SYSTEM_SERVICE_EXCEPTION (3b) mavi ekran hatası

rephellboy

Hectopat
Katılım
31 Mayıs 2020
Mesajlar
109
Merhaba arkadaşlar, dün ve bugün iki kere bilgisayar mavi ekran hatası verdi. Birinde CoD Warzone oynarken diğeri ise Rainbow Six Siege oynarken mavi ekran verdi.
RAM'lar ve hard diskleri test ettim herhangi bir error ile karşılaşmadım.
Windows 10 2004 sürümü.
Minidump dosyası:
 
Son düzenleyen: Moderatör:
Şimdikinde o tür yazılar vs. yazmıyorsa alınabilir ama bu kablodan dediğim gibi kaynaklanacağını sanmıyorum.

Alttaki daha kalını. Bir üstteki aynı değere sahip. 1.5 metre yetecetir. Sizin verdiğiniz 3 metre o kadar uzun almaya gerek yok.
 
S-Link Sl-P175 1.5M 0.75Mm Lüks Power Kablo Fiyatı
Bunu alıyorum o zaman. Teşekkür ederim tekrardan.

Şimdikinde o tür yazılar vs. yazmıyorsa alınabilir ama bu kablodan dediğim gibi kaynaklanacağını sanmıyorum.

Alttaki daha kalını. Bir üstteki aynı değere sahip. 1.5 metre yetecetir. Sizin verdiğiniz 3 metre o kadar uzun almaya gerek yok.

Hocam merhaba, bu gece yine PUBG oynarken mavi ekran hatası aldım. Dediğiniz gibi MSI Afterburner ve Valorant sildim. Yine mavi ekran hatası verdi. Minidump dosyası: 071520-11984-01
1909 Windows sürümünü yüklüyken hiç mavi ekran almamıştım yaklaşık bir senedir bilgisayarı kullandım ve sorunsuz bir şekilde kullanıyordum, Battle-eye ve MSI Afterburner yüklüyken. Windows virüs bulaştıktan sonra 2004 format attım ve bildiğiniz gibi lanet mavi ekran hatası alıyorum.
Bu arada kasayı açıp tüm kabloları vs. her şeyini baktım hatalı bir şey görmedim. Yakın zamanda 01.06. 2020'de 8 GB RAM alıp bilgisayara ekledim. Mavi ekran hataları RAM taktıktan 1 ay sonra yani Windows 2004 sürümüne 2 Temmuz'da geçince, mavi ekran hatası almayı başaladım. RAM'ların kutu fotoğraflarını çekip atarım. Bir daha emin olmak için Memtest86 testi yapacağım bu gece onun sonucunu da paylaşırım. Üstte Battle-eye de silin demiştiniz, yaklaşık oynadığım tüm oyunlar Battle-eye bağlı (Rainbow Six Siege, PUBG, Fortnite ). Bu arada sadece oyundayken mavi ekran hatası veriyor. İlk mavi ekran hatasını CoD Warzone oynarken, ikinci PUBG, üçüncü Rainbow Six Siege, dördüncü Metro Exodus ve beşinci yine PUBG oynarken verdi. Masaüstü ve internette gezerken hiçbir sorun yok, bir gün bilgisayarı açık bıraktım hiç mavi ekran vermemişti, nedense oyunlara girince böyle bir sorun oluştu.

Dikkatli bir şekilde Güç kaynağına dinledim ve PSU'den de ses geliyor. Gelen ses kaydedip MediaFire yükledim 6 saniyelik bir ses dosyası kulaklık ile dinlerseniz rahatça duyabileceğiniz bir ses. Mavi ekran bundan dolayı olabilir mı peki? PSU'den gelen ses dosyası: Recording_1

Son olarak 1909 sürümüne geçersem sizce mavi ekran hatası gider mı yoksa devam eder mi?
Hocam bu arada çok fazla yazı yazdım kusura bakmayın. Sadece tüm her şeyi anlatmak istedim.
Yazdığınız her cevap için de teşekkürler.
Her iki fotoğrafta da üstteki ilk bilgisayarım ile takılı gelen RAM, alttaki ise yeni aldığım RAM.

IMG_20200715_035705_1920x1080.jpg
IMG_20200715_035757_1920x1080.jpg
 
Son düzenleyen: Moderatör:
Merhaba, bu konu ile ilgili iki tane daha konu açmıştım. Dedikleriniz her şeyi yaptım

  • MSI Afterburner kaldırdım
  • Vanguard sildim
  • Battle-eye kaldırdım
  • Bilgisayar Driver'leri güncelledim, olmadı.
  • Temiz bir Windows 10 2004 sürümü format attım ama yine mavi ekran verdi.
  • RAM'leri üç kere Memtest86 ile test ettim ama RAM'lardan herhangi bir sorun çıkmadı.
  • Harddiski HD Tune ile test ettim, temiz çıktı.
  • SSD kendi programı ve Crystaldiskınfo ile baktım o da temiz çıktı.
Artık neden kaynaklandığını bilmiyorum. Herhangi crackli uygulama veya oyun kullanmıyorum. Harici diskteki yedek oyun dosyalarına belki virüs bulaşmış olabilir diye tüm oyunlarımı tekrardan indirdim ama yine olmadı. BIOS güncellemesi de yaptım. Ekran kartı FurMark ile test ettim yaklaşık 1 saat yakın ekran kartın sıcaklığı en yüksek 76 dereceye gördü.

Son aldığım mavi ekran hatasının minidump dosyasını bırakıyorum. Sürekli mavi ekran hatası almıyorum, arada sırada ne zaman canı isterse veriyor. Bazen oyunu ilk açtığımda direk mavi ekran verir, bazen oyunun ortasında, bazen de hiç vermeyebilir. Hemen hemen her oyunda mavi ekran hatasını verdi diyebilirim, PUBG, Rainbow Six Siege, CoD Warzone, Metro Exodus. Bir kerede Chrome, YouTube'da video izlerken vermişti.

Bu arada bilgisayar bana geldiğinde 8 GB RAM ile gelmişti ve sonradan yani 2 ay önce yeni RAM aldım, bilgisayarda olan RAM'in aynısından. 1 ay format atmadan önce mavi ekran hatası yoktu ve format attığım son ayda mavi ekran hatası vermeye başladı. RAM'lerin kutu fotoğraflarını atarım.

Başka yede de bu konuyu açmıştım ve ekran kartın Driver'ini kaldırıp tekrar kur demişlerdi, yaptım ama olmadı.
Sistemim:
  • ASRock B450M HDV r4.0
  • Ryzen 5 2600
  • Palit GTX 1660 Dual 6 GB
  • 16 GB RAM (8+8) Adata Gammix D10 3000MHz CL16
  • Adata SU650 120GB SSD
  • Seagate Barracuda 1TB HDD
  • Aerocool Cylon 500W 80+ PSU
  • Windows 10 2004

BIOS sürümü en güncel 3.90. Chipset Driver'leri de güncel.
RAM fotoğraflarında üstteki ilk bilgisayar ile gelen RAM, alttaki ise sonradan aldığım RAM.

Memtest86-1.jpg
Memtest86-2.jpg
HDD.jpg
SSD.jpg
Ram.jpg
Ram 2.jpg
 
Son düzenleyen: Moderatör:
Murat bir Vanguard bellemiş, temcit pilavı gibi her konuda onu söylüyor. Donanımsal hata varsa istersen Windows sil, başka işletim sistemi kur, sorun yaşamaya devam edersin. Bakalım bakalım dökümlerine.

