Valorant oynarken mavi ekran hatası

İşletim sistemi
Windows 10

arda55

Decapat
Katılım
8 Aralık 2020
Mesajlar
98
Daha fazla  
Cinsiyet
Erkek
İşlemci: i3 3217u

Ekran kartı: Intel HD Graphics 4000

RAM: 4 GB

2 hafta önce gayet normaldi donma kasma yoktu şu anda hem çok donuyor hem de yarım saat gibi falan oynayınca mavi ekran yiyorum Yeni klasör (5).rar
 
Son düzenleyen: Moderatör:
Memtest86 ile belleklerinizi test ediniz ve Vanguard'ı kaldırın. @Er73748 Memtest86 ile Bozuk RAM Testi - Technopat
[CODE title="Dosya 1"]
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb48d1e042068, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80764fb1068, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2796

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6220

Key : Analysis.Init.CPU.mSec
Value: 311

Key : Analysis.Init.Elapsed.mSec
Value: 2550

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: a

BUGCHECK_P1: ffffb48d1e042068

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80764fb1068

READ_ADDRESS: fffff807652fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb48d1e042068

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffc981027b6560 -- (.trap 0xffffc981027b6560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb48d1e041be8 rbx=0000000000000000 rcx=ffffb48d1e041be8
rdx=ffffb48d1e041bb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80764fb1068 rsp=ffffc981027b66f0 rbp=0000000000000000
r8=fffff807652168f0 r9=ffff970000000028 r10=ffff970000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`64fb1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffb48d`1e042068=????????????????
Resetting default scope

STACK_TEXT:
ffffc981`027b6418 fffff807`64a08c69 : 00000000`0000000a ffffb48d`1e042068 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc981`027b6420 fffff807`64a04f69 : 00000000`00000000 fffff807`6492a576 ffff1819`00000000 00001f80`0002020b : nt!KiBugCheckDispatch+0x69
ffffc981`027b6560 fffff807`64fb1068 : ffff8180`512df048 00000000`00000008 ffffc981`027b6b80 ffffc981`027b6798 : nt!KiPageFault+0x469
ffffc981`027b66f0 fffff807`64f47811 : ffffc981`027b67b0 ffffc981`027b6b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffc981`027b6740 fffff807`64cfcf75 : 0000025d`fa3d5040 00000000`00020000 ffff8180`512df040 ffffb48d`1a5423e0 : nt!ExpGetLockInformation+0x5d
ffffc981`027b6780 fffff807`64cfbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000025d`fa3d5040 : nt!ExpQuerySystemInformation+0x10b5
ffffc981`027b6ac0 fffff807`64a08bf1 : ffffb48d`178f0000 00000000`00000001 0000025f`7c472cce ffffc981`027b6b80 : nt!NtQuerySystemInformation+0x37
ffffc981`027b6b00 00007ffe`7626d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000dc`ea4ff508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7626d4e4


SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: a4

FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}

Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 2"]IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd1000a9d1078, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807621b1068, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2765

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 5777

Key : Analysis.Init.CPU.mSec
Value: 390

Key : Analysis.Init.Elapsed.mSec
Value: 9618

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: a

BUGCHECK_P1: ffffd1000a9d1078

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807621b1068

READ_ADDRESS: fffff807624fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd1000a9d1078

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffcb816668b560 -- (.trap 0xffffcb816668b560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd1000a9d0bf8 rbx=0000000000000000 rcx=ffffd1000a9d0bf8
rdx=ffffd1000a9d0bc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807621b1068 rsp=ffffcb816668b6f0 rbp=0000000000000000
r8=fffff807624168f0 r9=fffffb0000000028 r10=fffffb0000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`621b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffd100`0a9d1078=????????????????
Resetting default scope

