Valorant indirdikten sonra mavi ekran hatası

shdeniz

Hectopat
Katılım
7 Nisan 2019
Mesajlar
114
Merhaba, normalde mavi ekran hatası almıyorum. Ama bugün Valorant indirdikten sonra bilgisayarı yeniden başlat dedi. Yeniden başlatınca ise mavi ekran hatası aldım. Oyunu açmaya çalışınca yine mavi ekran hatası alıyorum. Bu sorunu nasıl çözebilirim? Minidump dosyalarını Google Drive'dan yüklemeye çalışınca bu dosya virüslü diyor.
 
Son düzenleme:
Son 12 dosyanıza baktım, hepsi Vanguard kaynaklı. Devamına bakmadım.

Sanırım bir kablosuz adaptör kullanıyorsunuz. Mümkünse adaptörü çıkarıp sürücüsünü kaldırıp kablolu bağlanmayı deneyin.

Ayrıca Windows ve BIOS'unuz güncel değil, ikisini de güncellemeniz iyi olacaktır.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801393a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2390

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6830

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff801393a9a67

READ_ADDRESS: fffff801397733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8013962a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8013962a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff838082206fe0 -- (.trap 0xffff838082206fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff838082207250
rdx=ffffd6855dc64890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801393a9a67 rsp=ffff838082207170 rbp=ffff8380822071e9
r8=ffffd6855dc64860  r9=0000000000000003 r10=0000000000000000
r11=ffff8380822073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff801`393a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffff8380`82206e98 fffff801`393d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8380`82206ea0 fffff801`393d0529     : 00000000`ffff8001 ffffd685`5dc93e30 ffffd685`00000000 ffffd685`5dc93e30 : nt!KiBugCheckDispatch+0x69
ffff8380`82206fe0 fffff801`393a9a67     : 00000000`00000000 ffffd685`5dc64040 ffffd685`5dc64040 fffff801`393d3c15 : nt!KiPageFault+0x469
ffff8380`82207170 fffff801`393c8308     : ffff8380`82207250 7fffd685`5dc93e40 ffff8380`822072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8380`82207250 fffff801`4069154f     : fffff801`40b732c0 00000000`00000000 ffffffff`800001b8 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8380`822073e8 fffff801`40b732c0     : 00000000`00000000 ffffffff`800001b8 00000000`00000008 ffffd685`5eb09d60 : vgk+0x154f
ffff8380`822073f0 00000000`00000000     : ffffffff`800001b8 00000000`00000008 ffffd685`5eb09d60 fffff801`39829060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804529a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6917

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804529a9a67

READ_ADDRESS: fffff80452d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80452c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80452c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd784dea06fe0 -- (.trap 0xffffd784dea06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd784dea07250
rdx=ffff80068986bdd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804529a9a67 rsp=ffffd784dea07170 rbp=ffffd784dea071e9
r8=ffff80068986bda0  r9=0000000000000003 r10=0000000000000000
r11=ffffd784dea073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff804`529a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffffd784`dea06e98 fffff804`529d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd784`dea06ea0 fffff804`529d0529     : 00000000`ffff8001 ffff8006`89893070 ffff8006`00000000 ffff8006`89893070 : nt!KiBugCheckDispatch+0x69
ffffd784`dea06fe0 fffff804`529a9a67     : 00000000`00000000 ffff8006`8986b580 ffff8006`8986b580 fffff804`529d3c15 : nt!KiPageFault+0x469
ffffd784`dea07170 fffff804`529c8308     : ffffd784`dea07250 7fff8006`89893080 ffffd784`dea072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd784`dea07250 fffff804`5985154f     : fffff804`59d332c0 00000000`00000000 ffffffff`8000020c 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd784`dea073e8 fffff804`59d332c0     : 00000000`00000000 ffffffff`8000020c 00000000`00000008 ffff8006`8b9998f0 : vgk+0x154f
ffffd784`dea073f0 00000000`00000000     : ffffffff`8000020c 00000000`00000008 ffff8006`8b9998f0 fffff804`52e29060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805049a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6618

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff805049a9a67

READ_ADDRESS: fffff80504d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80504c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80504c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc18803a06fe0 -- (.trap 0xffffc18803a06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffc18803a07250
rdx=ffff9c0290a618d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805049a9a67 rsp=ffffc18803a07170 rbp=ffffc18803a071e9
r8=ffff9c0290a618a0  r9=0000000000000003 r10=0000000000000000
r11=ffffc18803a073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff805`049a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffffc188`03a06e98 fffff805`049d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc188`03a06ea0 fffff805`049d0529     : 00000000`ffff8001 ffff9c02`90a931b0 ffff9c02`00000000 ffff9c02`90a931b0 : nt!KiBugCheckDispatch+0x69
ffffc188`03a06fe0 fffff805`049a9a67     : 00000000`00000000 ffff9c02`90a61080 ffff9c02`90a61080 fffff805`049d3c15 : nt!KiPageFault+0x469
ffffc188`03a07170 fffff805`049c8308     : ffffc188`03a07250 7fff9c02`90a931c0 ffffc188`03a072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffc188`03a07250 fffff805`0a20154f     : fffff805`0a6e32c0 00000000`00000000 ffffffff`800001bc 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffc188`03a073e8 fffff805`0a6e32c0     : 00000000`00000000 ffffffff`800001bc 00000000`00000008 ffff9c02`92fb9e00 : vgk+0x154f
ffffc188`03a073f0 00000000`00000000     : ffffffff`800001bc 00000000`00000008 ffff9c02`92fb9e00 fffff805`04e29060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802175a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2874