Sorun bellekle ilgili. 2004 ile bir ilgisi yok. Sonradan taktığın RAM ile öncekinin kodu farklı. Ya kit bellek al ya da sonradan taktığını söküp dene. Bunu yapmadan da bu konuya dönüş yapma. Tekrar ediyorum, %99 bellek sorunu. Vanguard ile, yazılımla vs. bir alakası yok.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800702252cc, Address of the instruction which caused the bugcheck
Arg3: fffffb8f07827f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4882

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800702252cc

BUGCHECK_P3: fffffb8f07827f20

BUGCHECK_P4: 0

CONTEXT:  fffffb8f07827f20 -- (.cxr 0xfffffb8f07827f20)
rax=0000000000000000 rbx=ffff8a08de92f500 rcx=ffff8a08dc0c0e80
rdx=0000000000000080 rsi=ffff8a08dc0c0e80 rdi=0000000000000080
rip=fffff800702252cc rsp=fffffb8f07828920 rbp=0000000000000000
r8=0000000000000000  r9=000000000000005d r10=0000000000000000
r11=fffff80070000000 r12=0000000000000000 r13=0000000000000080
r14=0000000000000000 r15=ffff8a08de92f640
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!KeAbPreAcquire+0x11c:
fffff800`702252cc 0fb64220        movzx   eax,byte ptr [rdx+20h] ds:002b:00000000`000000a0=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT:
fffffb8f`07828920 fffff800`7040bdd6     : ffff8a08`de92f500 fffffb8f`07828a01 00000000`00000000 ffff8a08`00000000 : nt!KeAbPreAcquire+0x11c
fffffb8f`07828970 fffff800`70231feb     : ffff8a08`dc0c0e80 00000000`00000006 ffffe381`13199001 ffff8a08`cfa99000 : nt!KeWaitForSingleObject+0x1e54b6
fffffb8f`07828a60 fffff800`7060b250     : fffffb8f`07828e20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KeWaitForMultipleObjects+0x45b
fffffb8f`07828b70 ffffa16b`a683fc22     : 00000000`000186a0 00000000`00030d40 ffffa109`447f5090 ffff8a08`dd63e070 : nt!ObWaitForMultipleObjects+0x2f0
fffffb8f`07829070 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxMsgWaitForMultipleObjectsEx+0x8e


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
    ffffa16ba679946b-ffffa16ba679946c  2 bytes - win32kfull!NtUserCallHwnd+bb
    [ 8b 74:89 54 ]
    ffffa16ba679946e-ffffa16ba67994b3  70 bytes - win32kfull!NtUserCallHwnd+be (+0x03)
    [ 58 48 8b c3 48 8b 5c 24:10 53 56 57 41 54 41 55 ]
    ffffa16ba67994b5-ffffa16ba67994c0  12 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+25 (+0x47)
    [ 8b da 8b f9 c7 44 24 38:89 74 24 40 44 8b a4 24 ]
    ffffa16ba67994c2-ffffa16ba67994cb  10 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+32 (+0x0d)
    [ bf 01 00 00 00 41 8b d7:f7 c4 e0 ff ff ff 0f 85 ]
    ffffa16ba67994d8-ffffa16ba6799526  79 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+48 (+0x16)
    [ 48 8b 05 41 da 2b 00 48:84 e7 0f 85 0e 99 0e 00 ]
    ffffa16ba6799528-ffffa16ba679955f  56 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+98 (+0x50)
    [ 41 f6 c4 04 0f 84 92 04:00 4c 8b f8 48 85 c0 0f ]
    ffffa16ba679985e-ffffa16ba679987c  31 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+3ce (+0x336)
    [ 54 24 40 48 89 54 24 58:89 44 24 30 48 8b 05 b7 ]
    ffffa16ba679987f-ffffa16ba6799894  22 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+3ef (+0x21)
    [ 44 8b 84 24 40 09 00 00:80 f7 ff ff 41 8b 08 48 ]
    ffffa16ba6799896-ffffa16ba67998b5  32 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+406 (+0x17)
    [ d6 2b 00 4c 8b 30 48 ba:48 0c 41 83 be 88 04 00 ]
    ffffa16ba67998b7-ffffa16ba67998da  36 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+427 (+0x21)
    [ 0f af c8 48 c1 e9 18 49:c1 ef 18 85 ff 0f 84 a6 ]
    ffffa16ba67998dc-ffffa16ba67998eb  16 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+44c (+0x25)
    [ 48 8b 18 41 8b 38 48 0f:00 00 0f 8c 8e 95 0e 00 ]
    ffffa16ba67998ed-ffffa16ba67998f4  8 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+45d (+0x11)
    [ 84 da 97 0e 00 48 8b cb:ba f0 22 48 89 83 c0 04 ]
    ffffa16ba6799901-ffffa16ba6799904  4 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+471 (+0x14)
    [ 89 bb 88 04:e8 1a bb 30 ]
    ffffa16ba6799906-ffffa16ba6799909  4 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+476 (+0x05)
    [ 00 83 bb e0:49 8b 86 b8 ]
    ffffa16ba679990d-ffffa16ba6799929  29 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+47d (+0x07)
    [ 00 0f 8c c2 97 0e 00 48:66 89 70 0a 41 81 a6 c0 ]
    ffffa16ba6799936-ffffa16ba6799946  17 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4a6 (+0x29)
    [ 49 8b 86 b8 01 00 00 66:95 0e 00 48 8b cf 4c 8b ]
    ffffa16ba6799948-ffffa16ba679994c  5 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4b8 (+0x12)
    [ ff fb ff ff 65:48 85 c0 74 03 ]
    ffffa16ba679994f-ffffa16ba6799954  6 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4bf (+0x07)
    [ 3c 25 88 01 00 00:30 48 8b 44 24 50 ]
    ffffa16ba683fc22-ffffa16ba683fc46  37 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+8e (+0xa62d3)
    [ 48 89 4c 24 50 8b bc 24:8b d8 85 c0 78 0c 40 84 ]
    ffffa16ba683fc48 - win32kfull!xxxMsgWaitForMultipleObjectsEx+b4 (+0x26)
    [ 64:ac ]
    ffffa16ba683fc4a-ffffa16ba683fc55  12 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+b6 (+0x02)
    [ 44 48 89 74 24 30 44 8b:c0 00 00 00 44 8b 64 24 ]
    ffffa16ba683fc57-ffffa16ba683fc65  15 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+c3 (+0x0d)
    [ 28 41 b0 01 49 8b d5 c6:b0 00 00 00 45 85 ff 75 ]
    ffffa16ba683fc72-ffffa16ba683fc8a  25 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+de (+0x1b)
    [ 8b d8 85 c0 78 0c 40 84:58 b9 03 00 00 00 48 8b ]
    ffffa16ba683fc97-ffffa16ba683fcb4  30 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+103 (+0x25)
    [ 8b ac 24 c0 00 00 00 44:0f 84 0d ff ff ff 85 db ]
    ffffa16ba683fcb6-ffffa16ba683fcb8  3 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+122 (+0x1f)
    [ 86 b8 eb:76 24 ef ]
    ffffa16ba683fcba-ffffa16ba683fcf6  61 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+126 (+0x04)
    [ 85 c0 74 2f 48 8b 44 24:83 c8 ff 48 83 c4 68 41 ]
    ffffa16ba683fd03-ffffa16ba683fd1d  27 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+16f (+0x49)
    [ 8b c8 e8 36 24 ef ff 83:28 48 8b 09 4c 8b 15 32 ]
    ffffa16ba683fd20-ffffa16ba683fd21  2 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+18c (+0x1d)
    [ cc cc:48 89 ]
    ffffa16ba6a36bd4 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bd4)
    [ 90:60 ]
    ffffa16ba6a36bd8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bd8) (+0x04)
    [ d2:a2 ]
    ffffa16ba6a36bdc - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bdc) (+0x04)
    [ dc:ec ]
    ffffa16ba6a36be0 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be0) (+0x04)
    [ e0:b0 ]
    ffffa16ba6a36be4-ffffa16ba6a36be5  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be4) (+0x04)
    [ 10 9d:e0 9c ]
    ffffa16ba6a36be8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be8) (+0x04)
    [ 20:30 ]
    ffffa16ba6a36bec-ffffa16ba6a36bed  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bec) (+0x04)
    [ 20 9d:f0 9c ]
    ffffa16ba6a36bf0 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf0) (+0x04)
    [ 91:61 ]
    ffffa16ba6a36bf4 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf4) (+0x04)
    [ 6c:7c ]
    ffffa16ba6a36bf8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf8) (+0x04)
    [ a0:70 ]
    ffffa16ba6a36bfc - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bfc) (+0x04)
    [ 6e:3e ]
    ffffa16ba6a36c00 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c00) (+0x04)
    [ c4:d4 ]
    ffffa16ba6a36c04 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c04) (+0x04)
    [ 80:50 ]
    ffffa16ba6a36c08 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c08) (+0x04)
    [ 51:21 ]
    ffffa16ba6a36c0c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c0c) (+0x04)
    [ 80:90 ]
    ffffa16ba6a36c10 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c10) (+0x04)
    [ 60:30 ]
    ffffa16ba6a36c14 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c14) (+0x04)
    [ e7:b7 ]
    ffffa16ba6a36c18 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c18) (+0x04)
    [ 98:a8 ]
    ffffa16ba6a36c1c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c1c) (+0x04)
    [ f0:c0 ]
    ffffa16ba6a36c20 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c20) (+0x04)
    [ a9:79 ]
    ffffa16ba6a36c24 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c24) (+0x04)
    [ a8:b8 ]
    ffffa16ba6a36c28 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c28) (+0x04)
    [ a9:79 ]
    ffffa16ba6a36c2c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c2c) (+0x04)
    [ 3a:0a ]
    ffffa16ba6a36c30 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c30) (+0x04)
    [ b8:c8 ]
    ffffa16ba6a36c34 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c34) (+0x04)
    [ 3a:0a ]
    ffffa16ba6a36c38 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c38) (+0x04)
    [ 39:09 ]
    ffffa16ba6a36c3c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c3c) (+0x04)
    [ cc:dc ]
    ffffa16ba6a36c40 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c40) (+0x04)
    [ 40:10 ]
    ffffa16ba6a36c44 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c44) (+0x04)
    [ 68:38 ]
    ffffa16ba6a36c48 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c48) (+0x04)
    [ 04:14 ]
    ffffa16ba6a36c4c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c4c) (+0x04)
    [ 70:40 ]
    ffffa16ba6a36c50 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c50) (+0x04)
    [ ef:bf ]
    ffffa16ba6a36c54 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c54) (+0x04)
    [ 6c:7c ]
    ffffa16ba6a36c58 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c58) (+0x04)
    [ f8:c8 ]
    ffffa16ba6a36c5c-ffffa16ba6a36c5d  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c5c) (+0x04)
    [ 05 ac:d5 ab ]
    ffffa16ba6a36c60 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c60) (+0x04)
    [ 94:a4 ]
    ffffa16ba6a36c64-ffffa16ba6a36c65  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c64) (+0x04)
    [ 0c ac:dc ab ]
    ffffa16ba6a36c68-ffffa16ba6a36c69  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c68) (+0x04)
    [ 2d ac:fd ab ]
    ffffa16ba6a36c6c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c6c) (+0x04)
    [ 64:74 ]
    ffffa16ba6a36c70 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c70) (+0x04)
    [ 34:04 ]
    ffffa16ba6a36c74 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c74) (+0x04)
    [ 84:54 ]
    ffffa16ba6a36c78 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c78) (+0x04)
    [ cc:dc ]
    ffffa16ba6a36c7c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c7c) (+0x04)
    [ 90:60 ]
    ffffa16ba6a36c80 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c80) (+0x04)
    [ 8b:5b ]
    ffffa16ba6a36c84 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c84) (+0x04)
    [ 34:44 ]
    ffffa16ba6a36c88 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c88) (+0x04)
    [ 94:64 ]
    ffffa16ba6a36c8c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c8c) (+0x04)
    [ 79:49 ]
    ffffa16ba6a36c90-ffffa16ba6a36c91  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c90) (+0x04)
    [ f8 a7:08 a8 ]
    ffffa16ba6a36c94 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c94) (+0x04)
    [ 80:50 ]
    ffffa16ba6a36c98-ffffa16ba6a36c99  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c98) (+0x04)
    [ 16 e4:e6 e3 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
783 errors : !win32kfull (ffffa16ba679946b-ffffa16ba6a3eab8)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xfffffb8f07827f20 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffab81aabe7e70
Arg3: 00000000d1d64b08
Arg4: fffff8015a7fb346

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3983

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11120

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffab81aabe7e70

BUGCHECK_P3: d1d64b08

BUGCHECK_P4: fffff8015a7fb346

TRAP_FRAME:  ffffab81aabe7e70 -- (.trap 0xffffab81aabe7e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000102 rbx=0000000000000000 rcx=ffffd6855a6162e0
rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015a7fb346 rsp=00000000d1d64b08 rbp=ffff9309d1d64b80
r8=0000000100000045  r9=ffffab81aab80180 r10=0000000000000000
r11=fffff8015a200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ObWaitForSingleObject+0xc6:
fffff801`5a7fb346 415e            pop     r14
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

BAD_STACK_POINTER:  00000000d1d64b08

STACK_TEXT:
ffffab81`aabe7d28 fffff801`5a5ef929     : 00000000`0000007f 00000000`00000008 ffffab81`aabe7e70 00000000`d1d64b08 : nt!KeBugCheckEx
ffffab81`aabe7d30 fffff801`5a5ea743     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab81`aabe7e70 fffff801`5a7fb346     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`d1d64b08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0xc6


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c3

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000100000005d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80272817b17, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6268

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 100000005d

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80272817b17

READ_ADDRESS: fffff802732fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8027320f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8027320f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000100000005d

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RainbowSix.exe

TRAP_FRAME:  fffffe0b0211e4e0 -- (.trap 0xfffffe0b0211e4e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc800b7b0370 rbx=0000000000000000 rcx=d4be284b6a560000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80272817b17 rsp=fffffe0b0211e678 rbp=fffffe0b0211e560
r8=0000000000000000  r9=0000000fffffffff r10=ffffbf8000005bd0
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiGetPageChain+0x317:
fffff802`72817b17 415f            pop     r15
Resetting default scope

STACK_TEXT:
fffffe0b`0211e398 fffff802`729ef929     : 00000000`0000000a 00000010`0000005d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffe0b`0211e3a0 fffff802`729ebc29     : 00000000`00000000 00000000`00000000 00000000`003d3abd 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffffe0b`0211e4e0 fffff802`72817b17     : ffff8004`e674f700 00000000`00000040 0000025b`23430000 00000000`00000001 : nt!KiPageFault+0x469
fffffe0b`0211e678 fffff802`72815656     : 00000000`00000005 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetPageChain+0x317
fffffe0b`0211e6c0 fffff802`72821890     : ffff9081`a9c95180 00000000`00000000 ffffffff`ffffffff fffff802`73250ac0 : nt!MiResolvePrivateZeroFault+0x176
fffffe0b`0211e7e0 fffff802`72813382     : fffffe0b`0211ea20 fffffe0b`0211e960 fffffe0b`0211e970 fffffe0b`0211e908 : nt!MiZeroFault+0x380
fffffe0b`0211e8d0 fffff802`72812a4a     : ffff8004`e8dc8001 ffff8004`00000003 ffff9081`00000000 fffff802`729e4c32 : nt!MiUserFault+0x3c2
fffffe0b`0211e960 fffff802`729ebb1e     : ffff8004`e783e080 ffff8004`e62c86e0 00000000`00000000 ffff8004`00000000 : nt!MmAccessFault+0x16a
fffffe0b`0211eb00 00007ff7`4f014b12     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000ca`015fe860 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`4f014b12


SYMBOL_NAME:  nt!MiGetPageChain+317

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  317

FAILURE_BUCKET_ID:  AV_nt!MiGetPageChain

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0e6728ab-cf4f-0ce6-a21d-b2680731698a}

Followup:     MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8055dcfa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7514

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10580

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8055dcfa318

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffdb0bfca29630 -- (.trap 0xffffdb0bfca29630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000634bd4c4 rbx=0000000000000000 rcx=ffffdb0bfca29820
rdx=ffffdb0bfca29840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8055d233395 rsp=ffffdb0bfca297c0 rbp=ffffdb0bfca29960
r8=ffff9600aa9e6280  r9=0000000000000000 r10=0000fffff8055d9b
r11=ffff85fcc4a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x15:
fffff805`5d233395 f390            pause
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff9600`aa3f9e18 fffff805`5d4593ee     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9600`aa3f9e20 fffff805`5d2ca2ed     : 00004263`5c669e20 00000000`00000000 ffffdb0b`fca29600 ffff9600`aa9e6180 : nt!KeAccumulateTicks+0x18bf6e
ffff9600`aa3f9e80 fffff805`5d2ca16a     : ffffcb05`e74c7480 ffffdb0b`fca296b0 fffff805`0014fe2b 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
ffff9600`aa3f9f30 fffff805`5d208705     : ffffcb05`e74c7480 00000000`00000000 00000000`00000000 ffff59d8`7c552baa : nt!HalpTimerClockIpiRoutine+0x1a
ffff9600`aa3f9f60 fffff805`5d3df4ca     : ffffdb0b`fca296b0 ffffcb05`e74c7480 00004253`8cd78a5e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9600`aa3f9fb0 fffff805`5d3dfa37     : 00000032`01166a3f fffff805`625796af ffffdb0b`fca29840 fffff805`5d3dfa44 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffdb0b`fca29630 fffff805`5d233395     : 00000000`00000010 00000000`00000246 ffffdb0b`fca297e8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffdb0b`fca297c0 fffff805`5d9ba819     : 00000000`00000002 00000000`00000000 ffff9600`aa9e6180 00000000`00000001 : nt!KeYieldProcessorEx+0x15
ffffdb0b`fca297f0 fffff805`5d9b90f5     : 00000000`634bd4c4 ffff9600`aa9e6180 ffffcb05`f2c77140 00000000`00000000 : nt!IopLiveDumpProcessCorralStateChange+0x2d
ffffdb0b`fca29820 fffff805`5d23a69e     : ffff9600`aa9e9240 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopLiveDumpCorralDpc+0x55
ffffdb0b`fca29860 fffff805`5d239984     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffdb0b`fca299d0 fffff805`5d3e158e     : ffffffff`00000000 ffff9600`aa9e6180 ffff9600`aa9f1340 ffffcb05`f12a5080 : nt!KiRetireDpcList+0x1f4
ffffdb0b`fca29c60 00000000`00000000     : ffffdb0b`fca2a000 ffffdb0b`fca24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KeAccumulateTicks+18bf6e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18bf6e

FAILURE_BUCKET_ID:  0x133_DPC_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {88dc98ce-f842-4daa-98d0-858621db6b0f}

Followup:     MachineOwner
---------
 
Son düzenleme:
Murat bir Vanguard bellemiş, temcit pilavı gibi her konuda onu söylüyor. Donanımsal hata varsa istersen Windows sil, başka işletim sistemi kur, sorun yaşamaya devam edersin. Bakalım bakalım dökümlerine.

Sorun bellekle ilgili. 2004 ile bir ilgisi yok. Sonradan taktığın RAM ile öncekinin kodu farklı. Ya kit bellek al ya da sonradan taktığını söküp dene. Bunu yapmadan da bu konuya dönüş yapma. Tekrar ediyorum, %99 bellek sorunu. Vanguard ile, yazılımla vs. bir alakası yok.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800702252cc, Address of the instruction which caused the bugcheck
Arg3: fffffb8f07827f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4882

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800702252cc

BUGCHECK_P3: fffffb8f07827f20

BUGCHECK_P4: 0

CONTEXT:  fffffb8f07827f20 -- (.cxr 0xfffffb8f07827f20)
rax=0000000000000000 rbx=ffff8a08de92f500 rcx=ffff8a08dc0c0e80
rdx=0000000000000080 rsi=ffff8a08dc0c0e80 rdi=0000000000000080
rip=fffff800702252cc rsp=fffffb8f07828920 rbp=0000000000000000
r8=0000000000000000  r9=000000000000005d r10=0000000000000000
r11=fffff80070000000 r12=0000000000000000 r13=0000000000000080
r14=0000000000000000 r15=ffff8a08de92f640
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!KeAbPreAcquire+0x11c:
fffff800`702252cc 0fb64220        movzx   eax,byte ptr [rdx+20h] ds:002b:00000000`000000a0=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT:
fffffb8f`07828920 fffff800`7040bdd6     : ffff8a08`de92f500 fffffb8f`07828a01 00000000`00000000 ffff8a08`00000000 : nt!KeAbPreAcquire+0x11c
fffffb8f`07828970 fffff800`70231feb     : ffff8a08`dc0c0e80 00000000`00000006 ffffe381`13199001 ffff8a08`cfa99000 : nt!KeWaitForSingleObject+0x1e54b6
fffffb8f`07828a60 fffff800`7060b250     : fffffb8f`07828e20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KeWaitForMultipleObjects+0x45b
fffffb8f`07828b70 ffffa16b`a683fc22     : 00000000`000186a0 00000000`00030d40 ffffa109`447f5090 ffff8a08`dd63e070 : nt!ObWaitForMultipleObjects+0x2f0
fffffb8f`07829070 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxMsgWaitForMultipleObjectsEx+0x8e


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
    ffffa16ba679946b-ffffa16ba679946c  2 bytes - win32kfull!NtUserCallHwnd+bb
    [ 8b 74:89 54 ]
    ffffa16ba679946e-ffffa16ba67994b3  70 bytes - win32kfull!NtUserCallHwnd+be (+0x03)
    [ 58 48 8b c3 48 8b 5c 24:10 53 56 57 41 54 41 55 ]
    ffffa16ba67994b5-ffffa16ba67994c0  12 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+25 (+0x47)
    [ 8b da 8b f9 c7 44 24 38:89 74 24 40 44 8b a4 24 ]
    ffffa16ba67994c2-ffffa16ba67994cb  10 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+32 (+0x0d)
    [ bf 01 00 00 00 41 8b d7:f7 c4 e0 ff ff ff 0f 85 ]
    ffffa16ba67994d8-ffffa16ba6799526  79 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+48 (+0x16)
    [ 48 8b 05 41 da 2b 00 48:84 e7 0f 85 0e 99 0e 00 ]
    ffffa16ba6799528-ffffa16ba679955f  56 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+98 (+0x50)
    [ 41 f6 c4 04 0f 84 92 04:00 4c 8b f8 48 85 c0 0f ]
    ffffa16ba679985e-ffffa16ba679987c  31 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+3ce (+0x336)
    [ 54 24 40 48 89 54 24 58:89 44 24 30 48 8b 05 b7 ]
    ffffa16ba679987f-ffffa16ba6799894  22 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+3ef (+0x21)
    [ 44 8b 84 24 40 09 00 00:80 f7 ff ff 41 8b 08 48 ]
    ffffa16ba6799896-ffffa16ba67998b5  32 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+406 (+0x17)
    [ d6 2b 00 4c 8b 30 48 ba:48 0c 41 83 be 88 04 00 ]
    ffffa16ba67998b7-ffffa16ba67998da  36 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+427 (+0x21)
    [ 0f af c8 48 c1 e9 18 49:c1 ef 18 85 ff 0f 84 a6 ]
    ffffa16ba67998dc-ffffa16ba67998eb  16 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+44c (+0x25)
    [ 48 8b 18 41 8b 38 48 0f:00 00 0f 8c 8e 95 0e 00 ]
    ffffa16ba67998ed-ffffa16ba67998f4  8 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+45d (+0x11)
    [ 84 da 97 0e 00 48 8b cb:ba f0 22 48 89 83 c0 04 ]
    ffffa16ba6799901-ffffa16ba6799904  4 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+471 (+0x14)
    [ 89 bb 88 04:e8 1a bb 30 ]
    ffffa16ba6799906-ffffa16ba6799909  4 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+476 (+0x05)
    [ 00 83 bb e0:49 8b 86 b8 ]
    ffffa16ba679990d-ffffa16ba6799929  29 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+47d (+0x07)
    [ 00 0f 8c c2 97 0e 00 48:66 89 70 0a 41 81 a6 c0 ]
    ffffa16ba6799936-ffffa16ba6799946  17 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4a6 (+0x29)
    [ 49 8b 86 b8 01 00 00 66:95 0e 00 48 8b cf 4c 8b ]
    ffffa16ba6799948-ffffa16ba679994c  5 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4b8 (+0x12)
    [ ff fb ff ff 65:48 85 c0 74 03 ]
    ffffa16ba679994f-ffffa16ba6799954  6 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4bf (+0x07)
    [ 3c 25 88 01 00 00:30 48 8b 44 24 50 ]
    ffffa16ba683fc22-ffffa16ba683fc46  37 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+8e (+0xa62d3)
    [ 48 89 4c 24 50 8b bc 24:8b d8 85 c0 78 0c 40 84 ]
    ffffa16ba683fc48 - win32kfull!xxxMsgWaitForMultipleObjectsEx+b4 (+0x26)
    [ 64:ac ]
    ffffa16ba683fc4a-ffffa16ba683fc55  12 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+b6 (+0x02)
    [ 44 48 89 74 24 30 44 8b:c0 00 00 00 44 8b 64 24 ]
    ffffa16ba683fc57-ffffa16ba683fc65  15 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+c3 (+0x0d)
    [ 28 41 b0 01 49 8b d5 c6:b0 00 00 00 45 85 ff 75 ]
    ffffa16ba683fc72-ffffa16ba683fc8a  25 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+de (+0x1b)
    [ 8b d8 85 c0 78 0c 40 84:58 b9 03 00 00 00 48 8b ]
    ffffa16ba683fc97-ffffa16ba683fcb4  30 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+103 (+0x25)
    [ 8b ac 24 c0 00 00 00 44:0f 84 0d ff ff ff 85 db ]
    ffffa16ba683fcb6-ffffa16ba683fcb8  3 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+122 (+0x1f)
    [ 86 b8 eb:76 24 ef ]
    ffffa16ba683fcba-ffffa16ba683fcf6  61 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+126 (+0x04)
    [ 85 c0 74 2f 48 8b 44 24:83 c8 ff 48 83 c4 68 41 ]
    ffffa16ba683fd03-ffffa16ba683fd1d  27 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+16f (+0x49)
    [ 8b c8 e8 36 24 ef ff 83:28 48 8b 09 4c 8b 15 32 ]
    ffffa16ba683fd20-ffffa16ba683fd21  2 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+18c (+0x1d)
    [ cc cc:48 89 ]
    ffffa16ba6a36bd4 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bd4)
    [ 90:60 ]
    ffffa16ba6a36bd8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bd8) (+0x04)
    [ d2:a2 ]
    ffffa16ba6a36bdc - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bdc) (+0x04)
    [ dc:ec ]
    ffffa16ba6a36be0 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be0) (+0x04)
    [ e0:b0 ]
    ffffa16ba6a36be4-ffffa16ba6a36be5  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be4) (+0x04)
    [ 10 9d:e0 9c ]
    ffffa16ba6a36be8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be8) (+0x04)
    [ 20:30 ]
    ffffa16ba6a36bec-ffffa16ba6a36bed  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bec) (+0x04)
    [ 20 9d:f0 9c ]
    ffffa16ba6a36bf0 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf0) (+0x04)
    [ 91:61 ]
    ffffa16ba6a36bf4 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf4) (+0x04)
    [ 6c:7c ]
    ffffa16ba6a36bf8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf8) (+0x04)
    [ a0:70 ]
    ffffa16ba6a36bfc - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bfc) (+0x04)
    [ 6e:3e ]
    ffffa16ba6a36c00 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c00) (+0x04)
    [ c4:d4 ]
    ffffa16ba6a36c04 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c04) (+0x04)
    [ 80:50 ]
    ffffa16ba6a36c08 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c08) (+0x04)
    [ 51:21 ]
    ffffa16ba6a36c0c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c0c) (+0x04)
    [ 80:90 ]
    ffffa16ba6a36c10 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c10) (+0x04)
    [ 60:30 ]
    ffffa16ba6a36c14 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c14) (+0x04)
    [ e7:b7 ]
    ffffa16ba6a36c18 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c18) (+0x04)
    [ 98:a8 ]
    ffffa16ba6a36c1c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c1c) (+0x04)
    [ f0:c0 ]
    ffffa16ba6a36c20 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c20) (+0x04)
    [ a9:79 ]
    ffffa16ba6a36c24 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c24) (+0x04)
    [ a8:b8 ]
    ffffa16ba6a36c28 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c28) (+0x04)
    [ a9:79 ]
    ffffa16ba6a36c2c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c2c) (+0x04)
    [ 3a:0a ]
    ffffa16ba6a36c30 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c30) (+0x04)
    [ b8:c8 ]
    ffffa16ba6a36c34 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c34) (+0x04)
    [ 3a:0a ]
    ffffa16ba6a36c38 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c38) (+0x04)
    [ 39:09 ]
    ffffa16ba6a36c3c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c3c) (+0x04)
    [ cc:dc ]
    ffffa16ba6a36c40 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c40) (+0x04)
    [ 40:10 ]
    ffffa16ba6a36c44 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c44) (+0x04)
    [ 68:38 ]
    ffffa16ba6a36c48 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c48) (+0x04)
    [ 04:14 ]
    ffffa16ba6a36c4c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c4c) (+0x04)
    [ 70:40 ]
    ffffa16ba6a36c50 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c50) (+0x04)
    [ ef:bf ]
    ffffa16ba6a36c54 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c54) (+0x04)
    [ 6c:7c ]
    ffffa16ba6a36c58 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c58) (+0x04)
    [ f8:c8 ]
    ffffa16ba6a36c5c-ffffa16ba6a36c5d  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c5c) (+0x04)
    [ 05 ac:d5 ab ]
    ffffa16ba6a36c60 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c60) (+0x04)
    [ 94:a4 ]
    ffffa16ba6a36c64-ffffa16ba6a36c65  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c64) (+0x04)
    [ 0c ac:dc ab ]
    ffffa16ba6a36c68-ffffa16ba6a36c69  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c68) (+0x04)
    [ 2d ac:fd ab ]
    ffffa16ba6a36c6c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c6c) (+0x04)
    [ 64:74 ]
    ffffa16ba6a36c70 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c70) (+0x04)
    [ 34:04 ]
    ffffa16ba6a36c74 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c74) (+0x04)
    [ 84:54 ]
    ffffa16ba6a36c78 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c78) (+0x04)
    [ cc:dc ]
    ffffa16ba6a36c7c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c7c) (+0x04)
    [ 90:60 ]
    ffffa16ba6a36c80 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c80) (+0x04)
    [ 8b:5b ]
    ffffa16ba6a36c84 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c84) (+0x04)
    [ 34:44 ]
    ffffa16ba6a36c88 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c88) (+0x04)
    [ 94:64 ]
    ffffa16ba6a36c8c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c8c) (+0x04)
    [ 79:49 ]
    ffffa16ba6a36c90-ffffa16ba6a36c91  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c90) (+0x04)
    [ f8 a7:08 a8 ]
    ffffa16ba6a36c94 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c94) (+0x04)
    [ 80:50 ]
    ffffa16ba6a36c98-ffffa16ba6a36c99  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c98) (+0x04)
    [ 16 e4:e6 e3 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
783 errors : !win32kfull (ffffa16ba679946b-ffffa16ba6a3eab8)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xfffffb8f07827f20 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffab81aabe7e70
Arg3: 00000000d1d64b08
Arg4: fffff8015a7fb346

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3983

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11120

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffab81aabe7e70

BUGCHECK_P3: d1d64b08

BUGCHECK_P4: fffff8015a7fb346

TRAP_FRAME:  ffffab81aabe7e70 -- (.trap 0xffffab81aabe7e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000102 rbx=0000000000000000 rcx=ffffd6855a6162e0
rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015a7fb346 rsp=00000000d1d64b08 rbp=ffff9309d1d64b80
r8=0000000100000045  r9=ffffab81aab80180 r10=0000000000000000
r11=fffff8015a200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ObWaitForSingleObject+0xc6:
fffff801`5a7fb346 415e            pop     r14
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

BAD_STACK_POINTER:  00000000d1d64b08

STACK_TEXT:
ffffab81`aabe7d28 fffff801`5a5ef929     : 00000000`0000007f 00000000`00000008 ffffab81`aabe7e70 00000000`d1d64b08 : nt!KeBugCheckEx
ffffab81`aabe7d30 fffff801`5a5ea743     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab81`aabe7e70 fffff801`5a7fb346     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`d1d64b08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0xc6


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c3

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000100000005d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80272817b17, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6268

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 100000005d

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80272817b17

READ_ADDRESS: fffff802732fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8027320f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8027320f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000100000005d

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RainbowSix.exe

TRAP_FRAME:  fffffe0b0211e4e0 -- (.trap 0xfffffe0b0211e4e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc800b7b0370 rbx=0000000000000000 rcx=d4be284b6a560000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80272817b17 rsp=fffffe0b0211e678 rbp=fffffe0b0211e560
r8=0000000000000000  r9=0000000fffffffff r10=ffffbf8000005bd0
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiGetPageChain+0x317:
fffff802`72817b17 415f            pop     r15
Resetting default scope

STACK_TEXT:
fffffe0b`0211e398 fffff802`729ef929     : 00000000`0000000a 00000010`0000005d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffe0b`0211e3a0 fffff802`729ebc29     : 00000000`00000000 00000000`00000000 00000000`003d3abd 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffffe0b`0211e4e0 fffff802`72817b17     : ffff8004`e674f700 00000000`00000040 0000025b`23430000 00000000`00000001 : nt!KiPageFault+0x469
fffffe0b`0211e678 fffff802`72815656     : 00000000`00000005 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetPageChain+0x317
fffffe0b`0211e6c0 fffff802`72821890     : ffff9081`a9c95180 00000000`00000000 ffffffff`ffffffff fffff802`73250ac0 : nt!MiResolvePrivateZeroFault+0x176
fffffe0b`0211e7e0 fffff802`72813382     : fffffe0b`0211ea20 fffffe0b`0211e960 fffffe0b`0211e970 fffffe0b`0211e908 : nt!MiZeroFault+0x380
fffffe0b`0211e8d0 fffff802`72812a4a     : ffff8004`e8dc8001 ffff8004`00000003 ffff9081`00000000 fffff802`729e4c32 : nt!MiUserFault+0x3c2
fffffe0b`0211e960 fffff802`729ebb1e     : ffff8004`e783e080 ffff8004`e62c86e0 00000000`00000000 ffff8004`00000000 : nt!MmAccessFault+0x16a
fffffe0b`0211eb00 00007ff7`4f014b12     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000ca`015fe860 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`4f014b12


SYMBOL_NAME:  nt!MiGetPageChain+317

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  317

FAILURE_BUCKET_ID:  AV_nt!MiGetPageChain

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0e6728ab-cf4f-0ce6-a21d-b2680731698a}

Followup:     MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8055dcfa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7514

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10580

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8055dcfa318

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffdb0bfca29630 -- (.trap 0xffffdb0bfca29630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000634bd4c4 rbx=0000000000000000 rcx=ffffdb0bfca29820
rdx=ffffdb0bfca29840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8055d233395 rsp=ffffdb0bfca297c0 rbp=ffffdb0bfca29960
r8=ffff9600aa9e6280  r9=0000000000000000 r10=0000fffff8055d9b
r11=ffff85fcc4a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x15:
fffff805`5d233395 f390            pause
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff9600`aa3f9e18 fffff805`5d4593ee     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9600`aa3f9e20 fffff805`5d2ca2ed     : 00004263`5c669e20 00000000`00000000 ffffdb0b`fca29600 ffff9600`aa9e6180 : nt!KeAccumulateTicks+0x18bf6e
ffff9600`aa3f9e80 fffff805`5d2ca16a     : ffffcb05`e74c7480 ffffdb0b`fca296b0 fffff805`0014fe2b 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
ffff9600`aa3f9f30 fffff805`5d208705     : ffffcb05`e74c7480 00000000`00000000 00000000`00000000 ffff59d8`7c552baa : nt!HalpTimerClockIpiRoutine+0x1a
ffff9600`aa3f9f60 fffff805`5d3df4ca     : ffffdb0b`fca296b0 ffffcb05`e74c7480 00004253`8cd78a5e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9600`aa3f9fb0 fffff805`5d3dfa37     : 00000032`01166a3f fffff805`625796af ffffdb0b`fca29840 fffff805`5d3dfa44 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffdb0b`fca29630 fffff805`5d233395     : 00000000`00000010 00000000`00000246 ffffdb0b`fca297e8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffdb0b`fca297c0 fffff805`5d9ba819     : 00000000`00000002 00000000`00000000 ffff9600`aa9e6180 00000000`00000001 : nt!KeYieldProcessorEx+0x15
ffffdb0b`fca297f0 fffff805`5d9b90f5     : 00000000`634bd4c4 ffff9600`aa9e6180 ffffcb05`f2c77140 00000000`00000000 : nt!IopLiveDumpProcessCorralStateChange+0x2d
ffffdb0b`fca29820 fffff805`5d23a69e     : ffff9600`aa9e9240 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopLiveDumpCorralDpc+0x55
ffffdb0b`fca29860 fffff805`5d239984     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffdb0b`fca299d0 fffff805`5d3e158e     : ffffffff`00000000 ffff9600`aa9e6180 ffff9600`aa9f1340 ffffcb05`f12a5080 : nt!KiRetireDpcList+0x1f4
ffffdb0b`fca29c60 00000000`00000000     : ffffdb0b`fca2a000 ffffdb0b`fca24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KeAccumulateTicks+18bf6e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18bf6e

FAILURE_BUCKET_ID:  0x133_DPC_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {88dc98ce-f842-4daa-98d0-858621db6b0f}

Followup:     MachineOwner
---------
Merhaba hocam . Yeni aldığım RAM çıkarttım ve 8gb RAM ile yaklaşık 5-6 gündür bilgisayarı sorunsuz kullanıyordum ki , bugün yine mavi ekran hatası aldım . Ama bu sefer hata kodunu internette araştırdığımda ekran kartın yazılımı ile ilgisi olduğunu söyleniyor .
Minidump dosyası : 080320-6812-01
Murat bir Vanguard bellemiş, temcit pilavı gibi her konuda onu söylüyor. Donanımsal hata varsa istersen Windows sil, başka işletim sistemi kur, sorun yaşamaya devam edersin. Bakalım bakalım dökümlerine.

Sorun bellekle ilgili. 2004 ile bir ilgisi yok. Sonradan taktığın RAM ile öncekinin kodu farklı. Ya kit bellek al ya da sonradan taktığını söküp dene. Bunu yapmadan da bu konuya dönüş yapma. Tekrar ediyorum, %99 bellek sorunu. Vanguard ile, yazılımla vs. bir alakası yok.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800702252cc, Address of the instruction which caused the bugcheck
Arg3: fffffb8f07827f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4421

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4882

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800702252cc

BUGCHECK_P3: fffffb8f07827f20

BUGCHECK_P4: 0

CONTEXT:  fffffb8f07827f20 -- (.cxr 0xfffffb8f07827f20)
rax=0000000000000000 rbx=ffff8a08de92f500 rcx=ffff8a08dc0c0e80
rdx=0000000000000080 rsi=ffff8a08dc0c0e80 rdi=0000000000000080
rip=fffff800702252cc rsp=fffffb8f07828920 rbp=0000000000000000
r8=0000000000000000  r9=000000000000005d r10=0000000000000000
r11=fffff80070000000 r12=0000000000000000 r13=0000000000000080
r14=0000000000000000 r15=ffff8a08de92f640
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!KeAbPreAcquire+0x11c:
fffff800`702252cc 0fb64220        movzx   eax,byte ptr [rdx+20h] ds:002b:00000000`000000a0=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT:
fffffb8f`07828920 fffff800`7040bdd6     : ffff8a08`de92f500 fffffb8f`07828a01 00000000`00000000 ffff8a08`00000000 : nt!KeAbPreAcquire+0x11c
fffffb8f`07828970 fffff800`70231feb     : ffff8a08`dc0c0e80 00000000`00000006 ffffe381`13199001 ffff8a08`cfa99000 : nt!KeWaitForSingleObject+0x1e54b6
fffffb8f`07828a60 fffff800`7060b250     : fffffb8f`07828e20 00000000`00000001 00000000`00000001 00000000`00000000 : nt!KeWaitForMultipleObjects+0x45b
fffffb8f`07828b70 ffffa16b`a683fc22     : 00000000`000186a0 00000000`00030d40 ffffa109`447f5090 ffff8a08`dd63e070 : nt!ObWaitForMultipleObjects+0x2f0
fffffb8f`07829070 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxMsgWaitForMultipleObjectsEx+0x8e


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
    ffffa16ba679946b-ffffa16ba679946c  2 bytes - win32kfull!NtUserCallHwnd+bb
    [ 8b 74:89 54 ]
    ffffa16ba679946e-ffffa16ba67994b3  70 bytes - win32kfull!NtUserCallHwnd+be (+0x03)
    [ 58 48 8b c3 48 8b 5c 24:10 53 56 57 41 54 41 55 ]
    ffffa16ba67994b5-ffffa16ba67994c0  12 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+25 (+0x47)
    [ 8b da 8b f9 c7 44 24 38:89 74 24 40 44 8b a4 24 ]
    ffffa16ba67994c2-ffffa16ba67994cb  10 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+32 (+0x0d)
    [ bf 01 00 00 00 41 8b d7:f7 c4 e0 ff ff ff 0f 85 ]
    ffffa16ba67994d8-ffffa16ba6799526  79 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+48 (+0x16)
    [ 48 8b 05 41 da 2b 00 48:84 e7 0f 85 0e 99 0e 00 ]
    ffffa16ba6799528-ffffa16ba679955f  56 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+98 (+0x50)
    [ 41 f6 c4 04 0f 84 92 04:00 4c 8b f8 48 85 c0 0f ]
    ffffa16ba679985e-ffffa16ba679987c  31 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+3ce (+0x336)
    [ 54 24 40 48 89 54 24 58:89 44 24 30 48 8b 05 b7 ]
    ffffa16ba679987f-ffffa16ba6799894  22 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+3ef (+0x21)
    [ 44 8b 84 24 40 09 00 00:80 f7 ff ff 41 8b 08 48 ]
    ffffa16ba6799896-ffffa16ba67998b5  32 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+406 (+0x17)
    [ d6 2b 00 4c 8b 30 48 ba:48 0c 41 83 be 88 04 00 ]
    ffffa16ba67998b7-ffffa16ba67998da  36 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+427 (+0x21)
    [ 0f af c8 48 c1 e9 18 49:c1 ef 18 85 ff 0f 84 a6 ]
    ffffa16ba67998dc-ffffa16ba67998eb  16 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+44c (+0x25)
    [ 48 8b 18 41 8b 38 48 0f:00 00 0f 8c 8e 95 0e 00 ]
    ffffa16ba67998ed-ffffa16ba67998f4  8 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+45d (+0x11)
    [ 84 da 97 0e 00 48 8b cb:ba f0 22 48 89 83 c0 04 ]
    ffffa16ba6799901-ffffa16ba6799904  4 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+471 (+0x14)
    [ 89 bb 88 04:e8 1a bb 30 ]
    ffffa16ba6799906-ffffa16ba6799909  4 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+476 (+0x05)
    [ 00 83 bb e0:49 8b 86 b8 ]
    ffffa16ba679990d-ffffa16ba6799929  29 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+47d (+0x07)
    [ 00 0f 8c c2 97 0e 00 48:66 89 70 0a 41 81 a6 c0 ]
    ffffa16ba6799936-ffffa16ba6799946  17 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4a6 (+0x29)
    [ 49 8b 86 b8 01 00 00 66:95 0e 00 48 8b cf 4c 8b ]
    ffffa16ba6799948-ffffa16ba679994c  5 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4b8 (+0x12)
    [ ff fb ff ff 65:48 85 c0 74 03 ]
    ffffa16ba679994f-ffffa16ba6799954  6 bytes - win32kfull!NtUserMsgWaitForMultipleObjectsEx+4bf (+0x07)
    [ 3c 25 88 01 00 00:30 48 8b 44 24 50 ]
    ffffa16ba683fc22-ffffa16ba683fc46  37 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+8e (+0xa62d3)
    [ 48 89 4c 24 50 8b bc 24:8b d8 85 c0 78 0c 40 84 ]
    ffffa16ba683fc48 - win32kfull!xxxMsgWaitForMultipleObjectsEx+b4 (+0x26)
    [ 64:ac ]
    ffffa16ba683fc4a-ffffa16ba683fc55  12 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+b6 (+0x02)
    [ 44 48 89 74 24 30 44 8b:c0 00 00 00 44 8b 64 24 ]
    ffffa16ba683fc57-ffffa16ba683fc65  15 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+c3 (+0x0d)
    [ 28 41 b0 01 49 8b d5 c6:b0 00 00 00 45 85 ff 75 ]
    ffffa16ba683fc72-ffffa16ba683fc8a  25 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+de (+0x1b)
    [ 8b d8 85 c0 78 0c 40 84:58 b9 03 00 00 00 48 8b ]
    ffffa16ba683fc97-ffffa16ba683fcb4  30 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+103 (+0x25)
    [ 8b ac 24 c0 00 00 00 44:0f 84 0d ff ff ff 85 db ]
    ffffa16ba683fcb6-ffffa16ba683fcb8  3 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+122 (+0x1f)
    [ 86 b8 eb:76 24 ef ]
    ffffa16ba683fcba-ffffa16ba683fcf6  61 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+126 (+0x04)
    [ 85 c0 74 2f 48 8b 44 24:83 c8 ff 48 83 c4 68 41 ]
    ffffa16ba683fd03-ffffa16ba683fd1d  27 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+16f (+0x49)
    [ 8b c8 e8 36 24 ef ff 83:28 48 8b 09 4c 8b 15 32 ]
    ffffa16ba683fd20-ffffa16ba683fd21  2 bytes - win32kfull!xxxMsgWaitForMultipleObjectsEx+18c (+0x1d)
    [ cc cc:48 89 ]
    ffffa16ba6a36bd4 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bd4)
    [ 90:60 ]
    ffffa16ba6a36bd8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bd8) (+0x04)
    [ d2:a2 ]
    ffffa16ba6a36bdc - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bdc) (+0x04)
    [ dc:ec ]
    ffffa16ba6a36be0 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be0) (+0x04)
    [ e0:b0 ]
    ffffa16ba6a36be4-ffffa16ba6a36be5  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be4) (+0x04)
    [ 10 9d:e0 9c ]
    ffffa16ba6a36be8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346be8) (+0x04)
    [ 20:30 ]
    ffffa16ba6a36bec-ffffa16ba6a36bed  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bec) (+0x04)
    [ 20 9d:f0 9c ]
    ffffa16ba6a36bf0 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf0) (+0x04)
    [ 91:61 ]
    ffffa16ba6a36bf4 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf4) (+0x04)
    [ 6c:7c ]
    ffffa16ba6a36bf8 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bf8) (+0x04)
    [ a0:70 ]
    ffffa16ba6a36bfc - win32kfull!__PchSym_ <PERF> (win32kfull+0x346bfc) (+0x04)
    [ 6e:3e ]
    ffffa16ba6a36c00 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c00) (+0x04)
    [ c4:d4 ]
    ffffa16ba6a36c04 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c04) (+0x04)
    [ 80:50 ]
    ffffa16ba6a36c08 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c08) (+0x04)
    [ 51:21 ]
    ffffa16ba6a36c0c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c0c) (+0x04)
    [ 80:90 ]
    ffffa16ba6a36c10 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c10) (+0x04)
    [ 60:30 ]
    ffffa16ba6a36c14 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c14) (+0x04)
    [ e7:b7 ]
    ffffa16ba6a36c18 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c18) (+0x04)
    [ 98:a8 ]
    ffffa16ba6a36c1c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c1c) (+0x04)
    [ f0:c0 ]
    ffffa16ba6a36c20 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c20) (+0x04)
    [ a9:79 ]
    ffffa16ba6a36c24 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c24) (+0x04)
    [ a8:b8 ]
    ffffa16ba6a36c28 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c28) (+0x04)
    [ a9:79 ]
    ffffa16ba6a36c2c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c2c) (+0x04)
    [ 3a:0a ]
    ffffa16ba6a36c30 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c30) (+0x04)
    [ b8:c8 ]
    ffffa16ba6a36c34 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c34) (+0x04)
    [ 3a:0a ]
    ffffa16ba6a36c38 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c38) (+0x04)
    [ 39:09 ]
    ffffa16ba6a36c3c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c3c) (+0x04)
    [ cc:dc ]
    ffffa16ba6a36c40 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c40) (+0x04)
    [ 40:10 ]
    ffffa16ba6a36c44 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c44) (+0x04)
    [ 68:38 ]
    ffffa16ba6a36c48 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c48) (+0x04)
    [ 04:14 ]
    ffffa16ba6a36c4c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c4c) (+0x04)
    [ 70:40 ]
    ffffa16ba6a36c50 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c50) (+0x04)
    [ ef:bf ]
    ffffa16ba6a36c54 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c54) (+0x04)
    [ 6c:7c ]
    ffffa16ba6a36c58 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c58) (+0x04)
    [ f8:c8 ]
    ffffa16ba6a36c5c-ffffa16ba6a36c5d  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c5c) (+0x04)
    [ 05 ac:d5 ab ]
    ffffa16ba6a36c60 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c60) (+0x04)
    [ 94:a4 ]
    ffffa16ba6a36c64-ffffa16ba6a36c65  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c64) (+0x04)
    [ 0c ac:dc ab ]
    ffffa16ba6a36c68-ffffa16ba6a36c69  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c68) (+0x04)
    [ 2d ac:fd ab ]
    ffffa16ba6a36c6c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c6c) (+0x04)
    [ 64:74 ]
    ffffa16ba6a36c70 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c70) (+0x04)
    [ 34:04 ]
    ffffa16ba6a36c74 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c74) (+0x04)
    [ 84:54 ]
    ffffa16ba6a36c78 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c78) (+0x04)
    [ cc:dc ]
    ffffa16ba6a36c7c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c7c) (+0x04)
    [ 90:60 ]
    ffffa16ba6a36c80 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c80) (+0x04)
    [ 8b:5b ]
    ffffa16ba6a36c84 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c84) (+0x04)
    [ 34:44 ]
    ffffa16ba6a36c88 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c88) (+0x04)
    [ 94:64 ]
    ffffa16ba6a36c8c - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c8c) (+0x04)
    [ 79:49 ]
    ffffa16ba6a36c90-ffffa16ba6a36c91  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c90) (+0x04)
    [ f8 a7:08 a8 ]
    ffffa16ba6a36c94 - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c94) (+0x04)
    [ 80:50 ]
    ffffa16ba6a36c98-ffffa16ba6a36c99  2 bytes - win32kfull!__PchSym_ <PERF> (win32kfull+0x346c98) (+0x04)
    [ 16 e4:e6 e3 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
783 errors : !win32kfull (ffffa16ba679946b-ffffa16ba6a3eab8)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xfffffb8f07827f20 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffab81aabe7e70
Arg3: 00000000d1d64b08
Arg4: fffff8015a7fb346

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3983

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11120

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffab81aabe7e70

BUGCHECK_P3: d1d64b08

BUGCHECK_P4: fffff8015a7fb346

TRAP_FRAME:  ffffab81aabe7e70 -- (.trap 0xffffab81aabe7e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000102 rbx=0000000000000000 rcx=ffffd6855a6162e0
rdx=000000007457624f rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015a7fb346 rsp=00000000d1d64b08 rbp=ffff9309d1d64b80
r8=0000000100000045  r9=ffffab81aab80180 r10=0000000000000000
r11=fffff8015a200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ObWaitForSingleObject+0xc6:
fffff801`5a7fb346 415e            pop     r14
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

BAD_STACK_POINTER:  00000000d1d64b08

STACK_TEXT:
ffffab81`aabe7d28 fffff801`5a5ef929     : 00000000`0000007f 00000000`00000008 ffffab81`aabe7e70 00000000`d1d64b08 : nt!KeBugCheckEx
ffffab81`aabe7d30 fffff801`5a5ea743     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab81`aabe7e70 fffff801`5a7fb346     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`d1d64b08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0xc6


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2c3

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2c3

FAILURE_BUCKET_ID:  0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c5b9990d-856b-1bb5-7662-4621e5941c84}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000100000005d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80272817b17, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6268

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 100000005d

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80272817b17

READ_ADDRESS: fffff802732fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8027320f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8027320f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000100000005d

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RainbowSix.exe

TRAP_FRAME:  fffffe0b0211e4e0 -- (.trap 0xfffffe0b0211e4e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc800b7b0370 rbx=0000000000000000 rcx=d4be284b6a560000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80272817b17 rsp=fffffe0b0211e678 rbp=fffffe0b0211e560
r8=0000000000000000  r9=0000000fffffffff r10=ffffbf8000005bd0
r11=fffffff000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiGetPageChain+0x317:
fffff802`72817b17 415f            pop     r15
Resetting default scope

STACK_TEXT:
fffffe0b`0211e398 fffff802`729ef929     : 00000000`0000000a 00000010`0000005d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffe0b`0211e3a0 fffff802`729ebc29     : 00000000`00000000 00000000`00000000 00000000`003d3abd 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffffe0b`0211e4e0 fffff802`72817b17     : ffff8004`e674f700 00000000`00000040 0000025b`23430000 00000000`00000001 : nt!KiPageFault+0x469
fffffe0b`0211e678 fffff802`72815656     : 00000000`00000005 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetPageChain+0x317
fffffe0b`0211e6c0 fffff802`72821890     : ffff9081`a9c95180 00000000`00000000 ffffffff`ffffffff fffff802`73250ac0 : nt!MiResolvePrivateZeroFault+0x176
fffffe0b`0211e7e0 fffff802`72813382     : fffffe0b`0211ea20 fffffe0b`0211e960 fffffe0b`0211e970 fffffe0b`0211e908 : nt!MiZeroFault+0x380
fffffe0b`0211e8d0 fffff802`72812a4a     : ffff8004`e8dc8001 ffff8004`00000003 ffff9081`00000000 fffff802`729e4c32 : nt!MiUserFault+0x3c2
fffffe0b`0211e960 fffff802`729ebb1e     : ffff8004`e783e080 ffff8004`e62c86e0 00000000`00000000 ffff8004`00000000 : nt!MmAccessFault+0x16a
fffffe0b`0211eb00 00007ff7`4f014b12     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000ca`015fe860 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`4f014b12


SYMBOL_NAME:  nt!MiGetPageChain+317

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  317

FAILURE_BUCKET_ID:  AV_nt!MiGetPageChain

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0e6728ab-cf4f-0ce6-a21d-b2680731698a}

Followup:     MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8055dcfa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7514

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10580

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8055dcfa318

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffffdb0bfca29630 -- (.trap 0xffffdb0bfca29630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000634bd4c4 rbx=0000000000000000 rcx=ffffdb0bfca29820
rdx=ffffdb0bfca29840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8055d233395 rsp=ffffdb0bfca297c0 rbp=ffffdb0bfca29960
r8=ffff9600aa9e6280  r9=0000000000000000 r10=0000fffff8055d9b
r11=ffff85fcc4a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x15:
fffff805`5d233395 f390            pause
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff9600`aa3f9e18 fffff805`5d4593ee     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9600`aa3f9e20 fffff805`5d2ca2ed     : 00004263`5c669e20 00000000`00000000 ffffdb0b`fca29600 ffff9600`aa9e6180 : nt!KeAccumulateTicks+0x18bf6e
ffff9600`aa3f9e80 fffff805`5d2ca16a     : ffffcb05`e74c7480 ffffdb0b`fca296b0 fffff805`0014fe2b 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
ffff9600`aa3f9f30 fffff805`5d208705     : ffffcb05`e74c7480 00000000`00000000 00000000`00000000 ffff59d8`7c552baa : nt!HalpTimerClockIpiRoutine+0x1a
ffff9600`aa3f9f60 fffff805`5d3df4ca     : ffffdb0b`fca296b0 ffffcb05`e74c7480 00004253`8cd78a5e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9600`aa3f9fb0 fffff805`5d3dfa37     : 00000032`01166a3f fffff805`625796af ffffdb0b`fca29840 fffff805`5d3dfa44 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffdb0b`fca29630 fffff805`5d233395     : 00000000`00000010 00000000`00000246 ffffdb0b`fca297e8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffdb0b`fca297c0 fffff805`5d9ba819     : 00000000`00000002 00000000`00000000 ffff9600`aa9e6180 00000000`00000001 : nt!KeYieldProcessorEx+0x15
ffffdb0b`fca297f0 fffff805`5d9b90f5     : 00000000`634bd4c4 ffff9600`aa9e6180 ffffcb05`f2c77140 00000000`00000000 : nt!IopLiveDumpProcessCorralStateChange+0x2d
ffffdb0b`fca29820 fffff805`5d23a69e     : ffff9600`aa9e9240 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopLiveDumpCorralDpc+0x55
ffffdb0b`fca29860 fffff805`5d239984     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffdb0b`fca299d0 fffff805`5d3e158e     : ffffffff`00000000 ffff9600`aa9e6180 ffff9600`aa9f1340 ffffcb05`f12a5080 : nt!KiRetireDpcList+0x1f4
ffffdb0b`fca29c60 00000000`00000000     : ffffdb0b`fca2a000 ffffdb0b`fca24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KeAccumulateTicks+18bf6e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18bf6e

FAILURE_BUCKET_ID:  0x133_DPC_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {88dc98ce-f842-4daa-98d0-858621db6b0f}

Followup:     MachineOwner
---------
@Recep Baltaş hocam merhaba . İlk yazımda sizi etiketlemeyi unuttum . Dediğiniz gibi yeni almış olduğum RAM çıkarttım ve 5-6 gün sorunsuz bilgisayarı kullandım ve sonra yine mavi ekran hatası almıştım . Minidump dosyası : 080320-6812-01
İnternette araştırdığımda ekran kartın yazılımından kaynaklı olduğunu söyleniyordu bu sefer . Bende
bu sefer bilgisayarı temiz format atıp Ekran kartın Driveri , ana kartın Driverlerini ve sonra Chipset Driverini ( AMD Socket AM4 - B450 ) Ana kart için AMD sitesinden en güncel sürümü indirip kurdum . Şuan tam olarak 7 gündür bilgisayarı kullanıyorum ve herhangi bir hata ile karşılaşmadım . Bu arada 8GB RAM ile kullanıyorum bilgisayarı . Üstte kit bellek al demişsiniz , şuan bilgisayarımda olan RAM ile aynısını al mı demek istediniz yoksa Dual 2x8 RAM al mı demek istediniz ? Eğer 2x8 RAM ise 750TL bütçem var . sizin önerebileceğiniz ve bildiğiniz , benim Ana kartım ile sorunsuz çalışabileceği RAM varsa yazarsanız ya da link bırakırsınız çok sevinirim .
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı