Vanguard'ı kaldırın. Zaten Valorant geri kuracaktır. Sorunun devam etmesi durumunda yeni dump dosyasını paylaşabilirsiniz.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff8f8f174423c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80010daf038, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8668
Key : Analysis.Init.CPU.mSec
Value: 15077
Key : Analysis.Init.Elapsed.mSec
Value: 388991
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffff8f8f174423c8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80010daf038
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff8f8f174423c8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffff82836f95b6a0 -- (.trap 0xffff82836f95b6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8f8f17441f48 rbx=0000000000000000 rcx=ffff8f8f17441f48
rdx=ffff8f8f17441f18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80010daf038 rsp=ffff82836f95b830 rbp=0000000000000000
r8=fffff800110168e0 r9=ffffeb8000000028 r10=ffffeb8000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff800`10daf038 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffff8f8f`174423c8=????????????????
Resetting default scope
STACK_TEXT:
ffff8283`6f95b558 fffff800`10807d69 : 00000000`0000000a ffff8f8f`174423c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8283`6f95b560 fffff800`10804069 : 00000000`00000000 fffff800`1060ecc6 ffff2b64`00000000 00001f80`001502ba : nt!KiBugCheckDispatch+0x69
ffff8283`6f95b6a0 fffff800`10daf038 : ffffc980`861a2048 00000000`00000008 ffff8283`6f95bb80 ffff8283`6f95b8d8 : nt!KiPageFault+0x469
ffff8283`6f95b830 fffff800`10d45cb1 : ffff8283`6f95b8f0 ffff8283`6f95bb80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffff8283`6f95b880 fffff800`109e6ebc : 0000014d`e3dad040 fffff800`00020000 ffffc980`861a2040 ffff8f8f`1435a010 : nt!ExpGetLockInformation+0x5d
ffff8283`6f95b8c0 fffff800`109e5ca7 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000014d`e3dad040 : nt!ExpQuerySystemInformation+0x10cc
ffff8283`6f95bac0 fffff800`10807cf1 : ffff8f8f`142b0000 00000000`00000000 00000000`00000001 ffff8f8f`00000000 : nt!NtQuerySystemInformation+0x37
ffff8283`6f95bb00 00007ff9`374ed3e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000006`c15ff3b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`374ed3e4
SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: a4
FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}
Followup: MachineOwner
---------[/CODE]