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7166

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802175a9a67

READ_ADDRESS: fffff802179733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8021782a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8021782a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd6081a606fe0 -- (.trap 0xffffd6081a606fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd6081a607250
rdx=ffff870cde261b90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802175a9a67 rsp=ffffd6081a607170 rbp=ffffd6081a6071e9
r8=ffff870cde261b60  r9=0000000000000003 r10=0000000000000000
r11=ffffd6081a6073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff802`175a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffffd608`1a606e98 fffff802`175d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd608`1a606ea0 fffff802`175d0529     : 00000000`ffff8001 ffff870c`de293f70 ffff870c`00000000 ffff870c`de293f70 : nt!KiBugCheckDispatch+0x69
ffffd608`1a606fe0 fffff802`175a9a67     : 00000000`00000000 ffff870c`de261340 ffff870c`de261340 fffff802`175d3c15 : nt!KiPageFault+0x469
ffffd608`1a607170 fffff802`175c8308     : ffffd608`1a607250 7fff870c`de293f80 ffffd608`1a6072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd608`1a607250 fffff802`1e38154f     : fffff802`1e8632c0 00000000`00000000 ffffffff`80000198 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd608`1a6073e8 fffff802`1e8632c0     : 00000000`00000000 ffffffff`80000198 00000000`00000008 ffff870c`e043ce10 : vgk+0x154f
ffffd608`1a6073f0 00000000`00000000     : ffffffff`80000198 00000000`00000008 ffff870c`e043ce10 fffff802`17a29060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804481a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2858

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6856

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804481a9a67

READ_ADDRESS: fffff804485733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044842a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8044842a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff48572a06fe0 -- (.trap 0xfffff48572a06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=fffff48572a07250
rdx=ffff9f0fd066fb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804481a9a67 rsp=fffff48572a07170 rbp=fffff48572a071e9
r8=ffff9f0fd066fb20  r9=0000000000000003 r10=0000000000000000
r11=fffff48572a073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff804`481a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
fffff485`72a06e98 fffff804`481d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff485`72a06ea0 fffff804`481d0529     : 00000000`ffff8001 ffff9f0f`d06982f0 ffff9f0f`00000000 ffff9f0f`d06982f0 : nt!KiBugCheckDispatch+0x69
fffff485`72a06fe0 fffff804`481a9a67     : 00000000`00000000 ffff9f0f`d066f300 ffff9f0f`d066f300 fffff804`481d3c15 : nt!KiPageFault+0x469
fffff485`72a07170 fffff804`481c8308     : fffff485`72a07250 7fff9f0f`d0698300 fffff485`72a072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
fffff485`72a07250 fffff804`4de0154f     : fffff804`4e2e32c0 00000000`00000000 ffffffff`8000019c 00000000`00000008 : nt!KiSwInterrupt+0x368
fffff485`72a073e8 fffff804`4e2e32c0     : 00000000`00000000 ffffffff`8000019c 00000000`00000008 ffff9f0f`d276dd40 : vgk+0x154f
fffff485`72a073f0 00000000`00000000     : ffffffff`8000019c 00000000`00000008 ffff9f0f`d276dd40 fffff804`48629060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803479a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2765

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7111

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803479a9a67

READ_ADDRESS: fffff80347d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80347c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80347c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff95086b206fe0 -- (.trap 0xffff95086b206fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff95086b207250
rdx=ffffe10ae7e64890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803479a9a67 rsp=ffff95086b207170 rbp=ffff95086b2071e9
r8=ffffe10ae7e64860  r9=0000000000000003 r10=0000000000000000
r11=ffff95086b2073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff803`479a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffff9508`6b206e98 fffff803`479d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9508`6b206ea0 fffff803`479d0529     : 00000000`ffff8001 ffffe10a`e7e93c50 ffffe10a`00000000 ffffe10a`e7e93c50 : nt!KiBugCheckDispatch+0x69
ffff9508`6b206fe0 fffff803`479a9a67     : 00000000`00000000 ffffe10a`e7e64040 ffffe10a`e7e64040 fffff803`479d3c15 : nt!KiPageFault+0x469
ffff9508`6b207170 fffff803`479c8308     : ffff9508`6b207250 7fffe10a`e7e93c60 ffff9508`6b2072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff9508`6b207250 fffff803`4b84154f     : fffff803`4bd232c0 00000000`00000000 ffffffff`80000284 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff9508`6b2073e8 fffff803`4bd232c0     : 00000000`00000000 ffffffff`80000284 00000000`00000008 ffffe10a`eb043d10 : vgk+0x154f
ffff9508`6b2073f0 00000000`00000000     : ffffffff`80000284 00000000`00000008 ffffe10a`eb043d10 fffff803`47e29060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8033c3a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7624

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8033c3a9a67

READ_ADDRESS: fffff8033c7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033c62a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8033c62a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd10966006fe0 -- (.trap 0xffffd10966006fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd10966007250
rdx=ffff88022e47cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033c3a9a67 rsp=ffffd10966007170 rbp=ffffd109660071e9
r8=ffff88022e47cd60  r9=0000000000000003 r10=0000000000000000
r11=ffffd109660073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff803`3c3a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffffd109`66006e98 fffff803`3c3d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd109`66006ea0 fffff803`3c3d0529     : 00000000`ffff8001 ffff8802`2e4989d0 ffff8802`00000000 ffff8802`2e4989d0 : nt!KiBugCheckDispatch+0x69
ffffd109`66006fe0 fffff803`3c3a9a67     : 00000000`00000000 ffff8802`2e47c540 ffff8802`2e47c540 fffff803`3c3d3c15 : nt!KiPageFault+0x469
ffffd109`66007170 fffff803`3c3c8308     : ffffd109`66007250 ffffd109`660074f0 ffffd109`660072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd109`66007250 fffff803`42a0154f     : fffff803`42f2f9d5 00000000`00000000 ffffffff`80000288 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd109`660073e8 fffff803`42f2f9d5     : 00000000`00000000 ffffffff`80000288 00000000`00000008 00000000`00000000 : vgk+0x154f
ffffd109`660073f0 00000000`00000000     : ffffffff`80000288 00000000`00000008 00000000`00000000 fffff803`3c829060 : vgk+0x52f9d5


