8a0`00023160 fffff880`04bfe001 fffff880`04bfe440 : nt!CmpGetSymbolicLink+0x1e5
fffff880`04bfdee0 fffff800`036720a4     : fffffa80`062be1c8 00000000`00000000 fffffa80`062be010 fffffa80`054c6f00 : nt!CmpParseKey+0xdef
fffff880`04bfe1d0 fffff800`0354d586     : 00000000`00000000 fffff880`04bfe350 00000000`00000240 fffffa80`05511a40 : nt!ObpLookupObjectName+0x784
fffff880`04bfe2d0 fffff800`0352f4f1     : fffff880`04bfe400 00000000`00000000 fffffa80`006ab500 00000000`0002391f : nt!ObOpenObjectByName+0x306
fffff880`04bfe3a0 fffff800`0352f202     : fffff880`04bfe7b8 fffff800`000f003f fffff880`04bfe7d0 00000000`00000111 : nt!CmCreateKey+0x2e1
fffff880`04bfe510 fffff800`03308c53     : 00000000`00000001 fffffa80`05478000 00000000`00001000 fffff800`0343e026 : nt!NtCreateKey+0x2e
fffff880`04bfe560 fffff800`032fe3e0     : fffff800`0359e492 00000000`00000001 20207050`032ec544 00000000`000000b5 : nt!KiSystemServiceCopyEnd+0x13
fffff880`04bfe768 fffff800`0359e492     : 00000000`00000001 20207050`032ec544 00000000`000000b5 fffff880`04bfe9e0 : nt!KiServiceLinkage
fffff880`04bfe770 fffff800`03595266     : 00000000`00000001 00000000`00000002 00000000`00000002 00000000`000f003f : nt!IopCreateRegistryKeyEx+0x7e
fffff880`04bfe840 fffff800`0359da6d     : 00000000`00000002 00000000`00000000 fffff880`04bfea40 00000000`00000001 : nt!IopGetDeviceInterfaces+0x146
fffff880`04bfe9b0 fffff800`03595025     : 00000000`00000002 00000000`00000000 00000000`00000000 fffff8a0`0d5a66b0 : nt!PiGetInterfaceDeviceList+0x41
fffff880`04bfea10 fffff800`03566ca4     : fffff8a0`0d5a66b0 fffff800`00008000 fffff880`04bfeb01 fffff800`037a1de0 : nt!PiControlGetInterfaceDeviceList+0x111
fffff880`04bfea90 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtPlugPlayControl+0x100


SYMBOL_NAME:  nt!KiPageFault+35c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x50_nt!KiPageFault+35c

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {abc8ff04-6eef-b968-5cc6-5fd732588240}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000058, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88003e08502, address which referenced memory

Debugging Details:
------------------

fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a7300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1686

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4898

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 64

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 58

BUGCHECK_P2: a

BUGCHECK_P3: 0

BUGCHECK_P4: fffff88003e08502

READ_ADDRESS: fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034a72f0
GetUlongPtrFromAddress: unable to read from fffff800034a74a8
0000000000000058

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880009f7240 -- (.trap 0xfffff880009f7240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000007
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003e08502 rsp=fffff880009f73d0 rbp=fffffa80082d1410
r8=0000000000000001  r9=0000000000000000 r10=fffffa80082d1bd0
r11=fffffa8008322ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
fffff880`03e08502 837b5803        cmp     dword ptr [rbx+58h],3 ds:00000000`00000058=????????
Resetting default scope

STACK_TEXT:
fffff880`009f70f8 fffff800`032abfe9     : 00000000`0000000a 00000000`00000058 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff880`009f7100 fffff800`032a9dce     : 00000000`00000000 00000000`00000058 fffff880`112c2800 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009f7240 fffff880`03e08502     : fffffa80`08322cc0 fffffa80`082d1410 fffffa80`08322000 fffffa80`08322000 : nt!KiPageFault+0x44e
fffff880`009f73d0 fffff880`03e081a5     : fffffa80`08322000 00000000`00000000 fffffa80`00000001 fffff880`009f7540 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
fffff880`009f7460 fffff880`03e07fa6     : 00000000`00000247 00000000`00002701 fffffa80`082fa000 fffffa80`0677b000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ed
fffff880`009f74b0 fffff880`03edb13f     : fffffa80`07219480 00000000`0000000f fffffa80`08172020 fffff880`11049bae : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`009f74e0 fffff880`10f67757     : fffff880`009f7610 fffff880`009f7610 fffff880`009f7590 fffff880`1102f478 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`009f7510 fffff880`009f7610     : fffff880`009f7610 fffff880`009f7590 fffff880`1102f478 fffffa80`08172001 : amdkmdag+0xfc757
fffff880`009f7518 fffff880`009f7610     : fffff880`009f7590 fffff880`1102f478 fffffa80`08172001 fffff880`10f018ea : 0xfffff880`009f7610
fffff880`009f7520 fffff880`009f7590     : fffff880`1102f478 fffffa80`08172001 fffff880`10f018ea fffffa80`00000001 : 0xfffff880`009f7610
fffff880`009f7528 fffff880`1102f478     : fffffa80`08172001 fffff880`10f018ea fffffa80`00000001 0000000c`00000247 : 0xfffff880`009f7590
fffff880`009f7530 fffffa80`08172001     : fffff880`10f018ea fffffa80`00000001 0000000c`00000247 fffffa80`00000000 : amdkmdag+0x1c4478
fffff880`009f7538 fffff880`10f018ea     : fffffa80`00000001 0000000c`00000247 fffffa80`00000000 fffffa80`09799968 : 0xfffffa80`08172001
fffff880`009f7540 fffffa80`00000001     : 0000000c`00000247 fffffa80`00000000 fffffa80`09799968 fffffa80`09799968 : amdkmdag+0x968ea
fffff880`009f7548 0000000c`00000247     : fffffa80`00000000 fffffa80`09799968 fffffa80`09799968 fffff880`10e76a40 : 0xfffffa80`00000001
fffff880`009f7550 fffffa80`00000000     : fffffa80`09799968 fffffa80`09799968 fffff880`10e76a40 00000000`00000000 : 0x0000000c`00000247
fffff880`009f7558 fffffa80`09799968     : fffffa80`09799968 fffff880`10e76a40 00000000`00000000 fffffa80`082d1ba8 : 0xfffffa80`00000000
fffff880`009f7560 fffffa80`09799968     : fffff880`10e76a40 00000000`00000000 fffffa80`082d1ba8 fffffa80`09799f48 : 0xfffffa80`09799968
fffff880`009f7568 fffff880`10e76a40     : 00000000`00000000 fffffa80`082d1ba8 fffffa80`09799f48 fffffa80`00000000 : 0xfffffa80`09799968
fffff880`009f7570 00000000`00000000     : fffffa80`082d1ba8 fffffa80`09799f48 fffffa80`00000000 fffffa80`0677b1c8 : amdkmdag+0xba40


SYMBOL_NAME:  dxgmms1!VidSchiProcessIsrCompletedPacket+46

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION:  6.1.7601.24546

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {212d731e-833f-ded6-ccf2-de19468acde6}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000323df20, address which referenced memory

Debugging Details:
------------------

fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b9300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6061

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000323df20

READ_ADDRESS: fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b92f0
GetUlongPtrFromAddress: unable to read from fffff800034b94a8
0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  fffff8800371d340 -- (.trap 0xfffff8800371d340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000323df20 rsp=fffff8800371d4d8 rbp=0000000000000000
r8=fffffa8005503b88  r9=0000000000000002 r10=00000000000241a9
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!KeInterlockedClearProcessorAffinityEx+0x20:
fffff800`0323df20 894c2408        mov     dword ptr [rsp+8],ecx ss:0018:fffff880`0371d4e0=00000002
Resetting default scope

STACK_TEXT:
fffff880`0371d1f8 fffff800`032bdfe9     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0371d200 fffff800`032bbdce     : 00000000`00000000 00000000`00000000 fffff880`0371d400 fffff880`02d00180 : nt!KiBugCheckDispatch+0x69
fffff880`0371d340 fffff800`0323df20     : fffff800`032b2465 00000000`00000002 00000000`00000000 fffffa80`07230000 : nt!KiPageFault+0x44e
fffff880`0371d4d8 fffff800`032b2465     : 00000000`00000002 00000000`00000000 fffffa80`07230000 00001f80`00ee00d3 : nt!KeInterlockedClearProcessorAffinityEx+0x20
fffff880`0371d4e0 fffff800`032b207a     : 00000000`00000000 ffffffff`fffffffb fffff880`02d7b101 fffffa80`08092d50 : nt!SwapContext_PatchXSave+0xc5
fffff880`0371d520 fffff800`032641a2     : 00000000`00000000 fffffa80`084456c0 00000000`00000000 00000000`0000000b : nt!KiSwapContext+0x7a
fffff880`0371d660 fffff800`03256392     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x1d2
fffff880`0371d6f0 fffff960`0013730d     : 00000000`00000004 fffffa80`07cde220 00000000`00000001 00000000`0000000d : nt!KeWaitForMultipleObjects+0x272
fffff880`0371d9b0 00000000`00000004     : fffffa80`07cde220 00000000`00000001 00000000`0000000d fffff960`0036ae00 : win32k+0xc730d
fffff880`0371d9b8 fffffa80`07cde220     : 00000000`00000001 00000000`0000000d fffff960`0036ae00 00000000`000b0001 : 0x4
fffff880`0371d9c0 00000000`00000001     : 00000000`0000000d fffff960`0036ae00 00000000`000b0001 00000000`00000000 : 0xfffffa80`07cde220
fffff880`0371d9c8 00000000`0000000d     : fffff960`0036ae00 00000000`000b0001 00000000`00000000 fffffa80`08443c90 : 0x1
fffff880`0371d9d0 fffff960`0036ae00     : 00000000`000b0001 00000000`00000000 fffffa80`08443c90 00000000`00000000 : 0xd
fffff880`0371d9d8 00000000`000b0001     : 00000000`00000000 fffffa80`08443c90 00000000`00000000 00000000`00000000 : win32k+0x2fae00
fffff880`0371d9e0 00000000`00000000     : fffffa80`08443c90 00000000`00000000 00000000`00000000 fffffa80`084391e0 : 0xb0001


SYMBOL_NAME:  win32k+c730d

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_win32k+c730d

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {353837b9-bf73-ac32-d992-6f0de72e4b8f}

Followup:     MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff880112b9de0, The address that the exception occurred at
Arg3: fffff88005f99178, Exception Record Address
Arg4: fffff88005f989e0, Context Record Address

Debugging Details:
------------------

fffff800034450e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80003500300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6668

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffff80000003

BUGCHECK_P2: fffff880112b9de0

BUGCHECK_P3: fffff88005f99178

BUGCHECK_P4: fffff88005f989e0

EXCEPTION_RECORD:  fffff88005f99178 -- (.exr 0xfffff88005f99178)
ExceptionAddress: fffff880112b9de0 (amdkmdag+0x0000000000254de0)
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 1
   Parameter[0]: 0000000000000000

CONTEXT:  fffff88005f989e0 -- (.cxr 0xfffff88005f989e0)
rax=fffffa800810c020 rbx=fffffa8008c75000 rcx=fffffa800810c020
rdx=fffffa8008110200 rsi=fffff88005f995c0 rdi=fffffa8008110200
rip=fffff880112b9de0 rsp=fffff88005f993b8 rbp=0000000000000000
r8=fffff88011657878  r9=0000000000000000 r10=0000000000000002
r11=0000000000000001 r12=fffffa8008c75000 r13=fffff88005f996c0
r14=fffffa8008110200 r15=fffffa8008c75020
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
amdkmdag+0x254de0:
fffff880`112b9de0 4c8bc1          mov     r8,rcx
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0x80000003 - { ZEL DURUM}  Kesme Noktas   Bir kesme noktas na ula  ld .

EXCEPTION_CODE_STR:  80000003

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_STR:  0x80000003

STACK_TEXT:
fffff880`05f993b8 fffff880`1131fa11     : 00000000`0001c2e1 fffff880`113153e0 fffffa80`08c75020 fffffa80`08110200 : amdkmdag+0x254de0
fffff880`05f993c0 00000000`0001c2e1     : fffff880`113153e0 fffffa80`08c75020 fffffa80`08110200 fffffa80`06a47000 : amdkmdag+0x2baa11
fffff880`05f993c8 fffff880`113153e0     : fffffa80`08c75020 fffffa80`08110200 fffffa80`06a47000 fffff880`1131feab : 0x1c2e1
fffff880`05f993d0 fffffa80`08c75020     : fffffa80`08110200 fffffa80`06a47000 fffff880`1131feab 000000ff`4395c000 : amdkmdag+0x2b03e0
fffff880`05f993d8 fffffa80`08110200     : fffffa80`06a47000 fffff880`1131feab 000000ff`4395c000 00000000`00000009 : 0xfffffa80`08c75020
fffff880`05f993e0 fffffa80`06a47000     : fffff880`1131feab 000000ff`4395c000 00000000`00000009 00000000`00000000 : 0xfffffa80`08110200
fffff880`05f993e8 fffff880`1131feab     : 000000ff`4395c000 00000000`00000009 00000000`00000000 fffffa80`07ed18d0 : 0xfffffa80`06a47000
fffff880`05f993f0 000000ff`4395c000     : 00000000`00000009 00000000`00000000 fffffa80`07ed18d0 00000000`00000002 : amdkmdag+0x2baeab
fffff880`05f993f8 00000000`00000009     : 00000000`00000000 fffffa80`07ed18d0 00000000`00000002 00000000`00000000 : 0x000000ff`4395c000
fffff880`05f99400 00000000`00000000     : fffffa80`07ed18d0 00000000`00000002 00000000`00000000 00000000`00000100 : 0x9


SYMBOL_NAME:  amdkmdag+254de0

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .cxr 0xfffff88005f989e0 ; kb

FAILURE_BUCKET_ID:  0x7E_amdkmdag+254de0

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {e309d79c-74fa-4541-0c0e-f0390630a8da}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff7ff8e415511, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000321e7ef, address which referenced memory

Debugging Details:
------------------

fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a5300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4292

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff7ff8e415511

BUGCHECK_P2: f

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000321e7ef

READ_ADDRESS: fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034a52f0
GetUlongPtrFromAddress: unable to read from fffff800034a54a8
fffff7ff8e415511

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTAIV.exe

DPC_STACK_BASE:  FFFFF880009FEFB0

TRAP_FRAME:  fffff880009fec80 -- (.trap 0xfffff880009fec80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000f rbx=0000000000000000 rcx=fffff80003415510
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000321e7ef rsp=fffff880009fee10 rbp=fffff80003415510
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000049 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KeInsertQueueDpc+0x3f:
fffff800`0321e7ef 0f83a9010000    jae     nt!KeInsertQueueDpc+0x1ee (fffff800`0321e99e) [br=0]
Resetting default scope

STACK_TEXT:
fffff880`009feb38 fffff800`032a9fe9     : 00000000`0000000a fffff7ff`8e415511 00000000`0000000f 00000000`00000000 : nt!KeBugCheckEx
fffff880`009feb40 fffff800`032a7dce     : 00000000`00000000 fffff7ff`8e415511 00000000`00000200 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`009fec80 fffff800`0321e7ef     : 00000000`003cfc11 00000000`00000000 fffffa80`0802d000 fffff880`040ddebc : nt!KiPageFault+0x44e
fffff880`009fee10 fffff800`03304d43     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`009aa180 : nt!KeInsertQueueDpc+0x3f
fffff880`009feea0 fffff800`033a4b77     : 00000000`00000049 00000000`00000000 00000002`89c93ea7 00000002`2f00eaff : nt!PpmCheckPhaseComplete+0x13
fffff880`009feed0 fffff800`03241dfc     : fffff880`009aa180 fffffa80`0002aae5 fffffa80`07c84000 00000000`000000e5 : nt!PpmPerfAction+0x27
fffff880`009fef00 fffff800`0329e305     : 00000000`00000000 fffffa80`05fb1850 00000000`00000000 fffff800`033a4b50 : nt!KiRetireDpcList+0x1bc
fffff880`009fefb0 fffff800`0329e11c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`08108ab0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


SYMBOL_NAME:  nt!KeInsertQueueDpc+3f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_nt!KeInsertQueueDpc+3f

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {35faa44a-9f45-890c-9b38-be06ae6afc73}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88003e8b774, Address of the instruction which caused the bugcheck
Arg3: fffff88009e11890, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

fffff8000343f0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034fa300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1764

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4311

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 63

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff88003e8b774

BUGCHECK_P3: fffff88009e11890

BUGCHECK_P4: 0

CONTEXT:  fffff88009e11890 -- (.cxr 0xfffff88009e11890)
rax=fffff88009e12810 rbx=fffff8a00412ee40 rcx=fffff8a00412eed0
rdx=fffff8a00412ee40 rsi=000000003b0101ee rdi=fffff88009e127f0
rip=fffff88003e8b774 rsp=fffff88009e12260 rbp=0000000000000030
r8=00000000000110c1  r9=00000000000003e0 r10=fffff88009e127f0
r11=0000000000000000 r12=fffff96000308d50 r13=0000000010040195
r14=fffff88009e127f0 r15=0000000000000030
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
dxgkrnl!DXGPRESENT::ComputeSrcDstRects+0xe4:
fffff880`03e8b774 004d1b          add     byte ptr [rbp+1Bh],cl ss:0018:00000000`0000004b=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

MISALIGNED_IP:
dxgkrnl!DXGPRESENT::ComputeSrcDstRects+e4
fffff880`03e8b774 004d1b          add     byte ptr [rbp+1Bh],cl

STACK_TEXT:
fffff880`09e12260 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGPRESENT::ComputeSrcDstRects+0xe4


SYMBOL_NAME:  dxgkrnl!DXGPRESENT::ComputeSrcDstRects+e4

IMAGE_NAME:  hardware

IMAGE_VERSION:  6.1.7601.24546

STACK_COMMAND:  .cxr 0xfffff88009e11890 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_dxgkrnl.sys

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {4baef1c4-80c9-3ccc-f0ef-4c23adb576f1}

Followup:     MachineOwner
---------
 
Son düzenleme:
Mavi ekran hatalarınızın neredeyse tamamı AMD GPU'nuz kaynaklı. DDU ile AMD GPU sürücünüzü kaldırıp yeniden kurmayı deneyebilirsiniz.

Sorununuz çözülmezse artık GPU'yu değiştirmekten başka çare göremiyorum.

Ek olarak, MemTest86 ile belleklerinizde tarama yapmanız iyi olacaktır.

Malwarebytes kaynaklı hata aldığınızı da görüyorum ancak yazılımlar genellikle kendi içlerinde hata verir. Yine de bir süreliğine kaldırırsanız güzel olur ama sorunun payında Malwarebytes'ın olduğunu zannetmiyorum.

Sorununuz çözülürse GTA 4 oynarken kanser olmamanız dileğiyle. :)

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff8c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8801122c912, address which referenced memory

Debugging Details:
------------------

fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b1300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2640

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7916

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffffffffffff8c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8801122c912

WRITE_ADDRESS: fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033f60e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b12f0
GetUlongPtrFromAddress: unable to read from fffff800034b14a8
ffffffffffffff8c

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880049be240 -- (.trap 0xfffff880049be240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa8008111490
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8801122c912 rsp=fffff880049be3d0 rbp=fffff880049be3d0
r8=fffffa8006c07000  r9=0000000000000002 r10=fffff880115e4db8
r11=fffffa800830da58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
amdkmdag+0x21b912:
fffff880`1122c912 20488b          and     byte ptr [rax-75h],cl ds:ffffffff`ffffff8c=??
Resetting default scope

MISALIGNED_IP:
amdkmdag+21b912
fffff880`1122c912 20488b          and     byte ptr [rax-75h],cl

STACK_TEXT:
fffff880`049be0f8 fffff800`032b5fe9     : 00000000`0000000a ffffffff`ffffff8c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`049be100 fffff800`032b3dce     : 00000000`00000001 ffffffff`ffffff8c 00000000`00000000 fffff880`049be5c0 : nt!KiBugCheckDispatch+0x69
fffff880`049be240 fffff880`1122c912     : fffffa80`06be1020 fffffa80`08131200 fffffa80`08120020 fffff880`112cbabd : nt!KiPageFault+0x44e
fffff880`049be3d0 fffffa80`06be1020     : fffffa80`08131200 fffffa80`08120020 fffff880`112cbabd fffffa80`08120020 : amdkmdag+0x21b912
fffff880`049be3d8 fffffa80`08131200     : fffffa80`08120020 fffff880`112cbabd fffffa80`08120020 fffff880`049be5c0 : 0xfffffa80`06be1020
fffff880`049be3e0 fffffa80`08120020     : fffff880`112cbabd fffffa80`08120020 fffff880`049be5c0 00000000`00000000 : 0xfffffa80`08131200
fffff880`049be3e8 fffff880`112cbabd     : fffffa80`08120020 fffff880`049be5c0 00000000`00000000 fffffa80`06992170 : 0xfffffa80`08120020
fffff880`049be3f0 fffffa80`08120020     : fffff880`049be5c0 00000000`00000000 fffffa80`06992170 00000000`00000246 : amdkmdag+0x2baabd
fffff880`049be3f8 fffff880`049be5c0     : 00000000`00000000 fffffa80`06992170 00000000`00000246 00000000`00000001 : 0xfffffa80`08120020
fffff880`049be400 00000000`00000000     : fffffa80`06992170 00000000`00000246 00000000`00000001 00000000`00000100 : 0xfffff880`049be5c0


SYMBOL_NAME:  amdkmdag+21b912

MODULE_NAME: hardware

IMAGE_NAME:  hardware

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  IP_MISALIGNED_amdkmdag.sys

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {28c2d36a-10ec-7743-516b-554c363072af}

Followup:     MachineOwner
---------


REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: fffffa8008e41300, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: fffffa80089078ff, Reserved
    The reference count of an object is illegal for the current state of the object.
    Each time a driver uses a pointer to an object the driver calls a kernel routine
    to increment the reference count of the object. When the driver is done with the
    pointer the driver calls another kernel routine to decrement the reference count.
    Drivers must match calls to the increment and decrement routines. This bugcheck
    can occur because an object's reference count goes to zero while there are still
    open handles to the object, in which case the fourth parameter indicates the number
    of opened handles. It may also occur when the object's reference count drops below zero
    whether or not there are open handles to the object, and in that case the fourth parameter
    contains the actual value of the pointer references count.

Debugging Details:
------------------

fffff8000362f0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800036ea300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5378

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  18

BUGCHECK_P1: 0

BUGCHECK_P2: fffffa8008e41300

BUGCHECK_P3: 2

BUGCHECK_P4: fffffa80089078ff

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe.exe

STACK_TEXT:
fffff880`0ac92958 fffff800`03515b81     : 00000000`00000018 00000000`00000000 fffffa80`08e41300 00000000`00000002 : nt!KeBugCheckEx
fffff880`0ac92960 fffff800`0373224f     : fffff880`0ac92b60 fffffa80`08e41300 00000000`0672fa40 fffffa80`09ab93b0 : nt! ?? ::FNODOBFM::`string'+0x22581
fffff880`0ac929c0 fffff800`034eec53     : fffffa80`08e24060 00000000`0672fa18 fffff880`0ac92a88 00000000`0d144340 : nt!NtRemoveIoCompletion+0x14f
fffff880`0ac92a70 00000000`76d98daa     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0672f9f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d98daa


SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+22581

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x18_CORRUPT_REF_COUNT_nt!_??_::FNODOBFM::_string_+22581

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {a7f3f9de-8cb7-d588-8038-d198feb835f4}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000deadc007, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880111f1119, address which referenced memory

Debugging Details:
------------------

fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ee300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4076

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: deadc007

BUGCHECK_P2: a

BUGCHECK_P3: 0

BUGCHECK_P4: fffff880111f1119

READ_ADDRESS: fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034ee2f0
GetUlongPtrFromAddress: unable to read from fffff800034ee4a8
00000000deadc007

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  fffff8800877f2f0 -- (.trap 0xfffff8800877f2f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008018000
rdx=00000000deadbeef rsi=0000000000000000 rdi=0000000000000000
rip=fffff880111f1119 rsp=fffff8800877f488 rbp=fffffa8008018000
r8=fffffa8008037b60  r9=0000000000002d40 r10=00000000000000b5
r11=fffffa8008144ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
amdkmdag+0x183119:
fffff880`111f1119 8b8218010000    mov     eax,dword ptr [rdx+118h] ds:00000000`deadc007=????????
Resetting default scope

STACK_TEXT:
fffff880`0877f1a8 fffff800`032f2fe9     : 00000000`0000000a 00000000`deadc007 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff880`0877f1b0 fffff800`032f0dce     : 00000000`00000000 00000000`deadc007 fffff880`0877f300 fffff880`0877f550 : nt!KiBugCheckDispatch+0x69
fffff880`0877f2f0 fffff880`111f1119     : fffff880`111f1546 fffffa80`08018000 00000000`00000000 fffff880`0877f550 : nt!KiPageFault+0x44e
fffff880`0877f488 fffff880`111f1546     : fffffa80`08018000 00000000`00000000 fffff880`0877f550 fffffa80`08102000 : amdkmdag+0x183119
fffff880`0877f490 fffffa80`08018000     : 00000000`00000000 fffff880`0877f550 fffffa80`08102000 fffff880`0877f550 : amdkmdag+0x183546
fffff880`0877f498 00000000`00000000     : fffff880`0877f550 fffffa80`08102000 fffff880`0877f550 fffff880`111f0eee : 0xfffffa80`08018000


SYMBOL_NAME:  amdkmdag+183119

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xD1_amdkmdag+183119

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {f3d38223-f324-e082-e608-a36548787e4b}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88010f695b2, address which referenced memory

Debugging Details:
------------------

fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b7300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1937

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6820

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff88010f695b2

WRITE_ADDRESS: fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b72f0
GetUlongPtrFromAddress: unable to read from fffff800034b74a8
0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880026e52f0 -- (.trap 0xfffff880026e52f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8008131200
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88010f695b2 rsp=fffff880026e5480 rbp=fffffa8007dafcf0
r8=fffffa8008490000  r9=0000000000000002 r10=fffff880113d5db8
r11=fffffa800830aa58 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
amdkmdag+0x1675b2:
fffff880`10f695b2 0100            add     dword ptr [rax],eax ds:00000000`00000000=????????
Resetting default scope

MISALIGNED_IP:
amdkmdag+1675b2
fffff880`10f695b2 0100            add     dword ptr [rax],eax

STACK_TEXT:
fffff880`026e51a8 fffff800`032bbfe9     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`026e51b0 fffff800`032b9dce     : 00000000`00000001 00000000`00000000 00000000`00000000 fffff880`026e55c0 : nt!KiBugCheckDispatch+0x69
fffff880`026e52f0 fffff880`10f695b2     : fffffa80`0812e200 fffffa80`08120020 fffff880`1126e430 00000000`00000000 : nt!KiPageFault+0x44e
fffff880`026e5480 fffffa80`0812e200     : fffffa80`08120020 fffff880`1126e430 00000000`00000000 fffffa80`0812e200 : amdkmdag+0x1675b2
fffff880`026e5488 fffffa80`08120020     : fffff880`1126e430 00000000`00000000 fffffa80`0812e200 fffff880`10f42749 : 0xfffffa80`0812e200
fffff880`026e5490 fffff880`1126e430     : 00000000`00000000 fffffa80`0812e200 fffff880`10f42749 fffff880`026e55c0 : 0xfffffa80`08120020
fffff880`026e5498 00000000`00000000     : fffffa80`0812e200 fffff880`10f42749 fffff880`026e55c0 fffffa80`0812e200 : amdkmdag+0x46c430


SYMBOL_NAME:  amdkmdag+1675b2

MODULE_NAME: hardware

IMAGE_NAME:  hardware

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  IP_MISALIGNED_amdkmdag.sys

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {28c2d36a-10ec-7743-516b-554c363072af}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880038e7b2e, Address of the instruction which caused the bugcheck
Arg3: fffff8800acaca50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

fffff800033fc0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b7300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5791

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 64

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff880038e7b2e

BUGCHECK_P3: fffff8800acaca50

BUGCHECK_P4: 0

CONTEXT:  fffff8800acaca50 -- (.cxr 0xfffff8800acaca50)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8800acad550
rdx=fffff900c021df01 rsi=fffff8800acad7f0 rdi=0000000000000000
rip=fffff880038e7b2e rsp=fffff8800acad420 rbp=fffff8a004556c90
r8=fffff8a0042429f0  r9=0000000000000952 r10=fffffa80069fe530
r11=fffff8a004548000 r12=0000000000000003 r13=0000000000000000
r14=0000000000001080 r15=00000000000000e0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
dxgkrnl!DXGCONTEXT::Present+0x32b2:
fffff880`038e7b2e 898424dc000000  mov     dword ptr [rsp+0DCh],eax ss:0018:fffff880`0acad4fc=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffff880`0acad420 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGCONTEXT::Present+0x32b2


SYMBOL_NAME:  dxgkrnl!DXGCONTEXT::Present+32b2

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  6.1.7601.24546

STACK_COMMAND:  .cxr 0xfffff8800acaca50 ; kb

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!DXGCONTEXT::Present+32b2

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {c0395a61-7eb0-0328-14c6-a35e7848687c}

Followup:     MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff88006bc4a95, The address that the exception occurred at
Arg3: fffff88002fc6678, Exception Record Address
Arg4: fffff88002fc5ee0, Context Record Address

Debugging Details:
------------------

fffff800034330e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ee300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8689

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffff80000003

BUGCHECK_P2: fffff88006bc4a95

BUGCHECK_P3: fffff88002fc6678

BUGCHECK_P4: fffff88002fc5ee0

EXCEPTION_RECORD:  fffff88002fc6678 -- (.exr 0xfffff88002fc6678)
ExceptionAddress: fffff88006bc4a95 (farflt+0x0000000000009a95)
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 1
   Parameter[0]: 0000000000000000

CONTEXT:  fffff88002fc5ee0 -- (.cxr 0xfffff88002fc5ee0)
rax=fffff88006bdfd18 rbx=fffffa8007de1840 rcx=0000000000000003
rdx=fffff80003435180 rsi=fffff88006bdfd28 rdi=fffff88006bdfd18
rip=fffff88006bc4a95 rsp=fffff88002fc68b0 rbp=fffffa8008699970
r8=0000000000011e18  r9=0000000000000030 r10=fffff80003250000
r11=0000000000000727 r12=0000000000000001 r13=fffff88000dcc201
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00000287
farflt+0x9a95:
fffff880`06bc4a95 cc              int     3
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0x80000003 - { ZEL DURUM}  Kesme Noktas   Bir kesme noktas na ula  ld .

EXCEPTION_CODE_STR:  80000003

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_STR:  0x80000003

STACK_TEXT:
fffff880`02fc68b0 00000000`00000001     : 00000000`00000000 fffffa80`6c557241 00000000`0000071b 00000000`00000001 : farflt+0x9a95
fffff880`02fc68b8 00000000`00000000     : fffffa80`6c557241 00000000`0000071b 00000000`00000001 fffff880`06bc5065 : 0x1


SYMBOL_NAME:  farflt+9a95

MODULE_NAME: farflt

IMAGE_NAME:  farflt.sys

STACK_COMMAND:  .cxr 0xfffff88002fc5ee0 ; kb

FAILURE_BUCKET_ID:  0x7E_farflt+9a95

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {40ffe52a-30ab-4f34-3b15-5c6cd0594e74}

Followup:     MachineOwner
---------


UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff800033dd7d8

Debugging Details:
------------------

fffff800033e60e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a1300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2124

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5002

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: 80050031

BUGCHECK_P3: 406f8

BUGCHECK_P4: fffff800033dd7d8

TRAP_FRAME:  fffff80000ba6e70 -- (.trap 0xfffff80000ba6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800943f8b0 rbx=0000000000000000 rcx=fffffa80088ef181
rdx=fffffa800943f8b1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033dd7d8 rsp=fffff300142881a0 rbp=0000000000000000
r8=fffffa800943f8b0  r9=00000000000000a0 r10=fffff800033e8d60
r11=fffffa80088ef180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!ExFreePoolWithTag+0x248:
fffff800`033dd7d8 5f              pop     rdi
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTAIV.exe

BAD_STACK_POINTER:  fffff300142881a0

STACK_TEXT:
fffff800`00ba6d28 fffff800`032a5fe9     : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`00ba6d30 fffff800`032a2a51     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba6e70 fffff800`033dd7d8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x291
fffff300`142881a0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x248


SYMBOL_NAME:  nt!KiDoubleFaultAbort+291

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort+291

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {226c6897-082d-0f7d-1b21-14822ef4ea3e}

Followup:     MachineOwner
---------

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff88008d8f590, Virtual address for the attempted execute.
Arg2: 80000001507fc963, PTE contents.
Arg3: fffff88008d8f260, (reserved)
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b9300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2140

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3639

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  fc

BUGCHECK_P1: fffff88008d8f590

BUGCHECK_P2: 80000001507fc963

BUGCHECK_P3: fffff88008d8f260

BUGCHECK_P4: 2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTAIV.exe

TRAP_FRAME:  fffff88008d8f260 -- (.trap 0xfffff88008d8f260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8009e49c60
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88008d8f590 rsp=fffff88008d8f3f0 rbp=fffff88008d8f3e0
r8=fffff88008d8f400  r9=0000000000000000 r10=fffffa80085fec28
r11=0000000000000011 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
fffff880`08d8f590 10f0            adc     al,dh
Resetting default scope

STACK_TEXT:
fffff880`08d8f108 fffff800`033890b0     : 00000000`000000fc fffff880`08d8f590 80000001`507fc963 fffff880`08d8f260 : nt!KeBugCheckEx
fffff880`08d8f110 fffff800`032bbcdc     : 00000000`00000008 fffff880`08d8f590 00000000`63416500 fffffa80`099b4b20 : nt!MmAccessFault+0x1d20
fffff880`08d8f260 fffff880`08d8f590     : 00000000`1000000c fffffa80`065ef010 00000000`00000000 fffff880`010050f7 : nt!KiPageFault+0x35c
fffff880`08d8f3f0 00000000`1000000c     : fffffa80`065ef010 00000000`00000000 fffff880`010050f7 fffffa80`00000000 : 0xfffff880`08d8f590
fffff880`08d8f3f8 fffffa80`065ef010     : 00000000`00000000 fffff880`010050f7 fffffa80`00000000 fffffa80`0988b558 : 0x1000000c
fffff880`08d8f400 00000000`00000000     : fffff880`010050f7 fffffa80`00000000 fffffa80`0988b558 fffffa80`08692230 : 0xfffffa80`065ef010


SYMBOL_NAME:  nt!KiPageFault+35c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xFC_nt!KiPageFault+35c

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {78ea4ca1-4a63-db29-9f18-d9a441d9c783}

Followup:     MachineOwner
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000406f8
Arg4: fffff800033e97d8

Debugging Details:
------------------

fffff800033f20e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ad300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1905

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3342

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: 80050031

BUGCHECK_P3: 406f8

BUGCHECK_P4: fffff800033e97d8

TRAP_FRAME:  fffff80000ba6e70 -- (.trap 0xfffff80000ba6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800558bc60 rbx=0000000000000000 rcx=fffffa8009df1161
rdx=fffffa800558bc61 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033e97d8 rsp=fffff3000ef13550 rbp=0000000000000000
r8=fffffa800558bc60  r9=00000000000000a0 r10=fffff800033f4d60
r11=fffffa8009df1160 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
nt!ExFreePoolWithTag+0x248:
fffff800`033e97d8 5f              pop     rdi
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTAIV.exe

BAD_STACK_POINTER:  fffff3000ef13550

STACK_TEXT:
fffff800`00ba6d28 fffff800`032b1fe9     : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
fffff800`00ba6d30 fffff800`032aea51     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba6e70 fffff800`033e97d8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x291
fffff300`0ef13550 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExFreePoolWithTag+0x248


SYMBOL_NAME:  nt!KiDoubleFaultAbort+291

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort+291

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {226c6897-082d-0f7d-1b21-14822ef4ea3e}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff1401fbbd504, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800032e7f2d, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80003504300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4997

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff1401fbbd504

BUGCHECK_P2: 0

BUGCHECK_P3: fffff800032e7f2d

BUGCHECK_P4: 7

READ_ADDRESS: fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
fffff800034490e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800035042f0
GetUlongPtrFromAddress: unable to read from fffff800035044a8
fffff1401fbbd504

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff88004bfdc40 -- (.trap 0xfffff88004bfdc40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00fddea30 rbx=0000000000000000 rcx=fffff8a00fddea7e
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032e7f2d rsp=fffff88004bfddd8 rbp=fffff88004bfdfe0
r8=000000000000002a  r9=fffff80003266000 r10=fffff8000344c840
r11=fffff8a00fddea7e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!memcpy+0x2d:
fffff800`032e7f2d 668b040a        mov     ax,word ptr [rdx+rcx] ds:fffff8a0`0fddea86=????
Resetting default scope

LOCK_ADDRESS:  fffff800034d7240 -- (!locks fffff800034d7240)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff800034d7240)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff800034d7240
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

STACK_TEXT:
fffff880`04bfdae8 fffff800`033d2a48     : 00000000`00000050 fffff140`1fbbd504 00000000`00000000 fffff880`04bfdc40 : nt!KeBugCheckEx
fffff880`04bfdaf0 fffff800`03306cdc     : 00000000`00000000 fffff140`1fbbd504 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x6b8
fffff880`04bfdc40 fffff800`032e7f2d     : fffff800`0355e585 fffff8a0`00022601 fffff8a0`000226f8 fffff8a0`00022728 : nt!KiPageFault+0x35c
fffff880`04bfddd8 fffff800`0355e585     : fffff8a0`00022601 fffff8a0`000226f8 fffff8a0`00022728 fffff8a0`019f8b00 : nt!memcpy+0x2d
fffff880`04bfdde0 fffff800`037152bf     : fffff8a0`00023160 fffff8a0`00023160 fffff880`04bfe001 fffff880`04bfe440 : nt!CmpGetSymbolicLink+0x1e5
fffff880`04bfdee0 fffff800`036720a4     : fffffa80`062be1c8 00000000`00000000 fffffa80`062be010 fffffa80`054c6f00 : nt!CmpParseKey+0xdef
fffff880`04bfe1d0 fffff800`0354d586     : 00000000`00000000 fffff880`04bfe350 00000000`00000240 fffffa80`05511a40 : nt!ObpLookupObjectName+0x784
fffff880`04bfe2d0 fffff800`0352f4f1     : fffff880`04bfe400 00000000`00000000 fffffa80`006ab500 00000000`0002391f : nt!ObOpenObjectByName+0x306
fffff880`04bfe3a0 fffff800`0352f202     : fffff880`04bfe7b8 fffff800`000f003f fffff880`04bfe7d0 00000000`00000111 : nt!CmCreateKey+0x2e1
fffff880`04bfe510 fffff800`03308c53     : 00000000`00000001 fffffa80`05478000 00000000`00001000 fffff800`0343e026 : nt!NtCreateKey+0x2e
fffff880`04bfe560 fffff800`032fe3e0     : fffff800`0359e492 00000000`00000001 20207050`032ec544 00000000`000000b5 : nt!KiSystemServiceCopyEnd+0x13
fffff880`04bfe768 fffff800`0359e492     : 00000000`00000001 20207050`032ec544 00000000`000000b5 fffff880`04bfe9e0 : nt!KiServiceLinkage
fffff880`04bfe770 fffff800`03595266     : 00000000`00000001 00000000`00000002 00000000`00000002 00000000`000f003f : nt!IopCreateRegistryKeyEx+0x7e
fffff880`04bfe840 fffff800`0359da6d     : 00000000`00000002 00000000`00000000 fffff880`04bfea40 00000000`00000001 : nt!IopGetDeviceInterfaces+0x146
fffff880`04bfe9b0 fffff800`03595025     : 00000000`00000002 00000000`00000000 00000000`00000000 fffff8a0`0d5a66b0 : nt!PiGetInterfaceDeviceList+0x41
fffff880`04bfea10 fffff800`03566ca4     : fffff8a0`0d5a66b0 fffff800`00008000 fffff880`04bfeb01 fffff800`037a1de0 : nt!PiControlGetInterfaceDeviceList+0x111
fffff880`04bfea90 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtPlugPlayControl+0x100


SYMBOL_NAME:  nt!KiPageFault+35c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x50_nt!KiPageFault+35c

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {abc8ff04-6eef-b968-5cc6-5fd732588240}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000058, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88003e08502, address which referenced memory

Debugging Details:
------------------

fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a7300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1686

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4898

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 64

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 58

BUGCHECK_P2: a

BUGCHECK_P3: 0

BUGCHECK_P4: fffff88003e08502

READ_ADDRESS: fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ec0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034a72f0
GetUlongPtrFromAddress: unable to read from fffff800034a74a8
0000000000000058

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff880009f7240 -- (.trap 0xfffff880009f7240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000007
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003e08502 rsp=fffff880009f73d0 rbp=fffffa80082d1410
r8=0000000000000001  r9=0000000000000000 r10=fffffa80082d1bd0
r11=fffffa8008322ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
fffff880`03e08502 837b5803        cmp     dword ptr [rbx+58h],3 ds:00000000`00000058=????????
Resetting default scope

STACK_TEXT:
fffff880`009f70f8 fffff800`032abfe9     : 00000000`0000000a 00000000`00000058 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff880`009f7100 fffff800`032a9dce     : 00000000`00000000 00000000`00000058 fffff880`112c2800 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009f7240 fffff880`03e08502     : fffffa80`08322cc0 fffffa80`082d1410 fffffa80`08322000 fffffa80`08322000 : nt!KiPageFault+0x44e
fffff880`009f73d0 fffff880`03e081a5     : fffffa80`08322000 00000000`00000000 fffffa80`00000001 fffff880`009f7540 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
fffff880`009f7460 fffff880`03e07fa6     : 00000000`00000247 00000000`00002701 fffffa80`082fa000 fffffa80`0677b000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ed
fffff880`009f74b0 fffff880`03edb13f     : fffffa80`07219480 00000000`0000000f fffffa80`08172020 fffff880`11049bae : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`009f74e0 fffff880`10f67757     : fffff880`009f7610 fffff880`009f7610 fffff880`009f7590 fffff880`1102f478 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`009f7510 fffff880`009f7610     : fffff880`009f7610 fffff880`009f7590 fffff880`1102f478 fffffa80`08172001 : amdkmdag+0xfc757
fffff880`009f7518 fffff880`009f7610     : fffff880`009f7590 fffff880`1102f478 fffffa80`08172001 fffff880`10f018ea : 0xfffff880`009f7610
fffff880`009f7520 fffff880`009f7590     : fffff880`1102f478 fffffa80`08172001 fffff880`10f018ea fffffa80`00000001 : 0xfffff880`009f7610
fffff880`009f7528 fffff880`1102f478     : fffffa80`08172001 fffff880`10f018ea fffffa80`00000001 0000000c`00000247 : 0xfffff880`009f7590
fffff880`009f7530 fffffa80`08172001     : fffff880`10f018ea fffffa80`00000001 0000000c`00000247 fffffa80`00000000 : amdkmdag+0x1c4478
fffff880`009f7538 fffff880`10f018ea     : fffffa80`00000001 0000000c`00000247 fffffa80`00000000 fffffa80`09799968 : 0xfffffa80`08172001
fffff880`009f7540 fffffa80`00000001     : 0000000c`00000247 fffffa80`00000000 fffffa80`09799968 fffffa80`09799968 : amdkmdag+0x968ea
fffff880`009f7548 0000000c`00000247     : fffffa80`00000000 fffffa80`09799968 fffffa80`09799968 fffff880`10e76a40 : 0xfffffa80`00000001
fffff880`009f7550 fffffa80`00000000     : fffffa80`09799968 fffffa80`09799968 fffff880`10e76a40 00000000`00000000 : 0x0000000c`00000247
fffff880`009f7558 fffffa80`09799968     : fffffa80`09799968 fffff880`10e76a40 00000000`00000000 fffffa80`082d1ba8 : 0xfffffa80`00000000
fffff880`009f7560 fffffa80`09799968     : fffff880`10e76a40 00000000`00000000 fffffa80`082d1ba8 fffffa80`09799f48 : 0xfffffa80`09799968
fffff880`009f7568 fffff880`10e76a40     : 00000000`00000000 fffffa80`082d1ba8 fffffa80`09799f48 fffffa80`00000000 : 0xfffffa80`09799968
fffff880`009f7570 00000000`00000000     : fffffa80`082d1ba8 fffffa80`09799f48 fffffa80`00000000 fffffa80`0677b1c8 : amdkmdag+0xba40


SYMBOL_NAME:  dxgmms1!VidSchiProcessIsrCompletedPacket+46

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

IMAGE_VERSION:  6.1.7601.24546

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {212d731e-833f-ded6-ccf2-de19468acde6}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000323df20, address which referenced memory

Debugging Details:
------------------

fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034b9300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6061

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000323df20

READ_ADDRESS: fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033fe0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034b92f0
GetUlongPtrFromAddress: unable to read from fffff800034b94a8
0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  fffff8800371d340 -- (.trap 0xfffff8800371d340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000323df20 rsp=fffff8800371d4d8 rbp=0000000000000000
r8=fffffa8005503b88  r9=0000000000000002 r10=00000000000241a9
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!KeInterlockedClearProcessorAffinityEx+0x20:
fffff800`0323df20 894c2408        mov     dword ptr [rsp+8],ecx ss:0018:fffff880`0371d4e0=00000002
Resetting default scope

STACK_TEXT:
fffff880`0371d1f8 fffff800`032bdfe9     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0371d200 fffff800`032bbdce     : 00000000`00000000 00000000`00000000 fffff880`0371d400 fffff880`02d00180 : nt!KiBugCheckDispatch+0x69
fffff880`0371d340 fffff800`0323df20     : fffff800`032b2465 00000000`00000002 00000000`00000000 fffffa80`07230000 : nt!KiPageFault+0x44e
fffff880`0371d4d8 fffff800`032b2465     : 00000000`00000002 00000000`00000000 fffffa80`07230000 00001f80`00ee00d3 : nt!KeInterlockedClearProcessorAffinityEx+0x20
fffff880`0371d4e0 fffff800`032b207a     : 00000000`00000000 ffffffff`fffffffb fffff880`02d7b101 fffffa80`08092d50 : nt!SwapContext_PatchXSave+0xc5
fffff880`0371d520 fffff800`032641a2     : 00000000`00000000 fffffa80`084456c0 00000000`00000000 00000000`0000000b : nt!KiSwapContext+0x7a
fffff880`0371d660 fffff800`03256392     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x1d2
fffff880`0371d6f0 fffff960`0013730d     : 00000000`00000004 fffffa80`07cde220 00000000`00000001 00000000`0000000d : nt!KeWaitForMultipleObjects+0x272
fffff880`0371d9b0 00000000`00000004     : fffffa80`07cde220 00000000`00000001 00000000`0000000d fffff960`0036ae00 : win32k+0xc730d
fffff880`0371d9b8 fffffa80`07cde220     : 00000000`00000001 00000000`0000000d fffff960`0036ae00 00000000`000b0001 : 0x4
fffff880`0371d9c0 00000000`00000001     : 00000000`0000000d fffff960`0036ae00 00000000`000b0001 00000000`00000000 : 0xfffffa80`07cde220
fffff880`0371d9c8 00000000`0000000d     : fffff960`0036ae00 00000000`000b0001 00000000`00000000 fffffa80`08443c90 : 0x1
fffff880`0371d9d0 fffff960`0036ae00     : 00000000`000b0001 00000000`00000000 fffffa80`08443c90 00000000`00000000 : 0xd
fffff880`0371d9d8 00000000`000b0001     : 00000000`00000000 fffffa80`08443c90 00000000`00000000 00000000`00000000 : win32k+0x2fae00
fffff880`0371d9e0 00000000`00000000     : fffffa80`08443c90 00000000`00000000 00000000`00000000 fffffa80`084391e0 : 0xb0001


SYMBOL_NAME:  win32k+c730d

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_win32k+c730d

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {353837b9-bf73-ac32-d992-6f0de72e4b8f}

Followup:     MachineOwner
---------


SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffff80000003, The exception code that was not handled
Arg2: fffff880112b9de0, The address that the exception occurred at
Arg3: fffff88005f99178, Exception Record Address
Arg4: fffff88005f989e0, Context Record Address

Debugging Details:
------------------

fffff800034450e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80003500300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6668

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffff80000003

BUGCHECK_P2: fffff880112b9de0

BUGCHECK_P3: fffff88005f99178

BUGCHECK_P4: fffff88005f989e0

EXCEPTION_RECORD:  fffff88005f99178 -- (.exr 0xfffff88005f99178)
ExceptionAddress: fffff880112b9de0 (amdkmdag+0x0000000000254de0)
   ExceptionCode: 80000003 (Break instruction exception)
  ExceptionFlags: 00000000
NumberParameters: 1
   Parameter[0]: 0000000000000000

CONTEXT:  fffff88005f989e0 -- (.cxr 0xfffff88005f989e0)
rax=fffffa800810c020 rbx=fffffa8008c75000 rcx=fffffa800810c020
rdx=fffffa8008110200 rsi=fffff88005f995c0 rdi=fffffa8008110200
rip=fffff880112b9de0 rsp=fffff88005f993b8 rbp=0000000000000000
r8=fffff88011657878  r9=0000000000000000 r10=0000000000000002
r11=0000000000000001 r12=fffffa8008c75000 r13=fffff88005f996c0
r14=fffffa8008110200 r15=fffffa8008c75020
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
amdkmdag+0x254de0:
fffff880`112b9de0 4c8bc1          mov     r8,rcx
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0x80000003 - { ZEL DURUM}  Kesme Noktas   Bir kesme noktas na ula  ld .

EXCEPTION_CODE_STR:  80000003

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_STR:  0x80000003

STACK_TEXT:
fffff880`05f993b8 fffff880`1131fa11     : 00000000`0001c2e1 fffff880`113153e0 fffffa80`08c75020 fffffa80`08110200 : amdkmdag+0x254de0
fffff880`05f993c0 00000000`0001c2e1     : fffff880`113153e0 fffffa80`08c75020 fffffa80`08110200 fffffa80`06a47000 : amdkmdag+0x2baa11
fffff880`05f993c8 fffff880`113153e0     : fffffa80`08c75020 fffffa80`08110200 fffffa80`06a47000 fffff880`1131feab : 0x1c2e1
fffff880`05f993d0 fffffa80`08c75020     : fffffa80`08110200 fffffa80`06a47000 fffff880`1131feab 000000ff`4395c000 : amdkmdag+0x2b03e0
fffff880`05f993d8 fffffa80`08110200     : fffffa80`06a47000 fffff880`1131feab 000000ff`4395c000 00000000`00000009 : 0xfffffa80`08c75020
fffff880`05f993e0 fffffa80`06a47000     : fffff880`1131feab 000000ff`4395c000 00000000`00000009 00000000`00000000 : 0xfffffa80`08110200
fffff880`05f993e8 fffff880`1131feab     : 000000ff`4395c000 00000000`00000009 00000000`00000000 fffffa80`07ed18d0 : 0xfffffa80`06a47000
fffff880`05f993f0 000000ff`4395c000     : 00000000`00000009 00000000`00000000 fffffa80`07ed18d0 00000000`00000002 : amdkmdag+0x2baeab
fffff880`05f993f8 00000000`00000009     : 00000000`00000000 fffffa80`07ed18d0 00000000`00000002 00000000`00000000 : 0x000000ff`4395c000
fffff880`05f99400 00000000`00000000     : fffffa80`07ed18d0 00000000`00000002 00000000`00000000 00000000`00000100 : 0x9


SYMBOL_NAME:  amdkmdag+254de0

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .cxr 0xfffff88005f989e0 ; kb

FAILURE_BUCKET_ID:  0x7E_amdkmdag+254de0

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {e309d79c-74fa-4541-0c0e-f0390630a8da}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff7ff8e415511, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000321e7ef, address which referenced memory

Debugging Details:
------------------

fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a5300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4292

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 61

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff7ff8e415511

BUGCHECK_P2: f

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000321e7ef

READ_ADDRESS: fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ea0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034a52f0
GetUlongPtrFromAddress: unable to read from fffff800034a54a8
fffff7ff8e415511

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  GTAIV.exe

DPC_STACK_BASE:  FFFFF880009FEFB0

TRAP_FRAME:  fffff880009fec80 -- (.trap 0xfffff880009fec80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000f rbx=0000000000000000 rcx=fffff80003415510
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000321e7ef rsp=fffff880009fee10 rbp=fffff80003415510
r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000049 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KeInsertQueueDpc+0x3f:
fffff800`0321e7ef 0f83a9010000    jae     nt!KeInsertQueueDpc+0x1ee (fffff800`0321e99e) [br=0]
Resetting default scope

STACK_TEXT:
fffff880`009feb38 fffff800`032a9fe9     : 00000000`0000000a fffff7ff`8e415511 00000000`0000000f 00000000`00000000 : nt!KeBugCheckEx
fffff880`009feb40 fffff800`032a7dce     : 00000000`00000000 fffff7ff`8e415511 00000000`00000200 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`009fec80 fffff800`0321e7ef     : 00000000`003cfc11 00000000`00000000 fffffa80`0802d000 fffff880`040ddebc : nt!KiPageFault+0x44e
fffff880`009fee10 fffff800`03304d43     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`009aa180 : nt!KeInsertQueueDpc+0x3f
fffff880`009feea0 fffff800`033a4b77     : 00000000`00000049 00000000`00000000 00000002`89c93ea7 00000002`2f00eaff : nt!PpmCheckPhaseComplete+0x13
fffff880`009feed0 fffff800`03241dfc     : fffff880`009aa180 fffffa80`0002aae5 fffffa80`07c84000 00000000`000000e5 : nt!PpmPerfAction+0x27
fffff880`009fef00 fffff800`0329e305     : 00000000`00000000 fffffa80`05fb1850 00000000`00000000 fffff800`033a4b50 : nt!KiRetireDpcList+0x1bc
fffff880`009fefb0 fffff800`0329e11c     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`08108ab0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


SYMBOL_NAME:  nt!KeInsertQueueDpc+3f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  6.1.7601.24557

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0xA_nt!KeInsertQueueDpc+3f

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {35faa44a-9f45-890c-9b38-be06ae6afc73}

Followup:     MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88003e8b774, Address of the instruction which caused the bugcheck
Arg3: fffff88009e11890, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

fffff8000343f0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034fa300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1764

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4311

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 63

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-06-10T19:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24557


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff88003e8b774

BUGCHECK_P3: fffff88009e11890

BUGCHECK_P4: 0

CONTEXT:  fffff88009e11890 -- (.cxr 0xfffff88009e11890)
rax=fffff88009e12810 rbx=fffff8a00412ee40 rcx=fffff8a00412eed0
rdx=fffff8a00412ee40 rsi=000000003b0101ee rdi=fffff88009e127f0
rip=fffff88003e8b774 rsp=fffff88009e12260 rbp=0000000000000030
r8=00000000000110c1  r9=00000000000003e0 r10=fffff88009e127f0
r11=0000000000000000 r12=fffff96000308d50 r13=0000000010040195
r14=fffff88009e127f0 r15=0000000000000030
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
dxgkrnl!DXGPRESENT::ComputeSrcDstRects+0xe4:
fffff880`03e8b774 004d1b          add     byte ptr [rbp+1Bh],cl ss:0018:00000000`0000004b=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

MISALIGNED_IP:
dxgkrnl!DXGPRESENT::ComputeSrcDstRects+e4
fffff880`03e8b774 004d1b          add     byte ptr [rbp+1Bh],cl

STACK_TEXT:
fffff880`09e12260 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGPRESENT::ComputeSrcDstRects+0xe4


SYMBOL_NAME:  dxgkrnl!DXGPRESENT::ComputeSrcDstRects+e4

IMAGE_NAME:  hardware

IMAGE_VERSION:  6.1.7601.24546

STACK_COMMAND:  .cxr 0xfffff88009e11890 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_dxgkrnl.sys

OS_VERSION:  7.1.7601.24557

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {4baef1c4-80c9-3ccc-f0ef-4c23adb576f1}

Followup:     MachineOwner
---------
GTA 4'ü zaten zar zor bitirebildim :) AMD GPU sürücülerini bu forumda daha önce açtığım başlıklardaki tavsiyeler ışığında da defalarca silip tekrar yükledim ama AMD benim GPU ma sürücü yazılımı yapmayı becerememiş galiba :( Memtest86 testimde biraz kırmızı bölümler çıkmıştı kısacası bilgisayarım sakat ben de çözüm bulamadım aylarca artık böyle idare etmeye çalışıyorum. Desteğiniz için teşekkürler.
 

Geri
Yukarı