STACK_TEXT:
ffffcb81`6668b418 fffff807`61c08c69 : 00000000`0000000a ffffd100`0a9d1078 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcb81`6668b420 fffff807`61c04f69 : 00000000`00000000 00000000`00000000 ffffea36`00000000 00001f80`00170280 : nt!KiBugCheckDispatch+0x69
ffffcb81`6668b560 fffff807`621b1068 : ffffb980`dd600048 00000000`00000008 ffffcb81`6668bb80 ffffcb81`6668b798 : nt!KiPageFault+0x469
ffffcb81`6668b6f0 fffff807`62147811 : ffffcb81`6668b7b0 ffffcb81`6668bb80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffcb81`6668b740 fffff807`61efcf75 : 000001be`b28f1040 00000000`00020000 ffffb980`dd600040 ffffd100`1330c010 : nt!ExpGetLockInformation+0x5d
ffffcb81`6668b780 fffff807`61efbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 000001be`b28f1040 : nt!ExpQuerySystemInformation+0x10b5
ffffcb81`6668bac0 fffff807`61c08bf1 : ffffd100`09170000 00000000`00000001 000000b4`42eff210 ffffcb81`6668bb80 : nt!NtQuerySystemInformation+0x37
ffffcb81`6668bb00 00007fff`a7fed4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000b4`42eff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a7fed4e4


SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: a4

FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}

Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 3"]IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd9093d463258, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8076e1b1068, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3593

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 17902

Key : Analysis.Init.CPU.mSec
Value: 296

Key : Analysis.Init.Elapsed.mSec
Value: 2142

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: a

BUGCHECK_P1: ffffd9093d463258

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8076e1b1068

READ_ADDRESS: fffff8076e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd9093d463258

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffe90ba7510560 -- (.trap 0xffffe90ba7510560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd9093d462dd8 rbx=0000000000000000 rcx=ffffd9093d462dd8
rdx=ffffd9093d462da8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076e1b1068 rsp=ffffe90ba75106f0 rbp=0000000000000000
r8=fffff8076e4168f0 r9=ffffec0000000028 r10=ffffec0000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`6e1b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffd909`3d463258=????????????????
Resetting default scope

STACK_TEXT:
ffffe90b`a7510418 fffff807`6dc08c69 : 00000000`0000000a ffffd909`3d463258 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe90b`a7510420 fffff807`6dc04f69 : 00000000`00000000 00000000`00000000 ffff97b7`00000000 00001f80`00280280 : nt!KiBugCheckDispatch+0x69
ffffe90b`a7510560 fffff807`6e1b1068 : ffffb180`87800048 00000000`00000008 ffffe90b`a7510b80 ffffe90b`a7510798 : nt!KiPageFault+0x469
ffffe90b`a75106f0 fffff807`6e147811 : ffffe90b`a75107b0 ffffe90b`a7510b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffe90b`a7510740 fffff807`6defcf75 : 0000029e`5ec87040 00000000`00020000 ffffb180`87800040 ffffd909`40547630 : nt!ExpGetLockInformation+0x5d
ffffe90b`a7510780 fffff807`6defbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000029e`5ec87040 : nt!ExpQuerySystemInformation+0x10b5
ffffe90b`a7510ac0 fffff807`6dc08bf1 : ffffd909`3c280000 00000000`00000001 00000000`35039f5b ffffe90b`a7510b80 : nt!NtQuerySystemInformation+0x37
ffffe90b`a7510b00 00007ffc`42b2d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000ec`a0eff588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`42b2d4e4


SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: a4

FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}

Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 4"]

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffac08a8dc53c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021e9b1068, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2437

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 15696

Key : Analysis.Init.CPU.mSec
Value: 437

Key : Analysis.Init.Elapsed.mSec
Value: 29814

Key : Analysis.Memory.CommitPeak.Mb
Value: 77


DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: a

BUGCHECK_P1: ffffac08a8dc53c8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8021e9b1068

READ_ADDRESS: fffff8021ecfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffac08a8dc53c8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffef8bed741560 -- (.trap 0xffffef8bed741560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac08a8dc4f48 rbx=0000000000000000 rcx=ffffac08a8dc4f48
rdx=ffffac08a8dc4f18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021e9b1068 rsp=ffffef8bed7416f0 rbp=0000000000000000
r8=fffff8021ec168f0 r9=ffffe58000000028 r10=ffffe58000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff802`1e9b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffac08`a8dc53c8=????????????????
Resetting default scope

STACK_TEXT:
ffffef8b`ed741418 fffff802`1e408c69 : 00000000`0000000a ffffac08`a8dc53c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffef8b`ed741420 fffff802`1e404f69 : 00000000`00000000 fffff802`1e32a576 ffffa45a`00000000 00001f80`00020234 : nt!KiBugCheckDispatch+0x69
ffffef8b`ed741560 fffff802`1e9b1068 : ffffc201`781df048 00000000`00000008 ffffef8b`ed741b80 ffffef8b`ed741798 : nt!KiPageFault+0x469
ffffef8b`ed7416f0 fffff802`1e947811 : ffffef8b`ed7417b0 ffffef8b`ed741b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffef8b`ed741740 fffff802`1e6fcf75 : 0000022b`047f1040 00000000`00020000 ffffc201`781df040 ffffac08`a98f5010 : nt!ExpGetLockInformation+0x5d
ffffef8b`ed741780 fffff802`1e6fbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000022b`047f1040 : nt!ExpQuerySystemInformation+0x10b5
ffffef8b`ed741ac0 fffff802`1e408bf1 : ffffac08`acc40000 00000000`00000001 00000047`3d6ff210 ffffef8b`ed741b80 : nt!NtQuerySystemInformation+0x37
ffffef8b`ed741b00 00007ff8`3eb6d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000047`3d6ff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`3eb6d4e4


SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: a4

FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}

Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 5"]
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffdf8f6f139f63, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80707711f34, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4124

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 13499

Key : Analysis.Init.CPU.mSec
Value: 484

Key : Analysis.Init.Elapsed.mSec
Value: 14639

Key : Analysis.Memory.CommitPeak.Mb
Value: 78


DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: a

BUGCHECK_P1: ffffdf8f6f139f63

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80707711f34

READ_ADDRESS: fffff807080fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffdf8f6f139f63

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: VALORANT-Win64

TRAP_FRAME: ffff88878b01d500 -- (.trap 0xffff88878b01d500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80707400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80707711f34 rsp=ffff88878b01d690 rbp=ffff88878b01d7c0
r8=0000000000000001 r9=0000000000000001 r10=ffff9103640a88a8
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreeHeapPool+0x124:
fffff807`07711f34 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope

STACK_TEXT:
ffff8887`8b01d3b8 fffff807`07808c69 : 00000000`0000000a ffffdf8f`6f139f63 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8887`8b01d3c0 fffff807`07804f69 : fffffffe`bfd95bb9 00000000`00000001 00000001`401e2353 fffff807`07713c0c : nt!KiBugCheckDispatch+0x69
ffff8887`8b01d500 fffff807`07711f34 : 00000000`00000001 00000000`00000286 00000000`00000006 00000000`00000424 : nt!KiPageFault+0x469
ffff8887`8b01d690 fffff807`07db3149 : fffff807`1c040000 ffff9103`52720cd0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffff8887`8b01d770 fffff807`1c7cae9e : 00000000`00000424 ffff9103`640a8300 fffff807`1c040000 00000000`00000008 : nt!ExFreePool+0x9
ffff8887`8b01d7a0 00000000`00000424 : ffff9103`640a8300 fffff807`1c040000 00000000`00000008 fffff807`1c040000 : vgk+0x78ae9e
ffff8887`8b01d7a8 ffff9103`640a8300 : fffff807`1c040000 00000000`00000008 fffff807`1c040000 00000000`00000001 : 0x424
ffff8887`8b01d7b0 fffff807`1c040000 : 00000000`00000008 fffff807`1c040000 00000000`00000001 00000000`00000000 : 0xffff9103`640a8300
ffff8887`8b01d7b8 00000000`00000008 : fffff807`1c040000 00000000`00000001 00000000`00000000 00000000`00000424 : vgk
ffff8887`8b01d7c0 fffff807`1c040000 : 00000000`00000001 00000000`00000000 00000000`00000424 ffff8887`8b01d840 : 0x8
ffff8887`8b01d7c8 00000000`00000001 : 00000000`00000000 00000000`00000424 ffff8887`8b01d840 fffff807`1c784e1f : vgk
ffff8887`8b01d7d0 00000000`00000000 : 00000000`00000424 ffff8887`8b01d840 fffff807`1c784e1f fffff807`07760440 : 0x1


SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.19041.985

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: AV_nt!ExFreePool

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup: Pool_corruption
---------[/CODE]
 
Memtest86 ile belleklerinizi test ediniz ve Vanguard'ı kaldırın. @Er73748 Memtest86 ile Bozuk RAM Testi - Technopat
[CODE title="Dosya 1"]
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb48d1e042068, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80764fb1068, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2796

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 6220

Key : Analysis.Init.CPU.mSec
Value: 311

Key : Analysis.Init.Elapsed.mSec
Value: 2550

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: ffffb48d1e042068

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80764fb1068

READ_ADDRESS: fffff807652fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb48d1e042068

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffc981027b6560 -- (.trap 0xffffc981027b6560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb48d1e041be8 rbx=0000000000000000 rcx=ffffb48d1e041be8
rdx=ffffb48d1e041bb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80764fb1068 rsp=ffffc981027b66f0 rbp=0000000000000000
r8=fffff807652168f0 r9=ffff970000000028 r10=ffff970000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`64fb1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffb48d`1e042068=????????????????
Resetting default scope

STACK_TEXT:
ffffc981`027b6418 fffff807`64a08c69 : 00000000`0000000a ffffb48d`1e042068 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc981`027b6420 fffff807`64a04f69 : 00000000`00000000 fffff807`6492a576 ffff1819`00000000 00001f80`0002020b : nt!KiBugCheckDispatch+0x69
ffffc981`027b6560 fffff807`64fb1068 : ffff8180`512df048 00000000`00000008 ffffc981`027b6b80 ffffc981`027b6798 : nt!KiPageFault+0x469
ffffc981`027b66f0 fffff807`64f47811 : ffffc981`027b67b0 ffffc981`027b6b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffc981`027b6740 fffff807`64cfcf75 : 0000025d`fa3d5040 00000000`00020000 ffff8180`512df040 ffffb48d`1a5423e0 : nt!ExpGetLockInformation+0x5d
ffffc981`027b6780 fffff807`64cfbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000025d`fa3d5040 : nt!ExpQuerySystemInformation+0x10b5
ffffc981`027b6ac0 fffff807`64a08bf1 : ffffb48d`178f0000 00000000`00000001 0000025f`7c472cce ffffc981`027b6b80 : nt!NtQuerySystemInformation+0x37
ffffc981`027b6b00 00007ffe`7626d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000dc`ea4ff508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7626d4e4

SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: a4

FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}

Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 2"]IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd1000a9d1078, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807621b1068, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2765

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 5777

Key : Analysis.Init.CPU.mSec
Value: 390

Key : Analysis.Init.Elapsed.mSec
Value: 9618

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: ffffd1000a9d1078

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807621b1068

READ_ADDRESS: fffff807624fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd1000a9d1078

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffcb816668b560 -- (.trap 0xffffcb816668b560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd1000a9d0bf8 rbx=0000000000000000 rcx=ffffd1000a9d0bf8
rdx=ffffd1000a9d0bc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807621b1068 rsp=ffffcb816668b6f0 rbp=0000000000000000
r8=fffff807624168f0 r9=fffffb0000000028 r10=fffffb0000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`621b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffd100`0a9d1078=????????????????
Resetting default scope

STACK_TEXT:
ffffcb81`6668b418 fffff807`61c08c69 : 00000000`0000000a ffffd100`0a9d1078 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffcb81`6668b420 fffff807`61c04f69 : 00000000`00000000 00000000`00000000 ffffea36`00000000 00001f80`00170280 : nt!KiBugCheckDispatch+0x69
ffffcb81`6668b560 fffff807`621b1068 : ffffb980`dd600048 00000000`00000008 ffffcb81`6668bb80 ffffcb81`6668b798 : nt!KiPageFault+0x469
ffffcb81`6668b6f0 fffff807`62147811 : ffffcb81`6668b7b0 ffffcb81`6668bb80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffcb81`6668b740 fffff807`61efcf75 : 000001be`b28f1040 00000000`00020000 ffffb980`dd600040 ffffd100`1330c010 : nt!ExpGetLockInformation+0x5d
ffffcb81`6668b780 fffff807`61efbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 000001be`b28f1040 : nt!ExpQuerySystemInformation+0x10b5
ffffcb81`6668bac0 fffff807`61c08bf1 : ffffd100`09170000 00000000`00000001 000000b4`42eff210 ffffcb81`6668bb80 : nt!NtQuerySystemInformation+0x37
ffffcb81`6668bb00 00007fff`a7fed4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000b4`42eff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a7fed4e4

SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: a4

FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}

Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 3"]IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd9093d463258, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8076e1b1068, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3593

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 17902

Key : Analysis.Init.CPU.mSec
Value: 296

Key : Analysis.Init.Elapsed.mSec
Value: 2142

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: ffffd9093d463258

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8076e1b1068

READ_ADDRESS: fffff8076e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffd9093d463258

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffe90ba7510560 -- (.trap 0xffffe90ba7510560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd9093d462dd8 rbx=0000000000000000 rcx=ffffd9093d462dd8
rdx=ffffd9093d462da8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076e1b1068 rsp=ffffe90ba75106f0 rbp=0000000000000000
r8=fffff8076e4168f0 r9=ffffec0000000028 r10=ffffec0000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff807`6e1b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffd909`3d463258=????????????????
Resetting default scope

STACK_TEXT:
ffffe90b`a7510418 fffff807`6dc08c69 : 00000000`0000000a ffffd909`3d463258 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe90b`a7510420 fffff807`6dc04f69 : 00000000`00000000 00000000`00000000 ffff97b7`00000000 00001f80`00280280 : nt!KiBugCheckDispatch+0x69
ffffe90b`a7510560 fffff807`6e1b1068 : ffffb180`87800048 00000000`00000008 ffffe90b`a7510b80 ffffe90b`a7510798 : nt!KiPageFault+0x469
ffffe90b`a75106f0 fffff807`6e147811 : ffffe90b`a75107b0 ffffe90b`a7510b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffe90b`a7510740 fffff807`6defcf75 : 0000029e`5ec87040 00000000`00020000 ffffb180`87800040 ffffd909`40547630 : nt!ExpGetLockInformation+0x5d
ffffe90b`a7510780 fffff807`6defbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000029e`5ec87040 : nt!ExpQuerySystemInformation+0x10b5
ffffe90b`a7510ac0 fffff807`6dc08bf1 : ffffd909`3c280000 00000000`00000001 00000000`35039f5b ffffe90b`a7510b80 : nt!NtQuerySystemInformation+0x37
ffffe90b`a7510b00 00007ffc`42b2d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000ec`a0eff588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`42b2d4e4

SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: a4

FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}

Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 4"]

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffac08a8dc53c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021e9b1068, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2437

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 15696

Key : Analysis.Init.CPU.mSec
Value: 437

Key : Analysis.Init.Elapsed.mSec
Value: 29814

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: a

BUGCHECK_P1: ffffac08a8dc53c8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8021e9b1068

READ_ADDRESS: fffff8021ecfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffac08a8dc53c8

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffef8bed741560 -- (.trap 0xffffef8bed741560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac08a8dc4f48 rbx=0000000000000000 rcx=ffffac08a8dc4f48
rdx=ffffac08a8dc4f18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021e9b1068 rsp=ffffef8bed7416f0 rbp=0000000000000000
r8=fffff8021ec168f0 r9=ffffe58000000028 r10=ffffe58000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExQuerySystemLockInformation+0xa4:
fffff802`1e9b1068 488b8080040000 mov rax,qword ptr [rax+480h] ds:ffffac08`a8dc53c8=????????????????
Resetting default scope

STACK_TEXT:
ffffef8b`ed741418 fffff802`1e408c69 : 00000000`0000000a ffffac08`a8dc53c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffef8b`ed741420 fffff802`1e404f69 : 00000000`00000000 fffff802`1e32a576 ffffa45a`00000000 00001f80`00020234 : nt!KiBugCheckDispatch+0x69
ffffef8b`ed741560 fffff802`1e9b1068 : ffffc201`781df048 00000000`00000008 ffffef8b`ed741b80 ffffef8b`ed741798 : nt!KiPageFault+0x469
ffffef8b`ed7416f0 fffff802`1e947811 : ffffef8b`ed7417b0 ffffef8b`ed741b80 00000000`00000001 00000000`00000001 : nt!ExQuerySystemLockInformation+0xa4
ffffef8b`ed741740 fffff802`1e6fcf75 : 0000022b`047f1040 00000000`00020000 ffffc201`781df040 ffffac08`a98f5010 : nt!ExpGetLockInformation+0x5d
ffffef8b`ed741780 fffff802`1e6fbd77 : 00000000`0000000a 00000000`00010001 00000000`0000000c 0000022b`047f1040 : nt!ExpQuerySystemInformation+0x10b5
ffffef8b`ed741ac0 fffff802`1e408bf1 : ffffac08`acc40000 00000000`00000001 00000047`3d6ff210 ffffef8b`ed741b80 : nt!NtQuerySystemInformation+0x37
ffffef8b`ed741b00 00007ff8`3eb6d4e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000047`3d6ff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`3eb6d4e4

SYMBOL_NAME: nt!ExQuerySystemLockInformation+a4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.985

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: a4

FAILURE_BUCKET_ID: AV_nt!ExQuerySystemLockInformation

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4c4f116b-1984-749c-979e-0b7b97fcbad5}

Followup: MachineOwner
---------
[/CODE]
[CODE title="Dosya 5"]
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffdf8f6f139f63, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80707711f34, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4124

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 13499

Key : Analysis.Init.CPU.mSec
Value: 484

Key : Analysis.Init.Elapsed.mSec
Value: 14639

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: a

BUGCHECK_P1: ffffdf8f6f139f63

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80707711f34

READ_ADDRESS: fffff807080fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffdf8f6f139f63

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: VALORANT-Win64

TRAP_FRAME: ffff88878b01d500 -- (.trap 0xffff88878b01d500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80707400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80707711f34 rsp=ffff88878b01d690 rbp=ffff88878b01d7c0
r8=0000000000000001 r9=0000000000000001 r10=ffff9103640a88a8
r11=0000000000000076 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreeHeapPool+0x124:
fffff807`07711f34 f646f304 test byte ptr [rsi-0Dh],4 ds:ffffffff`fffffff3=??
Resetting default scope

STACK_TEXT:
ffff8887`8b01d3b8 fffff807`07808c69 : 00000000`0000000a ffffdf8f`6f139f63 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8887`8b01d3c0 fffff807`07804f69 : fffffffe`bfd95bb9 00000000`00000001 00000001`401e2353 fffff807`07713c0c : nt!KiBugCheckDispatch+0x69
ffff8887`8b01d500 fffff807`07711f34 : 00000000`00000001 00000000`00000286 00000000`00000006 00000000`00000424 : nt!KiPageFault+0x469
ffff8887`8b01d690 fffff807`07db3149 : fffff807`1c040000 ffff9103`52720cd0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x124
ffff8887`8b01d770 fffff807`1c7cae9e : 00000000`00000424 ffff9103`640a8300 fffff807`1c040000 00000000`00000008 : nt!ExFreePool+0x9
ffff8887`8b01d7a0 00000000`00000424 : ffff9103`640a8300 fffff807`1c040000 00000000`00000008 fffff807`1c040000 : vgk+0x78ae9e
ffff8887`8b01d7a8 ffff9103`640a8300 : fffff807`1c040000 00000000`00000008 fffff807`1c040000 00000000`00000001 : 0x424
ffff8887`8b01d7b0 fffff807`1c040000 : 00000000`00000008 fffff807`1c040000 00000000`00000001 00000000`00000000 : 0xffff9103`640a8300
ffff8887`8b01d7b8 00000000`00000008 : fffff807`1c040000 00000000`00000001 00000000`00000000 00000000`00000424 : vgk
ffff8887`8b01d7c0 fffff807`1c040000 : 00000000`00000001 00000000`00000000 00000000`00000424 ffff8887`8b01d840 : 0x8
ffff8887`8b01d7c8 00000000`00000001 : 00000000`00000000 00000000`00000424 ffff8887`8b01d840 fffff807`1c784e1f : vgk
ffff8887`8b01d7d0 00000000`00000000 : 00000000`00000424 ffff8887`8b01d840 fffff807`1c784e1f fffff807`07760440 : 0x1

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.19041.985

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: AV_nt!ExFreePool

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}

Followup: Pool_corruption
---------[/CODE]

Memtest yaparımda Vanguard'ı nasıl kaldıracağım? Kaldırırsam Valorant nasıl oynayacagım?
 
Memtest sonucu nedir?
henüz yapmadım yaıcam şimdi yüklüyorum
Memtest sonucu nedir?

1622359293359.png


Bu değil mi ilk yükleyeceğim şey bu ise neye basmam lazım?
Memtest sonucu nedir?

Sanırım Memtest için ilk USB lazım bende USB yok
 
Son düzenleme:
Henüz yapmadım yaıcam şimdi yüklüyorum.

Eki Görüntüle 1047448

Bu değil mi ilk yükleyeceğim şey bu ise neye basmam lazım?

Tam olarak o şekilde değil. Bu videodan yararlanabilirsiniz.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
 

Yeni konular

Geri
Yukarı