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8033c3a95f6-fffff8033c3a95fb  6 bytes - nt!KiLockExtendedServiceTable+8ee
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff8033c3a99da-fffff8033c3a99df  6 bytes - nt!KiMarkBugCheckRegions+3de (+0x3e4)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff8033c3a9a3a-fffff8033c3a9a3f  6 bytes - nt!KiMarkBugCheckRegions+43e (+0x60)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff8033c3c236a-fffff8033c3c236b  2 bytes - nt!ZwLoadKey3+2a (+0x18930)
    [ 84 00:4c 87 ]
    fffff8033c3c236d-fffff8033c3c236f  3 bytes - nt!ZwLoadKey3+2d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c238a-fffff8033c3c238b  2 bytes - nt!KiBugCheckReturn+16 (+0x1d)
    [ 84 00:4c 87 ]
    fffff8033c3c238d-fffff8033c3c238f  3 bytes - nt!KiBugCheckReturn+19 (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c24ba-fffff8033c3c24bb  2 bytes - nt!KeBugCheckEx+12a (+0x12d)
    [ 84 00:4c 87 ]
    fffff8033c3c24bd-fffff8033c3c24bf  3 bytes - nt!KeBugCheckEx+12d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c25ba-fffff8033c3c25bb  2 bytes - nt!KeContextToKframes+fa (+0xfd)
    [ 84 00:4c 87 ]
    fffff8033c3c25bd-fffff8033c3c25bf  3 bytes - nt!KeContextToKframes+fd (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c260a-fffff8033c3c260b  2 bytes - nt!KiSaveInitialProcessorControlState+4a (+0x4d)
    [ 84 00:4c 87 ]
    fffff8033c3c260d-fffff8033c3c260f  3 bytes - nt!KiSaveInitialProcessorControlState+4d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c26da-fffff8033c3c26df  6 bytes - nt!KiRestoreProcessorControlState+ca (+0xcd)
    [ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
    fffff8033c3c285a-fffff8033c3c285b  2 bytes - nt!KiSaveProcessorControlState+17a (+0x180)
    [ 84 00:4c 87 ]
    fffff8033c3c285d-fffff8033c3c285f  3 bytes - nt!KiSaveProcessorControlState+17d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c28da-fffff8033c3c28df  6 bytes - nt!KiRestoreDebugRegisterState+7a (+0x7d)
    [ cc 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
    fffff8033c3c2a6a-fffff8033c3c2a6b  2 bytes - nt!KiSaveDebugRegisterState+18a (+0x190)
    [ 84 00:4c 87 ]
    fffff8033c3c2a6d-fffff8033c3c2a6f  3 bytes - nt!KiSaveDebugRegisterState+18d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c2a7a-fffff8033c3c2a7f  6 bytes - nt!KeGetCurrentStackPointer+a (+0x0d)
    [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
    fffff8033c3c2a8a-fffff8033c3c2a8b  2 bytes - nt!KeResetLegacyFloatingPointState+a (+0x10)
    [ 1f 80:4c 87 ]
    fffff8033c3c2a8d-fffff8033c3c2a8f  3 bytes - nt!KeResetLegacyFloatingPointState+d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c2a9a-fffff8033c3c2a9f  6 bytes - nt!KeSaveLegacyFloatingPointControlWord+a (+0x0d)
    [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
    fffff8033c3c2aba-fffff8033c3c2abb  2 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1a (+0x20)
    [ 84 00:4c 87 ]
    fffff8033c3c2abd-fffff8033c3c2abf  3 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff8033c3c2d7a-fffff8033c3c2d7f  6 bytes - nt!NtContinue+2ba (+0x2bd)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
93 errors : !nt (fffff8033c3a95f6-fffff8033c3c2d7f)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805291a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6688

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff805291a9a67

READ_ADDRESS: fffff805295733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8052942a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8052942a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffb08bb5e06fe0 -- (.trap 0xffffb08bb5e06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffb08bb5e07250
rdx=ffff818de4c7cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805291a9a67 rsp=ffffb08bb5e07170 rbp=ffffb08bb5e071e9
r8=ffff818de4c7cd60  r9=0000000000000003 r10=0000000000000000
r11=ffffb08bb5e073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff805`291a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffffb08b`b5e06e98 fffff805`291d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb08b`b5e06ea0 fffff805`291d0529     : 00000000`ffff8001 ffff818d`e4c98cf0 ffff818d`00000000 ffff818d`e4c98cf0 : nt!KiBugCheckDispatch+0x69
ffffb08b`b5e06fe0 fffff805`291a9a67     : 00000000`00000000 ffff818d`e4c7c540 ffff818d`e4c7c540 fffff805`291d3c15 : nt!KiPageFault+0x469
ffffb08b`b5e07170 fffff805`291c8308     : ffffb08b`b5e07250 7fff818d`e4c98d00 ffffb08b`b5e072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffb08b`b5e07250 fffff805`2be0154f     : fffff805`2c2e32c0 00000000`00000000 ffffffff`800002a4 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffb08b`b5e073e8 fffff805`2c2e32c0     : 00000000`00000000 ffffffff`800002a4 00000000`00000008 ffff818d`e5e89d40 : vgk+0x154f
ffffb08b`b5e073f0 00000000`00000000     : ffffffff`800002a4 00000000`00000008 ffff818d`e5e89d40 fffff805`29629060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803441a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3796

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9923

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803441a9a67

READ_ADDRESS: fffff803445733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034442a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8034442a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffea0c71fe7000 -- (.trap 0xffffea0c71fe7000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000022000 rbx=0000000000000000 rcx=ffffea0c71fe7270
rdx=ffffd503e4dd7890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803441a9a67 rsp=ffffea0c71fe7190 rbp=ffffea0c71fe7209
r8=ffffd503e4dd7860  r9=0000000000000003 r10=0000000000000000
r11=ffffea0c71fe73e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff803`441a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffffea0c`71fe6eb8 fffff803`441d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffea0c`71fe6ec0 fffff803`441d0529     : 00000000`ffff8001 ffffd503`da8931b0 ffffd503`00000000 ffffd503`da8931b0 : nt!KiBugCheckDispatch+0x69
ffffea0c`71fe7000 fffff803`441a9a67     : 00000000`00000000 ffffd503`e4dd7040 ffffd503`e4dd7040 fffff803`441d3c15 : nt!KiPageFault+0x469
ffffea0c`71fe7190 fffff803`441c8308     : ffffea0c`71fe7270 ffffea0c`71fe7510 ffffea0c`71fe72f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffea0c`71fe7270 fffff803`44c0154f     : fffff803`4512f9d5 00000000`00000000 ffffffff`80003454 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffea0c`71fe7408 fffff803`4512f9d5     : 00000000`00000000 ffffffff`80003454 00000000`00000008 00000000`00000000 : vgk+0x154f
ffffea0c`71fe7410 00000000`00000000     : ffffffff`80003454 00000000`00000008 00000000`00000000 fffff803`44629060 : vgk+0x52f9d5


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803791a9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7349

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803791a9a67

READ_ADDRESS: fffff803795733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037942a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8037942a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff858c73406fe0 -- (.trap 0xffff858c73406fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff858c73407250
rdx=ffffc584bb67cb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803791a9a67 rsp=ffff858c73407170 rbp=ffff858c734071e9
r8=ffffc584bb67cb20  r9=0000000000000003 r10=0000000000000000
r11=ffff858c734073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff803`791a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffff858c`73406e98 fffff803`791d41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff858c`73406ea0 fffff803`791d0529     : 00000000`ffff8001 ffffc584`bb698430 ffffc584`00000000 ffffc584`bb698430 : nt!KiBugCheckDispatch+0x69
ffff858c`73406fe0 fffff803`791a9a67     : 00000000`00000000 ffffc584`bb67c300 ffffc584`bb67c300 fffff803`791d3c15 : nt!KiPageFault+0x469
ffff858c`73407170 fffff803`791c8308     : ffff858c`73407250 7fffc584`bb698440 ffff858c`734072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff858c`73407250 fffff803`7cc0154f     : fffff803`7d0e32c0 00000000`00000000 ffffffff`80000278 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff858c`734073e8 fffff803`7d0e32c0     : 00000000`00000000 ffffffff`80000278 00000000`00000008 ffffc584`bd508dc0 : vgk+0x154f
ffff858c`734073f0 00000000`00000000     : ffffffff`80000278 00000000`00000008 ffffc584`bd508dc0 fffff803`79629060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80538fa9a67, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9780

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80538fa9a67

READ_ADDRESS: fffff805393733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053922a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8053922a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffb6814e806fe0 -- (.trap 0xffffb6814e806fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffb6814e807250
rdx=ffffd001f807cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80538fa9a67 rsp=ffffb6814e807170 rbp=ffffb6814e8071e9
r8=ffffd001f807cd60  r9=0000000000000003 r10=0000000000000000
r11=ffffb6814e8073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwInterruptDispatch+0x27:
fffff805`38fa9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT:
ffffb681`4e806e98 fffff805`38fd41e9     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb681`4e806ea0 fffff805`38fd0529     : 00000000`ffff8001 ffffd001`f8098d90 ffffd001`00000000 ffffd001`f8098d90 : nt!KiBugCheckDispatch+0x69
ffffb681`4e806fe0 fffff805`38fa9a67     : 00000000`00000000 ffffd001`f807c540 ffffd001`f807c540 fffff805`38fd3c15 : nt!KiPageFault+0x469
ffffb681`4e807170 fffff805`38fc8308     : ffffb681`4e807250 7fffd001`f8098da0 ffffb681`4e8072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffb681`4e807250 fffff805`3cc0154f     : fffff805`3d0e32c0 00000000`00000000 ffffffff`80000190 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffb681`4e8073e8 fffff805`3d0e32c0     : 00000000`00000000 ffffffff`80000190 00000000`00000008 ffffd001`fb5d2dc0 : vgk+0x154f
ffffb681`4e8073f0 00000000`00000000     : ffffffff`80000190 00000000`00000008 ffffd001`fb5d2dc0 fffff805`39429060 : vgk+0x4e32c0


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

Sorununuz çözülürse belirtin, çözülmezse yeni dosyaları paylaşın.
 
Son düzenleme:
Son 12 dosyanıza baktım, hepsi Vanguard kaynaklı. Devamına bakmadım.

Sanırım bir USB kablosuz adaptör kullanıyorsunuz. Mümkünse adaptörü çıkarıp sürücüsünü kaldırıp kablolu bağlanmayı deneyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801393a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2390.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 6830.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff801393a9a67.

READ_ADDRESS: fffff801397733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8013962a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8013962a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffff838082206fe0 -- (.trap 0xffff838082206fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff838082207250
rdx=ffffd6855dc64890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801393a9a67 rsp=ffff838082207170 rbp=ffff8380822071e9
r8=ffffd6855dc64860 r9=0000000000000003 r10=0000000000000000
r11=ffff8380822073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff801`393a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffff8380`82206e98 fffff801`393d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8380`82206ea0 fffff801`393d0529 : 00000000`ffff8001 ffffd685`5dc93e30 ffffd685`00000000 ffffd685`5dc93e30 : nt!KiBugCheckDispatch+0x69
ffff8380`82206fe0 fffff801`393a9a67 : 00000000`00000000 ffffd685`5dc64040 ffffd685`5dc64040 fffff801`393d3c15 : nt!KiPageFault+0x469
ffff8380`82207170 fffff801`393c8308 : ffff8380`82207250 7fffd685`5dc93e40 ffff8380`822072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8380`82207250 fffff801`4069154f : fffff801`40b732c0 00000000`00000000 ffffffff`800001b8 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8380`822073e8 fffff801`40b732c0 : 00000000`00000000 ffffffff`800001b8 00000000`00000008 ffffd685`5eb09d60 : vgk+0x154f
ffff8380`822073f0 00000000`00000000 : ffffffff`800001b8 00000000`00000008 ffffd685`5eb09d60 fffff801`39829060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804529a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2468.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 6917.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804529a9a67.

READ_ADDRESS: fffff80452d733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80452c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80452c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffd784dea06fe0 -- (.trap 0xffffd784dea06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd784dea07250
rdx=ffff80068986bdd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804529a9a67 rsp=ffffd784dea07170 rbp=ffffd784dea071e9
r8=ffff80068986bda0 r9=0000000000000003 r10=0000000000000000
r11=ffffd784dea073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff804`529a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffffd784`dea06e98 fffff804`529d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd784`dea06ea0 fffff804`529d0529 : 00000000`ffff8001 ffff8006`89893070 ffff8006`00000000 ffff8006`89893070 : nt!KiBugCheckDispatch+0x69
ffffd784`dea06fe0 fffff804`529a9a67 : 00000000`00000000 ffff8006`8986b580 ffff8006`8986b580 fffff804`529d3c15 : nt!KiPageFault+0x469
ffffd784`dea07170 fffff804`529c8308 : ffffd784`dea07250 7fff8006`89893080 ffffd784`dea072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd784`dea07250 fffff804`5985154f : fffff804`59d332c0 00000000`00000000 ffffffff`8000020c 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd784`dea073e8 fffff804`59d332c0 : 00000000`00000000 ffffffff`8000020c 00000000`00000008 ffff8006`8b9998f0 : vgk+0x154f
ffffd784`dea073f0 00000000`00000000 : ffffffff`8000020c 00000000`00000008 ffff8006`8b9998f0 fffff804`52e29060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805049a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2687.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 6618.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff805049a9a67.

READ_ADDRESS: fffff80504d733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80504c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80504c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffc18803a06fe0 -- (.trap 0xffffc18803a06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffc18803a07250
rdx=ffff9c0290a618d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805049a9a67 rsp=ffffc18803a07170 rbp=ffffc18803a071e9
r8=ffff9c0290a618a0 r9=0000000000000003 r10=0000000000000000
r11=ffffc18803a073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff805`049a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffffc188`03a06e98 fffff805`049d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc188`03a06ea0 fffff805`049d0529 : 00000000`ffff8001 ffff9c02`90a931b0 ffff9c02`00000000 ffff9c02`90a931b0 : nt!KiBugCheckDispatch+0x69
ffffc188`03a06fe0 fffff805`049a9a67 : 00000000`00000000 ffff9c02`90a61080 ffff9c02`90a61080 fffff805`049d3c15 : nt!KiPageFault+0x469
ffffc188`03a07170 fffff805`049c8308 : ffffc188`03a07250 7fff9c02`90a931c0 ffffc188`03a072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffc188`03a07250 fffff805`0a20154f : fffff805`0a6e32c0 00000000`00000000 ffffffff`800001bc 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffc188`03a073e8 fffff805`0a6e32c0 : 00000000`00000000 ffffffff`800001bc 00000000`00000008 ffff9c02`92fb9e00 : vgk+0x154f
ffffc188`03a073f0 00000000`00000000 : ffffffff`800001bc 00000000`00000008 ffff9c02`92fb9e00 fffff805`04e29060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802175a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2874.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 7166.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802175a9a67.

READ_ADDRESS: fffff802179733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8021782a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8021782a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffd6081a606fe0 -- (.trap 0xffffd6081a606fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd6081a607250
rdx=ffff870cde261b90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802175a9a67 rsp=ffffd6081a607170 rbp=ffffd6081a6071e9
r8=ffff870cde261b60 r9=0000000000000003 r10=0000000000000000
r11=ffffd6081a6073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff802`175a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffffd608`1a606e98 fffff802`175d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd608`1a606ea0 fffff802`175d0529 : 00000000`ffff8001 ffff870c`de293f70 ffff870c`00000000 ffff870c`de293f70 : nt!KiBugCheckDispatch+0x69
ffffd608`1a606fe0 fffff802`175a9a67 : 00000000`00000000 ffff870c`de261340 ffff870c`de261340 fffff802`175d3c15 : nt!KiPageFault+0x469
ffffd608`1a607170 fffff802`175c8308 : ffffd608`1a607250 7fff870c`de293f80 ffffd608`1a6072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd608`1a607250 fffff802`1e38154f : fffff802`1e8632c0 00000000`00000000 ffffffff`80000198 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd608`1a6073e8 fffff802`1e8632c0 : 00000000`00000000 ffffffff`80000198 00000000`00000008 ffff870c`e043ce10 : vgk+0x154f
ffffd608`1a6073f0 00000000`00000000 : ffffffff`80000198 00000000`00000008 ffff870c`e043ce10 fffff802`17a29060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804481a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2858.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 6856.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff804481a9a67.

READ_ADDRESS: fffff804485733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8044842a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8044842a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: fffff48572a06fe0 -- (.trap 0xfffff48572a06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=fffff48572a07250
rdx=ffff9f0fd066fb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804481a9a67 rsp=fffff48572a07170 rbp=fffff48572a071e9
r8=ffff9f0fd066fb20 r9=0000000000000003 r10=0000000000000000
r11=fffff48572a073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff804`481a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
fffff485`72a06e98 fffff804`481d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff485`72a06ea0 fffff804`481d0529 : 00000000`ffff8001 ffff9f0f`d06982f0 ffff9f0f`00000000 ffff9f0f`d06982f0 : nt!KiBugCheckDispatch+0x69
fffff485`72a06fe0 fffff804`481a9a67 : 00000000`00000000 ffff9f0f`d066f300 ffff9f0f`d066f300 fffff804`481d3c15 : nt!KiPageFault+0x469
fffff485`72a07170 fffff804`481c8308 : fffff485`72a07250 7fff9f0f`d0698300 fffff485`72a072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
fffff485`72a07250 fffff804`4de0154f : fffff804`4e2e32c0 00000000`00000000 ffffffff`8000019c 00000000`00000008 : nt!KiSwInterrupt+0x368
fffff485`72a073e8 fffff804`4e2e32c0 : 00000000`00000000 ffffffff`8000019c 00000000`00000008 ffff9f0f`d276dd40 : vgk+0x154f
fffff485`72a073f0 00000000`00000000 : ffffffff`8000019c 00000000`00000008 ffff9f0f`d276dd40 fffff804`48629060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803479a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2765.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 7111.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803479a9a67.

READ_ADDRESS: fffff80347d733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80347c2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80347c2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffff95086b206fe0 -- (.trap 0xffff95086b206fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff95086b207250
rdx=ffffe10ae7e64890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803479a9a67 rsp=ffff95086b207170 rbp=ffff95086b2071e9
r8=ffffe10ae7e64860 r9=0000000000000003 r10=0000000000000000
r11=ffff95086b2073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff803`479a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffff9508`6b206e98 fffff803`479d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9508`6b206ea0 fffff803`479d0529 : 00000000`ffff8001 ffffe10a`e7e93c50 ffffe10a`00000000 ffffe10a`e7e93c50 : nt!KiBugCheckDispatch+0x69
ffff9508`6b206fe0 fffff803`479a9a67 : 00000000`00000000 ffffe10a`e7e64040 ffffe10a`e7e64040 fffff803`479d3c15 : nt!KiPageFault+0x469
ffff9508`6b207170 fffff803`479c8308 : ffff9508`6b207250 7fffe10a`e7e93c60 ffff9508`6b2072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff9508`6b207250 fffff803`4b84154f : fffff803`4bd232c0 00000000`00000000 ffffffff`80000284 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff9508`6b2073e8 fffff803`4bd232c0 : 00000000`00000000 ffffffff`80000284 00000000`00000008 ffffe10a`eb043d10 : vgk+0x154f
ffff9508`6b2073f0 00000000`00000000 : ffffffff`80000284 00000000`00000008 ffffe10a`eb043d10 fffff803`47e29060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8033c3a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4546.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 7624.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8033c3a9a67.

READ_ADDRESS: fffff8033c7733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8033c62a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8033c62a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffd10966006fe0 -- (.trap 0xffffd10966006fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffd10966007250
rdx=ffff88022e47cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033c3a9a67 rsp=ffffd10966007170 rbp=ffffd109660071e9
r8=ffff88022e47cd60 r9=0000000000000003 r10=0000000000000000
r11=ffffd109660073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff803`3c3a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffffd109`66006e98 fffff803`3c3d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd109`66006ea0 fffff803`3c3d0529 : 00000000`ffff8001 ffff8802`2e4989d0 ffff8802`00000000 ffff8802`2e4989d0 : nt!KiBugCheckDispatch+0x69
ffffd109`66006fe0 fffff803`3c3a9a67 : 00000000`00000000 ffff8802`2e47c540 ffff8802`2e47c540 fffff803`3c3d3c15 : nt!KiPageFault+0x469
ffffd109`66007170 fffff803`3c3c8308 : ffffd109`66007250 ffffd109`660074f0 ffffd109`660072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffd109`66007250 fffff803`42a0154f : fffff803`42f2f9d5 00000000`00000000 ffffffff`80000288 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffd109`660073e8 fffff803`42f2f9d5 : 00000000`00000000 ffffffff`80000288 00000000`00000008 00000000`00000000 : vgk+0x154f
ffffd109`660073f0 00000000`00000000 : ffffffff`80000288 00000000`00000008 00000000`00000000 fffff803`3c829060 : vgk+0x52f9d5

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8033c3a95f6-fffff8033c3a95fb 6 bytes - nt!KiLockExtendedServiceTable+8ee
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff8033c3a99da-fffff8033c3a99df 6 bytes - nt!KiMarkBugCheckRegions+3de (+0x3e4)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff8033c3a9a3a-fffff8033c3a9a3f 6 bytes - nt!KiMarkBugCheckRegions+43e (+0x60)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
fffff8033c3c236a-fffff8033c3c236b 2 bytes - nt!ZwLoadKey3+2a (+0x18930)
[ 84 00:4c 87 ]
fffff8033c3c236d-fffff8033c3c236f 3 bytes - nt!ZwLoadKey3+2d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c238a-fffff8033c3c238b 2 bytes - nt!KiBugCheckReturn+16 (+0x1d)
[ 84 00:4c 87 ]
fffff8033c3c238d-fffff8033c3c238f 3 bytes - nt!KiBugCheckReturn+19 (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c24ba-fffff8033c3c24bb 2 bytes - nt!KeBugCheckEx+12a (+0x12d)
[ 84 00:4c 87 ]
fffff8033c3c24bd-fffff8033c3c24bf 3 bytes - nt!KeBugCheckEx+12d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c25ba-fffff8033c3c25bb 2 bytes - nt!KeContextToKframes+fa (+0xfd)
[ 84 00:4c 87 ]
fffff8033c3c25bd-fffff8033c3c25bf 3 bytes - nt!KeContextToKframes+fd (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c260a-fffff8033c3c260b 2 bytes - nt!KiSaveInitialProcessorControlState+4a (+0x4d)
[ 84 00:4c 87 ]
fffff8033c3c260d-fffff8033c3c260f 3 bytes - nt!KiSaveInitialProcessorControlState+4d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c26da-fffff8033c3c26df 6 bytes - nt!KiRestoreProcessorControlState+ca (+0xcd)
[ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
fffff8033c3c285a-fffff8033c3c285b 2 bytes - nt!KiSaveProcessorControlState+17a (+0x180)
[ 84 00:4c 87 ]
fffff8033c3c285d-fffff8033c3c285f 3 bytes - nt!KiSaveProcessorControlState+17d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c28da-fffff8033c3c28df 6 bytes - nt!KiRestoreDebugRegisterState+7a (+0x7d)
[ cc 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
fffff8033c3c2a6a-fffff8033c3c2a6b 2 bytes - nt!KiSaveDebugRegisterState+18a (+0x190)
[ 84 00:4c 87 ]
fffff8033c3c2a6d-fffff8033c3c2a6f 3 bytes - nt!KiSaveDebugRegisterState+18d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c2a7a-fffff8033c3c2a7f 6 bytes - nt!KeGetCurrentStackPointer+a (+0x0d)
[ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
fffff8033c3c2a8a-fffff8033c3c2a8b 2 bytes - nt!KeResetLegacyFloatingPointState+a (+0x10)
[ 1f 80:4c 87 ]
fffff8033c3c2a8d-fffff8033c3c2a8f 3 bytes - nt!KeResetLegacyFloatingPointState+d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c2a9a-fffff8033c3c2a9f 6 bytes - nt!KeSaveLegacyFloatingPointControlWord+a (+0x0d)
[ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
fffff8033c3c2aba-fffff8033c3c2abb 2 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1a (+0x20)
[ 84 00:4c 87 ]
fffff8033c3c2abd-fffff8033c3c2abf 3 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1d (+0x03)
[ 00 00 00:98 c3 90 ]
fffff8033c3c2d7a-fffff8033c3c2d7f 6 bytes - nt!NtContinue+2ba (+0x2bd)
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
93 errors : !nt (fffff8033c3a95f6-fffff8033c3c2d7f)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

MEMORY_CORRUPTOR: LARGE.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805291a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2624.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 6688.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff805291a9a67.

READ_ADDRESS: fffff805295733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8052942a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8052942a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffb08bb5e06fe0 -- (.trap 0xffffb08bb5e06fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffb08bb5e07250
rdx=ffff818de4c7cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805291a9a67 rsp=ffffb08bb5e07170 rbp=ffffb08bb5e071e9
r8=ffff818de4c7cd60 r9=0000000000000003 r10=0000000000000000
r11=ffffb08bb5e073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff805`291a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffffb08b`b5e06e98 fffff805`291d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb08b`b5e06ea0 fffff805`291d0529 : 00000000`ffff8001 ffff818d`e4c98cf0 ffff818d`00000000 ffff818d`e4c98cf0 : nt!KiBugCheckDispatch+0x69
ffffb08b`b5e06fe0 fffff805`291a9a67 : 00000000`00000000 ffff818d`e4c7c540 ffff818d`e4c7c540 fffff805`291d3c15 : nt!KiPageFault+0x469
ffffb08b`b5e07170 fffff805`291c8308 : ffffb08b`b5e07250 7fff818d`e4c98d00 ffffb08b`b5e072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffb08b`b5e07250 fffff805`2be0154f : fffff805`2c2e32c0 00000000`00000000 ffffffff`800002a4 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffb08b`b5e073e8 fffff805`2c2e32c0 : 00000000`00000000 ffffffff`800002a4 00000000`00000008 ffff818d`e5e89d40 : vgk+0x154f
ffffb08b`b5e073f0 00000000`00000000 : ffffffff`800002a4 00000000`00000008 ffff818d`e5e89d40 fffff805`29629060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803441a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3796.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 9923.

Key : Analysis.Memory.CommitPeak.Mb
Value: 74.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803441a9a67.

READ_ADDRESS: fffff803445733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8034442a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8034442a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffea0c71fe7000 -- (.trap 0xffffea0c71fe7000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000022000 rbx=0000000000000000 rcx=ffffea0c71fe7270
rdx=ffffd503e4dd7890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803441a9a67 rsp=ffffea0c71fe7190 rbp=ffffea0c71fe7209
r8=ffffd503e4dd7860 r9=0000000000000003 r10=0000000000000000
r11=ffffea0c71fe73e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc.
nt!KiSwInterruptDispatch+0x27:
fffff803`441a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffffea0c`71fe6eb8 fffff803`441d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffea0c`71fe6ec0 fffff803`441d0529 : 00000000`ffff8001 ffffd503`da8931b0 ffffd503`00000000 ffffd503`da8931b0 : nt!KiBugCheckDispatch+0x69
ffffea0c`71fe7000 fffff803`441a9a67 : 00000000`00000000 ffffd503`e4dd7040 ffffd503`e4dd7040 fffff803`441d3c15 : nt!KiPageFault+0x469
ffffea0c`71fe7190 fffff803`441c8308 : ffffea0c`71fe7270 ffffea0c`71fe7510 ffffea0c`71fe72f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffea0c`71fe7270 fffff803`44c0154f : fffff803`4512f9d5 00000000`00000000 ffffffff`80003454 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffea0c`71fe7408 fffff803`4512f9d5 : 00000000`00000000 ffffffff`80003454 00000000`00000008 00000000`00000000 : vgk+0x154f
ffffea0c`71fe7410 00000000`00000000 : ffffffff`80003454 00000000`00000008 00000000`00000000 fffff803`44629060 : vgk+0x52f9d5

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803791a9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2890.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 7349.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803791a9a67.

READ_ADDRESS: fffff803795733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8037942a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8037942a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffff858c73406fe0 -- (.trap 0xffff858c73406fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff858c73407250
rdx=ffffc584bb67cb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803791a9a67 rsp=ffff858c73407170 rbp=ffff858c734071e9
r8=ffffc584bb67cb20 r9=0000000000000003 r10=0000000000000000
r11=ffff858c734073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff803`791a9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffff858c`73406e98 fffff803`791d41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff858c`73406ea0 fffff803`791d0529 : 00000000`ffff8001 ffffc584`bb698430 ffffc584`00000000 ffffc584`bb698430 : nt!KiBugCheckDispatch+0x69
ffff858c`73406fe0 fffff803`791a9a67 : 00000000`00000000 ffffc584`bb67c300 ffffc584`bb67c300 fffff803`791d3c15 : nt!KiPageFault+0x469
ffff858c`73407170 fffff803`791c8308 : ffff858c`73407250 7fffc584`bb698440 ffff858c`734072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff858c`73407250 fffff803`7cc0154f : fffff803`7d0e32c0 00000000`00000000 ffffffff`80000278 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff858c`734073e8 fffff803`7d0e32c0 : 00000000`00000000 ffffffff`80000278 00000000`00000008 ffffc584`bd508dc0 : vgk+0x154f
ffff858c`734073f0 00000000`00000000 : ffffffff`80000278 00000000`00000008 ffffc584`bd508dc0 fffff803`79629060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80538fa9a67, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5015.

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject.

Key : Analysis.DebugModel
Value: CreateObject.

Key : Analysis.Elapsed.mSec
Value: 9780.

Key : Analysis.Memory.CommitPeak.Mb
Value: 70.

Key : Analysis.System
Value: CreateObject.

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a

BUGCHECK_P1: 994.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80538fa9a67.

READ_ADDRESS: fffff805393733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8053922a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff8053922a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000994.

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffb6814e806fe0 -- (.trap 0xffffb6814e806fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffb6814e807250
rdx=ffffd001f807cd90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80538fa9a67 rsp=ffffb6814e807170 rbp=ffffb6814e8071e9
r8=ffffd001f807cd60 r9=0000000000000003 r10=0000000000000000
r11=ffffb6814e8073c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!KiSwInterruptDispatch+0x27:
fffff805`38fa9a67 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope.

STACK_TEXT:
ffffb681`4e806e98 fffff805`38fd41e9 : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb681`4e806ea0 fffff805`38fd0529 : 00000000`ffff8001 ffffd001`f8098d90 ffffd001`00000000 ffffd001`f8098d90 : nt!KiBugCheckDispatch+0x69
ffffb681`4e806fe0 fffff805`38fa9a67 : 00000000`00000000 ffffd001`f807c540 ffffd001`f807c540 fffff805`38fd3c15 : nt!KiPageFault+0x469
ffffb681`4e807170 fffff805`38fc8308 : ffffb681`4e807250 7fffd001`f8098da0 ffffb681`4e8072d0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffb681`4e807250 fffff805`3cc0154f : fffff805`3d0e32c0 00000000`00000000 ffffffff`80000190 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffb681`4e8073e8 fffff805`3d0e32c0 : 00000000`00000000 ffffffff`80000190 00000000`00000008 ffffd001`fb5d2dc0 : vgk+0x154f
ffffb681`4e8073f0 00000000`00000000 : ffffffff`80000190 00000000`00000008 ffffd001`fb5d2dc0 fffff805`39429060 : vgk+0x4e32c0

SYMBOL_NAME: vgk+154f

MODULE_NAME: vgk.

IMAGE_NAME: vgk.sys

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 154f.

FAILURE_BUCKET_ID: AV_vgk!unknown_function

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup: MachineOwner.
---------

Şu an kullandığım kablosuz tek şey oyun kolum. Onu mu çıkarayım?
 
Cevabınızı düzenlemişsiniz, görmemişim. BIOS'umu nasıl güncellerim?

@yika38
  • Güncel sürüm olan "7.20 Instant Flash" olan sürümü indirin.
    • Global kanaldan indirebilirsiniz.
  • Dosyayı arşivden çıkarın ve FAT32 olarak formatlanmış USB belleğin içerisine atın.
  • Sistemi yeniden başlatın ve BIOS'a girin. "Tool" sekmesini seçin ve çıkan ekrandan "Instant Flash" seçeneğini seçin.
  • İndirdiğiniz BIOS dosyasını seçin ve işleme başlayın.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı