Çözüldü Valorant'a girince mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10
Çözüm
Evet şimdi bir problem yok.

* BIOS güncel.
* Ekran kartı sürücüleri ile alakalı bir problem var gibi.

* Ekran kartı sürücünüz 17 Mart 2023'ten kalma.
Rich (BB code):
    Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispig.inf_amd64_50916785244854f2\nvlddmkm.sys
    Image name: nvlddmkm.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Mar 17 02:16:07 2023 (6413A337)
    CheckSum:         037956CA
    ImageSize:        03897000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:


* İlk etapta onu güncelleyerek başlayın.
* Garanti olsun diyorsanız Rehber: DDU ile Sürücü Kaldırma Rehberi bu rehberi takip ederek sürücüleri temizleyin ve yenisini yükleyin.
* Zorunlu değil, ama öneririm.

Güncel sürüm:


Ekran kartı sürücü güncellemesinden sonra mavi ekran alırsanız yeni minidump dosyalarınızı paylaşın.



* Buradan sonrasını yapmasanız da olur, genel performans ve güncel olmak adına öneriyorum.

* Ses sürücünüz eski kalmış, güncelleyebilirsiniz.

SSD'niz Adata Legend 700 512GBPCIe Gen3 x4 M.2 NVMe SSD mi?

* Adata'nın yazılımı var mı sistemde? Varsa firmware güncellemelerini kontrol edin.
* Yoksa indirip kurun, firmware güncellemesi var mı diye bir bakın.
* Sağlığını da bir kontrol edin.
ADATA SSD ToolBox


* Windows eski görünüyor. Bazen dökümlerden güncel mi değil mi anlaşılmıyor, güncel değilse Windows Update aracılığıyla güncelleyin işletim sisteminizi.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa9405d6bf558, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8064be57804, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.Elapsed.mSec
    Value: 4078

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9793

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 137

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_nt!ExpAllocateHandleTableEntry

    Key  : Failure.Hash
    Value: {057ca722-8246-3c91-57a3-2501ef38bce9}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa9405d6bf558

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8064be57804

BUGCHECK_P4: 2

FILE_IN_CAB:  060423-7359-01.dmp.dmp

READ_ADDRESS: fffff8064c4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa9405d6bf558

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

TRAP_FRAME:  ffffa202b34474a0 -- (.trap 0xffffa202b34474a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff920b731832c0
rdx=ffffa9005aec5b40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064be57804 rsp=ffffa202b3447630 rbp=0000000000000008
 r8=ffffa202b3447640  r9=0000000000000000 r10=0000000000000000
r11=ffffa900619914b6 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpAllocateHandleTableEntry+0xe4:
fffff806`4be57804 498b4708        mov     rax,qword ptr [r15+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
ffffa202`b34471f8 fffff806`4bc4af53     : 00000000`00000050 ffffa940`5d6bf558 00000000`00000000 ffffa202`b34474a0 : nt!KeBugCheckEx
ffffa202`b3447200 fffff806`4ba6e7b0     : 00000000`00000000 00000000`00000000 ffffa202`b3447520 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffffa202`b3447300 fffff806`4bc0bad8     : ffffa900`619d4030 ffffa202`b34476a0 ffffa900`5d606980 ffffa202`b34477f0 : nt!MmAccessFault+0x400
ffffa202`b34474a0 fffff806`4be57804     : ffffa900`5aec5b40 00000000`00000001 00000000`00000000 00000000`00000006 : nt!KiPageFault+0x358
ffffa202`b3447630 fffff806`4be576a8     : 00000000`00000400 00000000`00000000 ffffa900`5aec5b00 ffff920b`731832c0 : nt!ExpAllocateHandleTableEntry+0xe4
ffffa202`b3447680 fffff806`4becebd6     : 00000000`00000000 00000000`00000000 ffffa202`b3447ac0 ffff920b`00000000 : nt!ExCreateHandleEx+0x78
ffffa202`b34476d0 fffff806`4ba33d8c     : 00000000`00000000 ffffa900`61991450 00000000`00000000 0000004f`c8cfd1d0 : nt!RtlpInsertStringAtom+0x2a
ffffa202`b3447710 fffff806`4bec4034     : ffffa900`5aed6630 00000000`00000026 0000004f`c8cfd1c0 0000004f`c8cfd1c0 : nt!RtlAddAtomToAtomTableEx+0x13c
ffffa202`b34477b0 fffff806`4bc0f7f5     : ffff920b`731832c0 000001ea`75350000 ffffa202`b3447ac0 ffff920b`730a3080 : nt!NtAddAtomEx+0x124
ffffa202`b3447a40 00007fff`0a98ddc4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004f`c8cfd118 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0a98ddc4


SYMBOL_NAME:  nt!ExpAllocateHandleTableEntry+e4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.3031

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  AV_R_(null)_nt!ExpAllocateHandleTableEntry

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {057ca722-8246-3c91-57a3-2501ef38bce9}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff9f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8059da8cda6, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.Elapsed.mSec
    Value: 4122

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 22410

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_dxgmms2!VidSchiProfilePerformanceTick

    Key  : Failure.Hash
    Value: {cb0b1289-fb87-52e2-f284-4f9f64401311}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffffffffffff9f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8059da8cda6

FILE_IN_CAB:  060423-7125-01.dmp.dmp

READ_ADDRESS: fffff805650fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffff9f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffff8806cca8a1e0 -- (.trap 0xffff8806cca8a1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=3e2f5f2515890000
rdx=000000000000000e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8059da8cda6 rsp=ffff8806cca8a370 rbp=0000000000000000
 r8=ffff8806cca89ee0  r9=0000000000000000 r10=0000000000000000
r11=fffff8059dab2680 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
dxgmms2!VidSchiProfilePerformanceTick+0x12926:
fffff805`9da8cda6 4c8b559f        mov     r10,qword ptr [rbp-61h] ss:0018:ffffffff`ffffff9f=????????????????
Resetting default scope

STACK_TEXT:
ffff8806`cca8a098 fffff805`64810029     : 00000000`0000000a ffffffff`ffffff9f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8806`cca8a0a0 fffff805`6480bbe3     : 00000000`00000000 fffff805`9da93d62 00000000`00000000 fffff805`7f2cd5cf : nt!KiBugCheckDispatch+0x69
ffff8806`cca8a1e0 fffff805`9da8cda6     : ffffca03`bd5b9000 00000000`00000001 ffff8806`cca8a418 ffffca03`c5f5a240 : nt!KiPageFault+0x463
ffff8806`cca8a370 fffff805`9daabf1c     : ffffca03`c2bfc630 ffff8806`cca8a4b4 ffffca03`c693f010 ffffca03`bd5b9000 : dxgmms2!VidSchiProfilePerformanceTick+0x12926
ffff8806`cca8a490 fffff805`9daaa0ca     : ffffca03`c693f010 ffffca03`bd561000 ffffca03`c693f120 ffffca03`c2d99010 : dxgmms2!VidSchiSubmitCommandPacketToHwQueue+0xc8
ffff8806`cca8a510 fffff805`7f4fee0c     : 00000000`00000000 00000000`00000000 00000000`08000000 ffffca03`c2d99010 : dxgmms2!VidSchSubmitCommandToHwQueue+0x2da
ffff8806`cca8a570 fffff805`7f501c6a     : ffff8806`cca8aac0 ffff8806`cca8a908 ffff8806`cca8a908 ffff8806`cca8a941 : dxgkrnl!DXGHWQUEUE::SubmitCommand+0x5d4
ffff8806`cca8a880 fffff805`7f5018db     : 000000a6`79ccfa80 ffffca03`c4ace080 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueueInternal+0x382
ffff8806`cca8aa10 fffff805`6480ff9a     : ffffca03`c4ace080 ffffca03`c36e82e0 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueue+0xb
ffff8806`cca8aa40 00007ffc`aa5e5b04     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3ef
000000a6`79ccf9e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`aa5e5b04


SYMBOL_NAME:  dxgmms2!VidSchiProfilePerformanceTick+12926

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  12926

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiProfilePerformanceTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cb0b1289-fb87-52e2-f284-4f9f64401311}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa40d609a1378, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff804e473220b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1437

    Key  : Analysis.Elapsed.mSec
    Value: 3899

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13946

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_WdNisDrv!unknown_function

    Key  : Failure.Hash
    Value: {277a463a-5282-a91c-e1d6-c17eaf8303e7}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa40d609a1378

BUGCHECK_P2: 0

BUGCHECK_P3: fffff804e473220b

BUGCHECK_P4: 2

FILE_IN_CAB:  060423-7390-01.dmp.dmp

READ_ADDRESS: fffff8046d2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa40d609a1378

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffffb58d5332d980 -- (.trap 0xffffb58d5332d980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa40f5feb8480 rbx=0000000000000000 rcx=0000000000000136
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804e473220b rsp=ffffb58d5332db10 rbp=ffffb58d5332dc60
 r8=ffffb58d5332db80  r9=0000000000000108 r10=ffffa40d609a1350
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
WdNisDrv+0x220b:
fffff804`e473220b 418b7a28        mov     edi,dword ptr [r10+28h] ds:ffffa40d`609a1378=????????
Resetting default scope

STACK_TEXT:
ffffb58d`5332d6d8 fffff804`6ca4af53     : 00000000`00000050 ffffa40d`609a1378 00000000`00000000 ffffb58d`5332d980 : nt!KeBugCheckEx
ffffb58d`5332d6e0 fffff804`6c86e7b0     : 00000000`00000008 00000000`00000000 ffffb58d`5332da00 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffffb58d`5332d7e0 fffff804`6ca0bad8     : ffffa40f`627dc790 ffffa40f`627dc790 ffffa40f`627d020c 00000000`00000000 : nt!MmAccessFault+0x400
ffffb58d`5332d980 fffff804`e473220b     : ffffb58d`5332db98 ffffb58d`5332db90 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
ffffb58d`5332db10 ffffb58d`5332db98     : ffffb58d`5332db90 00000000`00000000 00000000`00000000 00000000`00000000 : WdNisDrv+0x220b
ffffb58d`5332db18 ffffb58d`5332db90     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xffffb58d`5332db98
ffffb58d`5332db20 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa40f`627d020c : 0xffffb58d`5332db90


SYMBOL_NAME:  WdNisDrv+220b

MODULE_NAME: WdNisDrv

IMAGE_NAME:  WdNisDrv.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  220b

FAILURE_BUCKET_ID:  AV_R_(null)_WdNisDrv!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {277a463a-5282-a91c-e1d6-c17eaf8303e7}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc40a62bc92b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021f6b4694, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1593

    Key  : Analysis.Elapsed.mSec
    Value: 3467

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11339

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xa

    Key  : Failure.Bucket
    Value: AV_nt!MiGetPageProtection

    Key  : Failure.Hash
    Value: {41372a35-237d-1281-82f6-8f5f9bf6044a}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffc40a62bc92b0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8021f6b4694

FILE_IN_CAB:  060223-7812-01.dmp.dmp

READ_ADDRESS: fffff802200fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc40a62bc92b0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WmiPrvSE.exe

TRAP_FRAME:  ffffec854bb872f0 -- (.trap 0xffffec854bb872f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40a62bc92b0 rbx=0000000000000000 rcx=00000000ffffffff
rdx=00000000000003ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021f6b4694 rsp=ffffec854bb87480 rbp=0000000000000000
 r8=ffffec854bb87558  r9=ffffec854bb87554 r10=fffff77bbddee7f8
r11=fffff77bbddee000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiGetPageProtection+0x4d4:
fffff802`1f6b4694 488b08          mov     rcx,qword ptr [rax] ds:ffffc40a`62bc92b0=????????????????
Resetting default scope

STACK_TEXT:
ffffec85`4bb871a8 fffff802`1f810029     : 00000000`0000000a ffffc40a`62bc92b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffec85`4bb871b0 fffff802`1f80bbe3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffec85`4bb872f0 fffff802`1f6b4694     : 0000007f`fffffff8 00000000`00000000 ffff8802`e740e038 00000000`00000000 : nt!KiPageFault+0x463
ffffec85`4bb87480 fffff802`1f6b3005     : 00000000`00000000 00000000`00000000 ffffec85`4bb87558 ffffec85`4bb87554 : nt!MiGetPageProtection+0x4d4
ffffec85`4bb87500 fffff802`1f62c2bf     : 00000000`00000000 0000024f`76e60000 c40263f5`b050ff4d 00000000`00001400 : nt!MiQueryAddressState+0x4b5
ffffec85`4bb87710 fffff802`1fa22a6c     : ffffec85`4bb80000 00000000`00000000 ffffc402`00000000 ffffc402`00000000 : nt!MiQueryAddressSpan+0xcf
ffffec85`4bb877d0 fffff802`1fa22215     : ffffeb03`b6b8ca6c 00000000`00000000 00000192`99f5e7c0 00000000`00001634 : nt!MmQueryVirtualMemory+0x83c
ffffec85`4bb87980 fffff802`1f80f7f5     : 00000000`00000000 00000192`99f5e7b8 00000000`00000000 00000000`00000000 : nt!NtQueryVirtualMemory+0x25
ffffec85`4bb879d0 00007fff`60e8d514     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004c`6197d3e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`60e8d514


SYMBOL_NAME:  nt!MiGetPageProtection+4d4

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.3031

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  4d4

FAILURE_BUCKET_ID:  AV_nt!MiGetPageProtection

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {41372a35-237d-1281-82f6-8f5f9bf6044a}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8006c063d37, Address of the instruction which caused the BugCheck
Arg3: ffffc686ae06e1b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.Elapsed.mSec
    Value: 5004

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12901

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b

    Key  : Failure.Bucket
    Value: AV_dxgmms2!McGenEventWrite_EtwWriteTransfer

    Key  : Failure.Hash
    Value: {5f66c0bb-d30c-22d8-775d-3fe51eb41150}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8006c063d37

BUGCHECK_P3: ffffc686ae06e1b0

BUGCHECK_P4: 0

FILE_IN_CAB:  060123-7531-01.dmp.dmp

CONTEXT:  ffffc686ae06e1b0 -- (.cxr 0xffffc686ae06e1b0)
rax=0000000000000002 rbx=0000000000000000 rcx=ffff908ad6514310
rdx=fffff8006c082d50 rsi=0000000000000004 rdi=ffff908a83ca2520
rip=fffff8006c063d37 rsp=ffffc686ae06ebb0 rbp=ffffc686ae06ec59
 r8=ffffc686ae06ec20  r9=0000000000000006 r10=0000000000002df4
r11=0000000000000006 r12=0000000000000000 r13=0000000000160000
r14=ffff908a83ca2548 r15=0000000000160000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
dxgmms2!McGenEventWrite_EtwWriteTransfer+0x27:
fffff800`6c063d37 450fb70a        movzx   r9d,word ptr [r10] ds:002b:00000000`00002df4=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

STACK_TEXT:
ffffc686`ae06ebb0 fffff800`6c067e27     : 00000000`00000000 ffffc686`ae06fa40 00000000`00000004 00000000`00802000 : dxgmms2!McGenEventWrite_EtwWriteTransfer+0x27
ffffc686`ae06ebf0 fffff800`6c0d6b20     : ffff908a`83ca2520 00000000`00010001 00000000`00000004 0000020b`a7d20000 : dxgmms2!McTemplateK0pxqqt_EtwWriteTransfer+0x8b
ffffc686`ae06eca0 fffff800`6c0a0292     : ffffc686`ae06edf0 00000000`02000000 ffff908a`83ca2520 fffff800`6c063d62 : dxgmms2!VIDMM_RECYCLE_BLOCK::Allocate+0x36860
ffffc686`ae06ed00 fffff800`6c0a05da     : 00000000`00000000 00000000`00010000 ffffe084`dd3ac978 ffffe084`dd3ac920 : dxgmms2!VIDMM_RECYCLE_HEAP::CreateBlockForType+0x66
ffffc686`ae06ed30 fffff800`6c0a1fa8     : 00000000`00000000 00000000`00010000 00000000`00000001 ffffc686`0000001c : dxgmms2!VIDMM_RECYCLE_HEAP::CreateBlockAndRange+0x42
ffffc686`ae06eda0 fffff800`6c0a1d87     : ffffe084`dd3ac978 00000000`00160000 00000000`00000001 ffffc686`ae06ef70 : dxgmms2!VIDMM_RECYCLE_HEAP::Allocate+0x128
ffffc686`ae06ee70 fffff800`6c0ba1c8     : ffffe084`ce010300 00000000`00000000 ffffe084`ce013900 00000000`00000002 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Allocate+0x127
ffffc686`ae06ef00 fffff800`6c0b9b36     : 00000000`00000001 00000000`33306956 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::CommitLocalBackingStore+0x498
ffffc686`ae06f000 fffff800`6c0b91fd     : ffffe084`e2e87490 00000000`00000002 ffffb600`00000000 ffff908a`db8f0010 : dxgmms2!VIDMM_GLOBAL::OpenLocalAllocation+0x116
ffffc686`ae06f0c0 fffff800`6c0b8d96     : ffffc686`ae06f388 ffffe084`e39adbd0 ffff908a`db8f0010 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::OpenOneAllocation+0x42d
ffffc686`ae06f240 fffff800`6c052523     : 00000000`00000000 00000000`01001002 00000000`00000000 ffffc686`00000005 : dxgmms2!VIDMM_GLOBAL::OpenAllocation+0x52
ffffc686`ae06f290 fffff800`4e55067e     : 00000000`00000000 fffff692`9fee79ff ffff908a`851055c0 00000000`00000000 : dxgmms2!VidMmOpenAllocation+0x53
ffffc686`ae06f2f0 fffff800`4e4f3a9e     : 00000000`00000000 ffffc686`ae06f830 ffff908a`80598860 ffff908a`80598b30 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations+0x8ee
ffffc686`ae06f400 fffff800`4e4f01f3     : ffffe084`d8b96c30 ffffc686`ae06fac0 00000000`00000000 ffff908a`88d2a820 : dxgkrnl!DXGDEVICE::CreateAllocation+0x124e
ffffc686`ae06f770 fffff800`4e5574ed     : ffffe084`ddac0f34 00000000`00501802 ffffe084`ddac35c0 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0xbd3
ffffc686`ae06fa00 fffff800`3440ff9a     : ffffe084`ddac35c0 ffffe084`e2cc5260 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkCreateAllocation+0xd
ffffc686`ae06fa40 00007ff8`f7d94784     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3ef
000000ea`f2bdb258 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f7d94784


SYMBOL_NAME:  dxgmms2!McGenEventWrite_EtwWriteTransfer+27

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr 0xffffc686ae06e1b0 ; kb

BUCKET_ID_FUNC_OFFSET:  27

FAILURE_BUCKET_ID:  AV_dxgmms2!McGenEventWrite_EtwWriteTransfer

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5f66c0bb-d30c-22d8-775d-3fe51eb41150}

Followup:     MachineOwner
---------
EDIT: Paylaştığınız minidump dosyalarıyla konu başındaki sisteminiz uyuşmuyor. Minidump dosyalarında AMD bir sistem var. İşlemcisi de Ryzen 5 5600. Hangisi doğru? Intel mi AMD mi var sizde? Başkasının minidump dosyalarını yüklemiş olabilir misiniz?

---------


* Mavi ekranlarınız büyük oranla RAM kaynaklı görünüyor.

* Memtest86 ile test yapmanız gerekecek.


Ancak testten önce birkaç önerim daha var.

* BIOS'unuz eski, ayrıca beta bir sürüm kullanıyorsunuz: 7C52v3H1(Beta version)

7C52v3I sürümüne güncelleyin.


* Chipset sürücülerinizi buradan güncelleyin, eskisini silin (AMD Chipset Software).

SSD'niz Adata Legend 700 512GBPCIe Gen3 x4 M.2 NVMe SSD mi?

* Adata'nın yazılımı var mı sistemde? Varsa firmware güncellemelerini kontrol edin.
* Yoksa indirip kurun, firmware güncellemesi var mı diye bir bakın.
* Sağlığını da bir kontrol edin.
ADATA SSD ToolBox

* Harici Bluetooth adaptörünüzün sürücülerini güncelleyin.


* Tüm bunlar sonucunda hata almaya devam ederseniz yeni dökümleri paylaşın, yüksek ihtimalle RAM ile alakalı hatalar devam edecek. O yüzden zaman kaybetmeden Memtest86 ile test yapabilirsiniz.



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8017de03f35, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5062

    Key  : Analysis.Elapsed.mSec
    Value: 5307

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12289

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 148

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1e

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: AV_R_nt!KiSwapContext

    Key  : Failure.Hash
    Value: {749675b6-a9e8-b0d9-edce-4ac859e619cf}


BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8017de03f35

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

FILE_IN_CAB:  060323-9125-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: fffff8017e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64

STACK_TEXT:
ffffda80`547bf8e8 fffff801`7de60cd3     : 00000000`0000001e ffffffff`c0000005 fffff801`7de03f35 00000000`00000000 : nt!KeBugCheckEx
ffffda80`547bf8f0 fffff801`7ddfcdb2     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1795c3
ffffda80`547bffb0 fffff801`7ddfcd80     : fffff801`7de0fe65 ffffb607`06ec0080 fffff801`7dc1beef 00000000`00000002 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffc684`38637458 fffff801`7de0fe65     : ffffb607`06ec0080 fffff801`7dc1beef 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffc684`38637460 fffff801`7de0b45a     : ffffb607`06ec0080 00000000`00000000 ffffda80`5479f180 fffff801`7de047d3 : nt!KiExceptionDispatch+0x125
ffffc684`38637640 fffff801`7de03f35     : ffff3801`7dc1c9c0 ffff9880`00000000 00001000`00000000 ffffb406`00000000 : nt!KiGeneralProtectionFault+0x31a
ffffc684`386377d8 ffff3801`7dc1c9c0     : ffff9880`00000000 00001000`00000000 ffffb406`00000000 ffffb801`7dc26a06 : nt!KiSwapContext+0xd5
ffffc684`386377e0 ffff9880`00000000     : 00001000`00000000 ffffb406`00000000 ffffb801`7dc26a06 00000000`00000000 : 0xffff3801`7dc1c9c0
ffffc684`386377e8 00001000`00000000     : ffffb406`00000000 ffffb801`7dc26a06 00000000`00000000 00000000`00000000 : 0xffff9880`00000000
ffffc684`386377f0 ffffb406`00000000     : ffffb801`7dc26a06 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00001000`00000000
ffffc684`386377f8 ffffb801`7dc26a06     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`91977064 : 0xffffb406`00000000
ffffc684`38637800 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`91977064 00000000`00000000 : 0xffffb801`7dc26a06


SYMBOL_NAME:  nt!KiSwapContext+d5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  d5

FAILURE_BUCKET_ID:  AV_R_nt!KiSwapContext

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {749675b6-a9e8-b0d9-edce-4ac859e619cf}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff88038e039c70, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff88038e039bc8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4343

    Key  : Analysis.Elapsed.mSec
    Value: 4427

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12823

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 155

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x139

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : Failure.Bucket
    Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

    Key  : Failure.Hash
    Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff88038e039c70

BUGCHECK_P3: ffff88038e039bc8

BUGCHECK_P4: 0

FILE_IN_CAB:  060323-9906-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

TRAP_FRAME:  ffff88038e039c70 -- (.trap 0xffff88038e039c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9e083b393e18 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9e083cd045d8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042a89f29e rsp=ffff88038e039e00 rbp=ffff9e083cd625e0
 r8=0000000000000000  r9=0000000000000000 r10=ffff9e083b393e60
r11=ffff9e083b393e10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiUnlinkUnusedControlArea+0x8e:
fffff804`2a89f29e cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff88038e039bc8 -- (.exr 0xffff88038e039bc8)
ExceptionAddress: fffff8042a89f29e (nt!MiUnlinkUnusedControlArea+0x000000000000008e)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Windows10Unive

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff8803`8e039948 fffff804`2aa0fd29     : 00000000`00000139 00000000`00000003 ffff8803`8e039c70 ffff8803`8e039bc8 : nt!KeBugCheckEx
ffff8803`8e039950 fffff804`2aa10290     : ffff9e08`2f7d8b00 ffff9e08`2f7d8bf8 ffffae8f`a744c3e0 fffff804`00000001 : nt!KiBugCheckDispatch+0x69
ffff8803`8e039a90 fffff804`2aa0e25d     : 00000000`00000000 fffff804`3000b8bb 00000000`00000000 ffff9e08`2f7d8d08 : nt!KiFastFailDispatch+0xd0
ffff8803`8e039c70 fffff804`2a89f29e     : 00000000`ffffffff fffff804`29ca8da1 00000000`ffffffff fffff804`00000000 : nt!KiRaiseSecurityCheckFailure+0x31d
ffff8803`8e039e00 fffff804`2a89f51f     : fffff804`2b250c00 00000000`00000000 00000000`00000000 fffff804`2a954544 : nt!MiUnlinkUnusedControlArea+0x8e
ffff8803`8e039e30 fffff804`2a89f4a5     : ffff8803`8e03a030 fffff804`416a4fdf 00000000`00000000 00000000`00000000 : nt!MiRemoveUnusedSegment+0x4b
ffff8803`8e039e60 fffff804`2a95416d     : ffff9e08`3b393e58 00000000`00000000 ffff9e08`3cd625e0 fffff804`29ca8da1 : nt!MiReferenceActiveControlArea+0x31
ffff8803`8e039e90 fffff804`2ac7ff1e     : fffff804`416e2300 ffff8803`8e03a030 ffff9e08`3cd625e0 fffff804`416ab24d : nt!MiReferenceExistingControlArea+0x69
ffff8803`8e039ec0 fffff804`2ac7f5c4     : ffff9e08`3b393e10 00000000`00000000 00000000`00000004 00000000`00040000 : nt!MiCreateImageOrDataSection+0x27e
ffff8803`8e039fb0 fffff804`2acc1c94     : ffff9e08`325c9a20 ffff8803`8e03a259 ffff9e08`3cd625e0 00000000`00000000 : nt!MiCreateSection+0xf4
ffff8803`8e03a130 fffff804`2a892152     : ffffae8f`a744c170 ffff8803`8e03a259 ffff9e08`3cd625e0 fffff804`00000000 : nt!MmCreateCacheManagerSection+0x4c
ffff8803`8e03a1b0 fffff804`3001104d     : ffffffff`ffffff00 ffffffff`00000000 ffff9e08`00000000 fffff804`300951f0 : nt!CcInitializeCacheMapEx+0x442
ffff8803`8e03a2b0 fffff804`30010dc2     : ffff9e08`2f7d8bf8 ffff9e08`3cd625e0 ffffae8f`a744c188 ffffae8f`a744c200 : Ntfs!NtfsInitializeCacheMap+0x81
ffff8803`8e03a310 fffff804`300089e7     : 00000000`0000bc13 ffff8803`8e03a5c0 00000000`00000005 ffffae8f`a744c170 : Ntfs!NtfsCachedRead+0x8e
ffff8803`8e03a380 fffff804`3000926c     : ffff9e08`2f7d8bf8 ffff9e08`392fb010 00000000`0000bc13 00000000`00000000 : Ntfs!NtfsCommonRead+0x1fc7
ffff8803`8e03a590 fffff804`2a811385     : ffff9e08`2f798050 ffff9e08`392fb010 ffff9e08`392fb010 ffff9e08`1a3da8d0 : Ntfs!NtfsFsdRead+0x1fc
ffff8803`8e03a660 fffff804`29c9710f     : ffff8803`00000007 00000000`00000000 ffffae8f`a744c010 00000000`00000000 : nt!IofCallDriver+0x55
ffff8803`8e03a6a0 fffff804`29c94a43     : ffff8803`8e03a730 ffff9e08`1a3da8d0 ffff9e08`2f7981d8 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8803`8e03a710 fffff804`2a811385     : 00000000`00000000 ffff9e08`3cd625e0 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffff8803`8e03a770 fffff804`2ac10b1c     : 00000000`00000001 ffff9e08`392fb010 ffff9e08`3cd625e0 00000000`00000001 : nt!IofCallDriver+0x55
ffff8803`8e03a7b0 fffff804`2abcc9e8     : 00000000`00000000 ffff8803`8e03ab40 00000000`00000000 00000000`00000000 : nt!IopSynchronousServiceTail+0x34c
ffff8803`8e03a850 fffff804`2abf9ae8     : ffff9e08`3cd625e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopReadFile+0x7cc
ffff8803`8e03a940 fffff804`2aa0f4f8     : 00000000`0000323c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x8a8
ffff8803`8e03aa50 00000000`777d1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`169ced28 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777d1cfc


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the BugCheck.
Arg2: ffffa20d78f0fca0
Arg3: ffffd40157a96000
Arg4: ffffe7090eb7c93c

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1390

    Key  : Analysis.Elapsed.mSec
    Value: 1415

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5144

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 138

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x1a_31_nt!MiApplyCompressedFixups

    Key  : Failure.Hash
    Value: {c331f2d1-f573-4955-bed6-0e48314e3a31}


BUGCHECK_CODE:  1a

BUGCHECK_P1: 31

BUGCHECK_P2: ffffa20d78f0fca0

BUGCHECK_P3: ffffd40157a96000

BUGCHECK_P4: ffffe7090eb7c93c

FILE_IN_CAB:  060323-10296-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SilverBullet.e

STACK_TEXT:
fffff983`ca2474f8 fffff803`3460a267     : 00000000`0000001a 00000000`00000031 ffffa20d`78f0fca0 ffffd401`57a96000 : nt!KeBugCheckEx
fffff983`ca247500 fffff803`34481ca0     : ffffd401`57a96000 ffffe709`0eb7c8f8 00000000`00000081 fffff983`ca248000 : nt!MiApplyCompressedFixups+0x188447
fffff983`ca247560 fffff803`34481a4d     : ffffa20d`75da6080 ffffa20d`78f0fca0 00000000`48c00000 00000000`00000081 : nt!MiPerformFixups+0x88
fffff983`ca247600 fffff803`340c9ff0     : 00000000`00000000 00000000`0000000c 00000000`00000000 00000000`00000000 : nt!MiRelocateImagePfn+0x18d
fffff983`ca247670 fffff803`340d0a24     : ffffa20d`00000000 00000000`00000000 00000000`00000000 ffffa20d`78f36080 : nt!MiValidateInPage+0x260
fffff983`ca247720 fffff803`340d0365     : fffff983`00008000 fffff983`ca247800 fffff983`ca2478b0 fffff803`00000000 : nt!MiWaitForInPageComplete+0x314
fffff983`ca247810 fffff803`3406e818     : 00000000`c0033333 00000000`00000001 00000000`63083970 ffffe709`5454e428 : nt!MiIssueHardFault+0x3c5
fffff983`ca247920 fffff803`3420b7d8     : 00000000`00000000 00007fff`e7367f01 ffffa20d`75da6080 00000000`0074e4c8 : nt!MmAccessFault+0x468
fffff983`ca247ac0 00000000`63083970     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
00000000`00afe318 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x63083970


SYMBOL_NAME:  nt!MiApplyCompressedFixups+188447

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  188447

FAILURE_BUCKET_ID:  0x1a_31_nt!MiApplyCompressedFixups

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c331f2d1-f573-4955-bed6-0e48314e3a31}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000785, physical page number
Arg3: 0000017f226d9cb0, zero
Arg4: ffff86814cf65000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1390

    Key  : Analysis.Elapsed.mSec
    Value: 1436

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5557

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 135

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0x785

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0x405a9260

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x9cb0

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0x75478

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0x5a777

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x29f43f

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x12b

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

    Key  : Failure.Hash
    Value: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}


BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 785

BUGCHECK_P3: 17f226d9cb0

BUGCHECK_P4: ffff86814cf65000

FILE_IN_CAB:  060423-9140-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT:
fffffb01`482cf1b8 fffff803`3039a5e2     : 00000000`0000012b ffffffff`c00002c4 00000000`00000785 0000017f`226d9cb0 : nt!KeBugCheckEx
fffffb01`482cf1c0 fffff803`30239ae3     : 00000000`00000001 00000000`c00002c4 ffff8681`4cf65000 00000000`00040000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
fffffb01`482cf220 fffff803`3005b9a1     : 00000000`00000004 fffff803`3015728a 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1de11f
fffffb01`482cf2e0 fffff803`30156ff0     : 00000000`00000001 00000000`00009cb0 00000000`00000000 ffffc109`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
fffffb01`482cf330 fffff803`30157904     : 00000000`ffffffff ffffc109`ba1d7000 fffffb01`482cf410 ffffc109`bc689090 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
fffffb01`482cf3d0 fffff803`30157aed     : ffff8681`349cc730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
fffffb01`482cf480 fffff803`3005c071     : ffffc109`b1bcd000 ffffc109`bc689090 ffffc109`ba1d7000 ffffc109`b1bce9c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffffb01`482cf500 fffff803`300ad478     : ffffc109`b11d4080 ffffc109`b1bcd000 00000000`00000000 ffffc109`c32c89b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffffb01`482cf530 fffff803`3005cb57     : fffff803`3005c050 fffffb01`482cf5d0 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffb01`482cf5a0 fffff803`3005713c     : fffffb01`482cf6a0 00000000`31526d73 00000000`000003ff fffff803`30b239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
fffffb01`482cf670 fffff803`30056b70     : 00000000`0000000c 00000000`000003ff fffffb01`482cf720 fffff803`30b239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
fffffb01`482cf6c0 fffff803`30158727     : 00000000`0000000c 00000000`00000010 ffffc109`bc689090 ffffc109`c32c89b0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
fffffb01`482cf750 fffff803`3012b94b     : ffffc109`00000010 ffffc109`c32c8a70 00000000`00000000 ffffc109`b1bcd000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
fffffb01`482cf7c0 fffff803`300d1020     : 0000007f`00000100 00000000`00000000 fffffb01`482cfa18 fffff803`300d06e0 : nt!SmPageRead+0x33
fffffb01`482cf810 fffff803`300d023d     : 00000000`00000002 fffffb01`482cf8a0 fffffb01`482cfa18 ffffc109`c32c8960 : nt!MiIssueHardFaultIo+0x10c
fffffb01`482cf860 fffff803`3006e818     : 00000000`c0033333 00000000`00000001 00000000`136dba88 00000000`00000000 : nt!MiIssueHardFault+0x29d
fffffb01`482cf920 fffff803`3020b7d8     : 00000000`000003dc fffffb01`482cfb40 00000000`6be4c840 ffffc109`00000000 : nt!MmAccessFault+0x468
fffffb01`482cfac0 00000000`6ba964fa     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
00000000`0e90ea70 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6ba964fa


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+10a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10a

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffd70007b74070
Arg3: 0000000000000039
Arg4: 0000000000000042

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1624

    Key  : Analysis.Elapsed.mSec
    Value: 1641

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5201

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 136

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x1a_41790_nt!MiDecreaseUsedPtesCount

    Key  : Failure.Hash
    Value: {3a4e374b-adfe-575c-a9c4-4050eb1047a4}


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffd70007b74070

BUGCHECK_P3: 39

BUGCHECK_P4: 42

FILE_IN_CAB:  060423-10843-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MBAMService.ex

STACK_TEXT:
ffffb105`b69c6b68 fffff802`0907488d     : 00000000`0000001a 00000000`00041790 ffffd700`07b74070 00000000`00000039 : nt!KeBugCheckEx
ffffb105`b69c6b70 fffff802`08ff2dc8     : 00000000`00000042 ffffd700`0aa81a30 ffffd700`07b74070 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x154b39
ffffb105`b69c6bb0 fffff802`08ec08ca     : 00000000`0038d5e1 80000000`00000000 00000000`00000001 00000000`000000e1 : nt!MiReducePteUseCount+0x30
ffffb105`b69c6be0 fffff802`08eb8c8e     : ffffb105`b69c6e90 ffff9309`e34aa080 00000000`00000000 ffffb105`b69c78d0 : nt!MiDeletePteList+0x88a
ffffb105`b69c6cc0 fffff802`09225c5d     : ffff9309`e3b9e080 ffff9309`e9c34f08 00000000`00000000 00000000`00000000 : nt!MiDecommitPages+0x121e
ffffb105`b69c7890 fffff802`092252c3     : ffffb105`b69c7a10 00000000`00000000 ffffb105`b69c7a10 ffff9309`e9c34ee0 : nt!MiDecommitRegion+0x7d
ffffb105`b69c7910 fffff802`09224bb5     : 00000000`00000000 ffff9309`e37bee70 ffffb105`b69c7ad8 ffff9309`e37bee70 : nt!MmFreeVirtualMemory+0x6d3
ffffb105`b69c7a60 fffff802`0900f4f8     : ffff9309`e3b9e080 ffff9309`00000000 00000000`00000000 ffff9309`e37bee70 : nt!NtFreeVirtualMemory+0x95
ffffb105`b69c7ac0 00007ffc`b2d4d424     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d0`253fdfe8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b2d4d424


SYMBOL_NAME:  nt!MiDecreaseUsedPtesCount+154b39

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  154b39

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDecreaseUsedPtesCount

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3a4e374b-adfe-575c-a9c4-4050eb1047a4}

Followup:     MachineOwner
---------
 
Son düzenleme:
EDIT: Paylaştığınız minidump dosyalarıyla konu başındaki sisteminiz uyuşmuyor. Minidump dosyalarında AMD bir sistem var. İşlemcisi de Ryzen 5 5600. Hangisi doğru? Intel mi AMD mi var sizde? Başkasının minidump dosyalarını yüklemiş olabilir misiniz?

---------


* Mavi ekranlarınız büyük oranla RAM kaynaklı görünüyor.

* Memtest86 ile test yapmanız gerekecek.


Ancak testten önce birkaç önerim daha var.

* BIOS'unuz eski, ayrıca beta bir sürüm kullanıyorsunuz: 7C52v3H1(Beta version)

7C52v3I sürümüne güncelleyin.


* Chipset sürücülerinizi buradan güncelleyin, eskisini silin (AMD Chipset Software).

SSD'niz Adata Legend 700 512GBPCIe Gen3 x4 M.2 NVMe SSD mi?

* Adata'nın yazılımı var mı sistemde? Varsa firmware güncellemelerini kontrol edin.
* Yoksa indirip kurun, firmware güncellemesi var mı diye bir bakın.
* Sağlığını da bir kontrol edin.
ADATA SSD ToolBox

* Harici Bluetooth adaptörünüzün sürücülerini güncelleyin.


* Tüm bunlar sonucunda hata almaya devam ederseniz yeni dökümleri paylaşın, yüksek ihtimalle RAM ile alakalı hatalar devam edecek. O yüzden zaman kaybetmeden Memtest86 ile test yapabilirsiniz.



Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8017de03f35, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5062

    Key  : Analysis.Elapsed.mSec
    Value: 5307

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12289

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 148

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1e

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: AV_R_nt!KiSwapContext

    Key  : Failure.Hash
    Value: {749675b6-a9e8-b0d9-edce-4ac859e619cf}


BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8017de03f35

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

FILE_IN_CAB:  060323-9125-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: fffff8017e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64

STACK_TEXT:
ffffda80`547bf8e8 fffff801`7de60cd3     : 00000000`0000001e ffffffff`c0000005 fffff801`7de03f35 00000000`00000000 : nt!KeBugCheckEx
ffffda80`547bf8f0 fffff801`7ddfcdb2     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1795c3
ffffda80`547bffb0 fffff801`7ddfcd80     : fffff801`7de0fe65 ffffb607`06ec0080 fffff801`7dc1beef 00000000`00000002 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffc684`38637458 fffff801`7de0fe65     : ffffb607`06ec0080 fffff801`7dc1beef 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffc684`38637460 fffff801`7de0b45a     : ffffb607`06ec0080 00000000`00000000 ffffda80`5479f180 fffff801`7de047d3 : nt!KiExceptionDispatch+0x125
ffffc684`38637640 fffff801`7de03f35     : ffff3801`7dc1c9c0 ffff9880`00000000 00001000`00000000 ffffb406`00000000 : nt!KiGeneralProtectionFault+0x31a
ffffc684`386377d8 ffff3801`7dc1c9c0     : ffff9880`00000000 00001000`00000000 ffffb406`00000000 ffffb801`7dc26a06 : nt!KiSwapContext+0xd5
ffffc684`386377e0 ffff9880`00000000     : 00001000`00000000 ffffb406`00000000 ffffb801`7dc26a06 00000000`00000000 : 0xffff3801`7dc1c9c0
ffffc684`386377e8 00001000`00000000     : ffffb406`00000000 ffffb801`7dc26a06 00000000`00000000 00000000`00000000 : 0xffff9880`00000000
ffffc684`386377f0 ffffb406`00000000     : ffffb801`7dc26a06 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00001000`00000000
ffffc684`386377f8 ffffb801`7dc26a06     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`91977064 : 0xffffb406`00000000
ffffc684`38637800 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`91977064 00000000`00000000 : 0xffffb801`7dc26a06


SYMBOL_NAME:  nt!KiSwapContext+d5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  d5

FAILURE_BUCKET_ID:  AV_R_nt!KiSwapContext

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {749675b6-a9e8-b0d9-edce-4ac859e619cf}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff88038e039c70, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff88038e039bc8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4343

    Key  : Analysis.Elapsed.mSec
    Value: 4427

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12823

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 155

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x139

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : Failure.Bucket
    Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

    Key  : Failure.Hash
    Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff88038e039c70

BUGCHECK_P3: ffff88038e039bc8

BUGCHECK_P4: 0

FILE_IN_CAB:  060323-9906-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

TRAP_FRAME:  ffff88038e039c70 -- (.trap 0xffff88038e039c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9e083b393e18 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff9e083cd045d8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042a89f29e rsp=ffff88038e039e00 rbp=ffff9e083cd625e0
 r8=0000000000000000  r9=0000000000000000 r10=ffff9e083b393e60
r11=ffff9e083b393e10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiUnlinkUnusedControlArea+0x8e:
fffff804`2a89f29e cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff88038e039bc8 -- (.exr 0xffff88038e039bc8)
ExceptionAddress: fffff8042a89f29e (nt!MiUnlinkUnusedControlArea+0x000000000000008e)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Windows10Unive

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff8803`8e039948 fffff804`2aa0fd29     : 00000000`00000139 00000000`00000003 ffff8803`8e039c70 ffff8803`8e039bc8 : nt!KeBugCheckEx
ffff8803`8e039950 fffff804`2aa10290     : ffff9e08`2f7d8b00 ffff9e08`2f7d8bf8 ffffae8f`a744c3e0 fffff804`00000001 : nt!KiBugCheckDispatch+0x69
ffff8803`8e039a90 fffff804`2aa0e25d     : 00000000`00000000 fffff804`3000b8bb 00000000`00000000 ffff9e08`2f7d8d08 : nt!KiFastFailDispatch+0xd0
ffff8803`8e039c70 fffff804`2a89f29e     : 00000000`ffffffff fffff804`29ca8da1 00000000`ffffffff fffff804`00000000 : nt!KiRaiseSecurityCheckFailure+0x31d
ffff8803`8e039e00 fffff804`2a89f51f     : fffff804`2b250c00 00000000`00000000 00000000`00000000 fffff804`2a954544 : nt!MiUnlinkUnusedControlArea+0x8e
ffff8803`8e039e30 fffff804`2a89f4a5     : ffff8803`8e03a030 fffff804`416a4fdf 00000000`00000000 00000000`00000000 : nt!MiRemoveUnusedSegment+0x4b
ffff8803`8e039e60 fffff804`2a95416d     : ffff9e08`3b393e58 00000000`00000000 ffff9e08`3cd625e0 fffff804`29ca8da1 : nt!MiReferenceActiveControlArea+0x31
ffff8803`8e039e90 fffff804`2ac7ff1e     : fffff804`416e2300 ffff8803`8e03a030 ffff9e08`3cd625e0 fffff804`416ab24d : nt!MiReferenceExistingControlArea+0x69
ffff8803`8e039ec0 fffff804`2ac7f5c4     : ffff9e08`3b393e10 00000000`00000000 00000000`00000004 00000000`00040000 : nt!MiCreateImageOrDataSection+0x27e
ffff8803`8e039fb0 fffff804`2acc1c94     : ffff9e08`325c9a20 ffff8803`8e03a259 ffff9e08`3cd625e0 00000000`00000000 : nt!MiCreateSection+0xf4
ffff8803`8e03a130 fffff804`2a892152     : ffffae8f`a744c170 ffff8803`8e03a259 ffff9e08`3cd625e0 fffff804`00000000 : nt!MmCreateCacheManagerSection+0x4c
ffff8803`8e03a1b0 fffff804`3001104d     : ffffffff`ffffff00 ffffffff`00000000 ffff9e08`00000000 fffff804`300951f0 : nt!CcInitializeCacheMapEx+0x442
ffff8803`8e03a2b0 fffff804`30010dc2     : ffff9e08`2f7d8bf8 ffff9e08`3cd625e0 ffffae8f`a744c188 ffffae8f`a744c200 : Ntfs!NtfsInitializeCacheMap+0x81
ffff8803`8e03a310 fffff804`300089e7     : 00000000`0000bc13 ffff8803`8e03a5c0 00000000`00000005 ffffae8f`a744c170 : Ntfs!NtfsCachedRead+0x8e
ffff8803`8e03a380 fffff804`3000926c     : ffff9e08`2f7d8bf8 ffff9e08`392fb010 00000000`0000bc13 00000000`00000000 : Ntfs!NtfsCommonRead+0x1fc7
ffff8803`8e03a590 fffff804`2a811385     : ffff9e08`2f798050 ffff9e08`392fb010 ffff9e08`392fb010 ffff9e08`1a3da8d0 : Ntfs!NtfsFsdRead+0x1fc
ffff8803`8e03a660 fffff804`29c9710f     : ffff8803`00000007 00000000`00000000 ffffae8f`a744c010 00000000`00000000 : nt!IofCallDriver+0x55
ffff8803`8e03a6a0 fffff804`29c94a43     : ffff8803`8e03a730 ffff9e08`1a3da8d0 ffff9e08`2f7981d8 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff8803`8e03a710 fffff804`2a811385     : 00000000`00000000 ffff9e08`3cd625e0 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffff8803`8e03a770 fffff804`2ac10b1c     : 00000000`00000001 ffff9e08`392fb010 ffff9e08`3cd625e0 00000000`00000001 : nt!IofCallDriver+0x55
ffff8803`8e03a7b0 fffff804`2abcc9e8     : 00000000`00000000 ffff8803`8e03ab40 00000000`00000000 00000000`00000000 : nt!IopSynchronousServiceTail+0x34c
ffff8803`8e03a850 fffff804`2abf9ae8     : ffff9e08`3cd625e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopReadFile+0x7cc
ffff8803`8e03a940 fffff804`2aa0f4f8     : 00000000`0000323c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x8a8
ffff8803`8e03aa50 00000000`777d1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`169ced28 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777d1cfc


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the BugCheck.
Arg2: ffffa20d78f0fca0
Arg3: ffffd40157a96000
Arg4: ffffe7090eb7c93c

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1390

    Key  : Analysis.Elapsed.mSec
    Value: 1415

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5144

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 138

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x1a_31_nt!MiApplyCompressedFixups

    Key  : Failure.Hash
    Value: {c331f2d1-f573-4955-bed6-0e48314e3a31}


BUGCHECK_CODE:  1a

BUGCHECK_P1: 31

BUGCHECK_P2: ffffa20d78f0fca0

BUGCHECK_P3: ffffd40157a96000

BUGCHECK_P4: ffffe7090eb7c93c

FILE_IN_CAB:  060323-10296-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SilverBullet.e

STACK_TEXT:
fffff983`ca2474f8 fffff803`3460a267     : 00000000`0000001a 00000000`00000031 ffffa20d`78f0fca0 ffffd401`57a96000 : nt!KeBugCheckEx
fffff983`ca247500 fffff803`34481ca0     : ffffd401`57a96000 ffffe709`0eb7c8f8 00000000`00000081 fffff983`ca248000 : nt!MiApplyCompressedFixups+0x188447
fffff983`ca247560 fffff803`34481a4d     : ffffa20d`75da6080 ffffa20d`78f0fca0 00000000`48c00000 00000000`00000081 : nt!MiPerformFixups+0x88
fffff983`ca247600 fffff803`340c9ff0     : 00000000`00000000 00000000`0000000c 00000000`00000000 00000000`00000000 : nt!MiRelocateImagePfn+0x18d
fffff983`ca247670 fffff803`340d0a24     : ffffa20d`00000000 00000000`00000000 00000000`00000000 ffffa20d`78f36080 : nt!MiValidateInPage+0x260
fffff983`ca247720 fffff803`340d0365     : fffff983`00008000 fffff983`ca247800 fffff983`ca2478b0 fffff803`00000000 : nt!MiWaitForInPageComplete+0x314
fffff983`ca247810 fffff803`3406e818     : 00000000`c0033333 00000000`00000001 00000000`63083970 ffffe709`5454e428 : nt!MiIssueHardFault+0x3c5
fffff983`ca247920 fffff803`3420b7d8     : 00000000`00000000 00007fff`e7367f01 ffffa20d`75da6080 00000000`0074e4c8 : nt!MmAccessFault+0x468
fffff983`ca247ac0 00000000`63083970     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
00000000`00afe318 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x63083970


SYMBOL_NAME:  nt!MiApplyCompressedFixups+188447

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  188447

FAILURE_BUCKET_ID:  0x1a_31_nt!MiApplyCompressedFixups

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c331f2d1-f573-4955-bed6-0e48314e3a31}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000785, physical page number
Arg3: 0000017f226d9cb0, zero
Arg4: ffff86814cf65000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1390

    Key  : Analysis.Elapsed.mSec
    Value: 1436

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5557

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 135

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0x785

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0x405a9260

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x9cb0

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0x75478

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0x5a777

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x29f43f

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x12b

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

    Key  : Failure.Hash
    Value: {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}


BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 785

BUGCHECK_P3: 17f226d9cb0

BUGCHECK_P4: ffff86814cf65000

FILE_IN_CAB:  060423-9140-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT:
fffffb01`482cf1b8 fffff803`3039a5e2     : 00000000`0000012b ffffffff`c00002c4 00000000`00000785 0000017f`226d9cb0 : nt!KeBugCheckEx
fffffb01`482cf1c0 fffff803`30239ae3     : 00000000`00000001 00000000`c00002c4 ffff8681`4cf65000 00000000`00040000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
fffffb01`482cf220 fffff803`3005b9a1     : 00000000`00000004 fffff803`3015728a 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1de11f
fffffb01`482cf2e0 fffff803`30156ff0     : 00000000`00000001 00000000`00009cb0 00000000`00000000 ffffc109`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
fffffb01`482cf330 fffff803`30157904     : 00000000`ffffffff ffffc109`ba1d7000 fffffb01`482cf410 ffffc109`bc689090 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
fffffb01`482cf3d0 fffff803`30157aed     : ffff8681`349cc730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
fffffb01`482cf480 fffff803`3005c071     : ffffc109`b1bcd000 ffffc109`bc689090 ffffc109`ba1d7000 ffffc109`b1bce9c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffffb01`482cf500 fffff803`300ad478     : ffffc109`b11d4080 ffffc109`b1bcd000 00000000`00000000 ffffc109`c32c89b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffffb01`482cf530 fffff803`3005cb57     : fffff803`3005c050 fffffb01`482cf5d0 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffb01`482cf5a0 fffff803`3005713c     : fffffb01`482cf6a0 00000000`31526d73 00000000`000003ff fffff803`30b239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
fffffb01`482cf670 fffff803`30056b70     : 00000000`0000000c 00000000`000003ff fffffb01`482cf720 fffff803`30b239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
fffffb01`482cf6c0 fffff803`30158727     : 00000000`0000000c 00000000`00000010 ffffc109`bc689090 ffffc109`c32c89b0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
fffffb01`482cf750 fffff803`3012b94b     : ffffc109`00000010 ffffc109`c32c8a70 00000000`00000000 ffffc109`b1bcd000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
fffffb01`482cf7c0 fffff803`300d1020     : 0000007f`00000100 00000000`00000000 fffffb01`482cfa18 fffff803`300d06e0 : nt!SmPageRead+0x33
fffffb01`482cf810 fffff803`300d023d     : 00000000`00000002 fffffb01`482cf8a0 fffffb01`482cfa18 ffffc109`c32c8960 : nt!MiIssueHardFaultIo+0x10c
fffffb01`482cf860 fffff803`3006e818     : 00000000`c0033333 00000000`00000001 00000000`136dba88 00000000`00000000 : nt!MiIssueHardFault+0x29d
fffffb01`482cf920 fffff803`3020b7d8     : 00000000`000003dc fffffb01`482cfb40 00000000`6be4c840 ffffc109`00000000 : nt!MmAccessFault+0x468
fffffb01`482cfac0 00000000`6ba964fa     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
00000000`0e90ea70 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6ba964fa


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+10a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10a

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffd70007b74070
Arg3: 0000000000000039
Arg4: 0000000000000042

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1624

    Key  : Analysis.Elapsed.mSec
    Value: 1641

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5201

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 136

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x1a_41790_nt!MiDecreaseUsedPtesCount

    Key  : Failure.Hash
    Value: {3a4e374b-adfe-575c-a9c4-4050eb1047a4}


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffd70007b74070

BUGCHECK_P3: 39

BUGCHECK_P4: 42

FILE_IN_CAB:  060423-10843-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MBAMService.ex

STACK_TEXT:
ffffb105`b69c6b68 fffff802`0907488d     : 00000000`0000001a 00000000`00041790 ffffd700`07b74070 00000000`00000039 : nt!KeBugCheckEx
ffffb105`b69c6b70 fffff802`08ff2dc8     : 00000000`00000042 ffffd700`0aa81a30 ffffd700`07b74070 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x154b39
ffffb105`b69c6bb0 fffff802`08ec08ca     : 00000000`0038d5e1 80000000`00000000 00000000`00000001 00000000`000000e1 : nt!MiReducePteUseCount+0x30
ffffb105`b69c6be0 fffff802`08eb8c8e     : ffffb105`b69c6e90 ffff9309`e34aa080 00000000`00000000 ffffb105`b69c78d0 : nt!MiDeletePteList+0x88a
ffffb105`b69c6cc0 fffff802`09225c5d     : ffff9309`e3b9e080 ffff9309`e9c34f08 00000000`00000000 00000000`00000000 : nt!MiDecommitPages+0x121e
ffffb105`b69c7890 fffff802`092252c3     : ffffb105`b69c7a10 00000000`00000000 ffffb105`b69c7a10 ffff9309`e9c34ee0 : nt!MiDecommitRegion+0x7d
ffffb105`b69c7910 fffff802`09224bb5     : 00000000`00000000 ffff9309`e37bee70 ffffb105`b69c7ad8 ffff9309`e37bee70 : nt!MmFreeVirtualMemory+0x6d3
ffffb105`b69c7a60 fffff802`0900f4f8     : ffff9309`e3b9e080 ffff9309`00000000 00000000`00000000 ffff9309`e37bee70 : nt!NtFreeVirtualMemory+0x95
ffffb105`b69c7ac0 00007ffc`b2d4d424     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d0`253fdfe8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b2d4d424


SYMBOL_NAME:  nt!MiDecreaseUsedPtesCount+154b39

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  154b39

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDecreaseUsedPtesCount

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3a4e374b-adfe-575c-a9c4-4050eb1047a4}

Followup:     MachineOwner
---------
 
Paylaştığınız arşivin içerisinde .txt dosyaları var.

.dmp dosyalarınızı .txt olarak değil, direk orijinal halleriyle yükler misiniz?
 
hocam benim sistem yanlış mı yüklenmiş acaba benim yazdığım gibi çünki özellikleri

hocam birlikte aç yapmıştım orjinale çeviremedim oyüzden kopyalayıp yükledim nasıl orjinale çeviririm dosyaları

hocam birlikte aç yapmıştım orjinale çeviremedim oyüzden kopyalayıp yükledim nasıl orjinale çeviririm dosyaları

bu şekilde olduğu için rar yapamıyorum dosyaları
 

Dosya Ekleri

  • Ekran görüntüsü 2023-06-04 202940.png
    Ekran görüntüsü 2023-06-04 202940.png
    126 KB · Görüntüleme: 37
  • Ekran görüntüsü 2023-06-04 203007.png
    Ekran görüntüsü 2023-06-04 203007.png
    156,3 KB · Görüntüleme: 27
  • Ekran görüntüsü 2023-06-04 203112.png
    Ekran görüntüsü 2023-06-04 203112.png
    140 KB · Görüntüleme: 19
  • Ekran görüntüsü 2023-06-04 203640.png
    Ekran görüntüsü 2023-06-04 203640.png
    146,4 KB · Görüntüleme: 28
Son attığınız ekran görüntüsündeki orijinal olanları masaüstüne kopyalayın, arşivleyin ve gönderin. Orijinallerine bir şey olmamış.
 
Evet şimdi bir problem yok.

* BIOS güncel.
* Ekran kartı sürücüleri ile alakalı bir problem var gibi.

* Ekran kartı sürücünüz 17 Mart 2023'ten kalma.
Rich (BB code):
    Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispig.inf_amd64_50916785244854f2\nvlddmkm.sys
    Image name: nvlddmkm.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Mar 17 02:16:07 2023 (6413A337)
    CheckSum:         037956CA
    ImageSize:        03897000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:


* İlk etapta onu güncelleyerek başlayın.
* Garanti olsun diyorsanız Rehber: DDU ile Sürücü Kaldırma Rehberi bu rehberi takip ederek sürücüleri temizleyin ve yenisini yükleyin.
* Zorunlu değil, ama öneririm.

Güncel sürüm:


Ekran kartı sürücü güncellemesinden sonra mavi ekran alırsanız yeni minidump dosyalarınızı paylaşın.



* Buradan sonrasını yapmasanız da olur, genel performans ve güncel olmak adına öneriyorum.

* Ses sürücünüz eski kalmış, güncelleyebilirsiniz.

SSD'niz Adata Legend 700 512GBPCIe Gen3 x4 M.2 NVMe SSD mi?

* Adata'nın yazılımı var mı sistemde? Varsa firmware güncellemelerini kontrol edin.
* Yoksa indirip kurun, firmware güncellemesi var mı diye bir bakın.
* Sağlığını da bir kontrol edin.
ADATA SSD ToolBox


* Windows eski görünüyor. Bazen dökümlerden güncel mi değil mi anlaşılmıyor, güncel değilse Windows Update aracılığıyla güncelleyin işletim sisteminizi.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa9405d6bf558, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8064be57804, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.Elapsed.mSec
    Value: 4078

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9793

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 137

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_nt!ExpAllocateHandleTableEntry

    Key  : Failure.Hash
    Value: {057ca722-8246-3c91-57a3-2501ef38bce9}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa9405d6bf558

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8064be57804

BUGCHECK_P4: 2

FILE_IN_CAB:  060423-7359-01.dmp.dmp

READ_ADDRESS: fffff8064c4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa9405d6bf558

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

TRAP_FRAME:  ffffa202b34474a0 -- (.trap 0xffffa202b34474a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff920b731832c0
rdx=ffffa9005aec5b40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064be57804 rsp=ffffa202b3447630 rbp=0000000000000008
 r8=ffffa202b3447640  r9=0000000000000000 r10=0000000000000000
r11=ffffa900619914b6 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpAllocateHandleTableEntry+0xe4:
fffff806`4be57804 498b4708        mov     rax,qword ptr [r15+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
ffffa202`b34471f8 fffff806`4bc4af53     : 00000000`00000050 ffffa940`5d6bf558 00000000`00000000 ffffa202`b34474a0 : nt!KeBugCheckEx
ffffa202`b3447200 fffff806`4ba6e7b0     : 00000000`00000000 00000000`00000000 ffffa202`b3447520 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffffa202`b3447300 fffff806`4bc0bad8     : ffffa900`619d4030 ffffa202`b34476a0 ffffa900`5d606980 ffffa202`b34477f0 : nt!MmAccessFault+0x400
ffffa202`b34474a0 fffff806`4be57804     : ffffa900`5aec5b40 00000000`00000001 00000000`00000000 00000000`00000006 : nt!KiPageFault+0x358
ffffa202`b3447630 fffff806`4be576a8     : 00000000`00000400 00000000`00000000 ffffa900`5aec5b00 ffff920b`731832c0 : nt!ExpAllocateHandleTableEntry+0xe4
ffffa202`b3447680 fffff806`4becebd6     : 00000000`00000000 00000000`00000000 ffffa202`b3447ac0 ffff920b`00000000 : nt!ExCreateHandleEx+0x78
ffffa202`b34476d0 fffff806`4ba33d8c     : 00000000`00000000 ffffa900`61991450 00000000`00000000 0000004f`c8cfd1d0 : nt!RtlpInsertStringAtom+0x2a
ffffa202`b3447710 fffff806`4bec4034     : ffffa900`5aed6630 00000000`00000026 0000004f`c8cfd1c0 0000004f`c8cfd1c0 : nt!RtlAddAtomToAtomTableEx+0x13c
ffffa202`b34477b0 fffff806`4bc0f7f5     : ffff920b`731832c0 000001ea`75350000 ffffa202`b3447ac0 ffff920b`730a3080 : nt!NtAddAtomEx+0x124
ffffa202`b3447a40 00007fff`0a98ddc4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004f`c8cfd118 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0a98ddc4


SYMBOL_NAME:  nt!ExpAllocateHandleTableEntry+e4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.3031

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  AV_R_(null)_nt!ExpAllocateHandleTableEntry

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {057ca722-8246-3c91-57a3-2501ef38bce9}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff9f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8059da8cda6, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.Elapsed.mSec
    Value: 4122

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 22410

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_dxgmms2!VidSchiProfilePerformanceTick

    Key  : Failure.Hash
    Value: {cb0b1289-fb87-52e2-f284-4f9f64401311}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffffffffffff9f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8059da8cda6

FILE_IN_CAB:  060423-7125-01.dmp.dmp

READ_ADDRESS: fffff805650fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffff9f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffff8806cca8a1e0 -- (.trap 0xffff8806cca8a1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=3e2f5f2515890000
rdx=000000000000000e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8059da8cda6 rsp=ffff8806cca8a370 rbp=0000000000000000
 r8=ffff8806cca89ee0  r9=0000000000000000 r10=0000000000000000
r11=fffff8059dab2680 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
dxgmms2!VidSchiProfilePerformanceTick+0x12926:
fffff805`9da8cda6 4c8b559f        mov     r10,qword ptr [rbp-61h] ss:0018:ffffffff`ffffff9f=????????????????
Resetting default scope

STACK_TEXT:
ffff8806`cca8a098 fffff805`64810029     : 00000000`0000000a ffffffff`ffffff9f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8806`cca8a0a0 fffff805`6480bbe3     : 00000000`00000000 fffff805`9da93d62 00000000`00000000 fffff805`7f2cd5cf : nt!KiBugCheckDispatch+0x69
ffff8806`cca8a1e0 fffff805`9da8cda6     : ffffca03`bd5b9000 00000000`00000001 ffff8806`cca8a418 ffffca03`c5f5a240 : nt!KiPageFault+0x463
ffff8806`cca8a370 fffff805`9daabf1c     : ffffca03`c2bfc630 ffff8806`cca8a4b4 ffffca03`c693f010 ffffca03`bd5b9000 : dxgmms2!VidSchiProfilePerformanceTick+0x12926
ffff8806`cca8a490 fffff805`9daaa0ca     : ffffca03`c693f010 ffffca03`bd561000 ffffca03`c693f120 ffffca03`c2d99010 : dxgmms2!VidSchiSubmitCommandPacketToHwQueue+0xc8
ffff8806`cca8a510 fffff805`7f4fee0c     : 00000000`00000000 00000000`00000000 00000000`08000000 ffffca03`c2d99010 : dxgmms2!VidSchSubmitCommandToHwQueue+0x2da
ffff8806`cca8a570 fffff805`7f501c6a     : ffff8806`cca8aac0 ffff8806`cca8a908 ffff8806`cca8a908 ffff8806`cca8a941 : dxgkrnl!DXGHWQUEUE::SubmitCommand+0x5d4
ffff8806`cca8a880 fffff805`7f5018db     : 000000a6`79ccfa80 ffffca03`c4ace080 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueueInternal+0x382
ffff8806`cca8aa10 fffff805`6480ff9a     : ffffca03`c4ace080 ffffca03`c36e82e0 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueue+0xb
ffff8806`cca8aa40 00007ffc`aa5e5b04     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3ef
000000a6`79ccf9e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`aa5e5b04


SYMBOL_NAME:  dxgmms2!VidSchiProfilePerformanceTick+12926

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  12926

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiProfilePerformanceTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cb0b1289-fb87-52e2-f284-4f9f64401311}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa40d609a1378, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff804e473220b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1437

    Key  : Analysis.Elapsed.mSec
    Value: 3899

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13946

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_WdNisDrv!unknown_function

    Key  : Failure.Hash
    Value: {277a463a-5282-a91c-e1d6-c17eaf8303e7}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa40d609a1378

BUGCHECK_P2: 0

BUGCHECK_P3: fffff804e473220b

BUGCHECK_P4: 2

FILE_IN_CAB:  060423-7390-01.dmp.dmp

READ_ADDRESS: fffff8046d2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa40d609a1378

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffffb58d5332d980 -- (.trap 0xffffb58d5332d980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa40f5feb8480 rbx=0000000000000000 rcx=0000000000000136
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804e473220b rsp=ffffb58d5332db10 rbp=ffffb58d5332dc60
 r8=ffffb58d5332db80  r9=0000000000000108 r10=ffffa40d609a1350
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
WdNisDrv+0x220b:
fffff804`e473220b 418b7a28        mov     edi,dword ptr [r10+28h] ds:ffffa40d`609a1378=????????
Resetting default scope

STACK_TEXT:
ffffb58d`5332d6d8 fffff804`6ca4af53     : 00000000`00000050 ffffa40d`609a1378 00000000`00000000 ffffb58d`5332d980 : nt!KeBugCheckEx
ffffb58d`5332d6e0 fffff804`6c86e7b0     : 00000000`00000008 00000000`00000000 ffffb58d`5332da00 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffffb58d`5332d7e0 fffff804`6ca0bad8     : ffffa40f`627dc790 ffffa40f`627dc790 ffffa40f`627d020c 00000000`00000000 : nt!MmAccessFault+0x400
ffffb58d`5332d980 fffff804`e473220b     : ffffb58d`5332db98 ffffb58d`5332db90 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
ffffb58d`5332db10 ffffb58d`5332db98     : ffffb58d`5332db90 00000000`00000000 00000000`00000000 00000000`00000000 : WdNisDrv+0x220b
ffffb58d`5332db18 ffffb58d`5332db90     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xffffb58d`5332db98
ffffb58d`5332db20 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa40f`627d020c : 0xffffb58d`5332db90


SYMBOL_NAME:  WdNisDrv+220b

MODULE_NAME: WdNisDrv

IMAGE_NAME:  WdNisDrv.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  220b

FAILURE_BUCKET_ID:  AV_R_(null)_WdNisDrv!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {277a463a-5282-a91c-e1d6-c17eaf8303e7}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc40a62bc92b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021f6b4694, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1593

    Key  : Analysis.Elapsed.mSec
    Value: 3467

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11339

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xa

    Key  : Failure.Bucket
    Value: AV_nt!MiGetPageProtection

    Key  : Failure.Hash
    Value: {41372a35-237d-1281-82f6-8f5f9bf6044a}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffc40a62bc92b0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8021f6b4694

FILE_IN_CAB:  060223-7812-01.dmp.dmp

READ_ADDRESS: fffff802200fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc40a62bc92b0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WmiPrvSE.exe

TRAP_FRAME:  ffffec854bb872f0 -- (.trap 0xffffec854bb872f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40a62bc92b0 rbx=0000000000000000 rcx=00000000ffffffff
rdx=00000000000003ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021f6b4694 rsp=ffffec854bb87480 rbp=0000000000000000
 r8=ffffec854bb87558  r9=ffffec854bb87554 r10=fffff77bbddee7f8
r11=fffff77bbddee000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiGetPageProtection+0x4d4:
fffff802`1f6b4694 488b08          mov     rcx,qword ptr [rax] ds:ffffc40a`62bc92b0=????????????????
Resetting default scope

STACK_TEXT:
ffffec85`4bb871a8 fffff802`1f810029     : 00000000`0000000a ffffc40a`62bc92b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffec85`4bb871b0 fffff802`1f80bbe3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffec85`4bb872f0 fffff802`1f6b4694     : 0000007f`fffffff8 00000000`00000000 ffff8802`e740e038 00000000`00000000 : nt!KiPageFault+0x463
ffffec85`4bb87480 fffff802`1f6b3005     : 00000000`00000000 00000000`00000000 ffffec85`4bb87558 ffffec85`4bb87554 : nt!MiGetPageProtection+0x4d4
ffffec85`4bb87500 fffff802`1f62c2bf     : 00000000`00000000 0000024f`76e60000 c40263f5`b050ff4d 00000000`00001400 : nt!MiQueryAddressState+0x4b5
ffffec85`4bb87710 fffff802`1fa22a6c     : ffffec85`4bb80000 00000000`00000000 ffffc402`00000000 ffffc402`00000000 : nt!MiQueryAddressSpan+0xcf
ffffec85`4bb877d0 fffff802`1fa22215     : ffffeb03`b6b8ca6c 00000000`00000000 00000192`99f5e7c0 00000000`00001634 : nt!MmQueryVirtualMemory+0x83c
ffffec85`4bb87980 fffff802`1f80f7f5     : 00000000`00000000 00000192`99f5e7b8 00000000`00000000 00000000`00000000 : nt!NtQueryVirtualMemory+0x25
ffffec85`4bb879d0 00007fff`60e8d514     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004c`6197d3e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`60e8d514


SYMBOL_NAME:  nt!MiGetPageProtection+4d4

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.3031

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  4d4

FAILURE_BUCKET_ID:  AV_nt!MiGetPageProtection

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {41372a35-237d-1281-82f6-8f5f9bf6044a}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8006c063d37, Address of the instruction which caused the BugCheck
Arg3: ffffc686ae06e1b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.Elapsed.mSec
    Value: 5004

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12901

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b

    Key  : Failure.Bucket
    Value: AV_dxgmms2!McGenEventWrite_EtwWriteTransfer

    Key  : Failure.Hash
    Value: {5f66c0bb-d30c-22d8-775d-3fe51eb41150}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8006c063d37

BUGCHECK_P3: ffffc686ae06e1b0

BUGCHECK_P4: 0

FILE_IN_CAB:  060123-7531-01.dmp.dmp

CONTEXT:  ffffc686ae06e1b0 -- (.cxr 0xffffc686ae06e1b0)
rax=0000000000000002 rbx=0000000000000000 rcx=ffff908ad6514310
rdx=fffff8006c082d50 rsi=0000000000000004 rdi=ffff908a83ca2520
rip=fffff8006c063d37 rsp=ffffc686ae06ebb0 rbp=ffffc686ae06ec59
 r8=ffffc686ae06ec20  r9=0000000000000006 r10=0000000000002df4
r11=0000000000000006 r12=0000000000000000 r13=0000000000160000
r14=ffff908a83ca2548 r15=0000000000160000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
dxgmms2!McGenEventWrite_EtwWriteTransfer+0x27:
fffff800`6c063d37 450fb70a        movzx   r9d,word ptr [r10] ds:002b:00000000`00002df4=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

STACK_TEXT:
ffffc686`ae06ebb0 fffff800`6c067e27     : 00000000`00000000 ffffc686`ae06fa40 00000000`00000004 00000000`00802000 : dxgmms2!McGenEventWrite_EtwWriteTransfer+0x27
ffffc686`ae06ebf0 fffff800`6c0d6b20     : ffff908a`83ca2520 00000000`00010001 00000000`00000004 0000020b`a7d20000 : dxgmms2!McTemplateK0pxqqt_EtwWriteTransfer+0x8b
ffffc686`ae06eca0 fffff800`6c0a0292     : ffffc686`ae06edf0 00000000`02000000 ffff908a`83ca2520 fffff800`6c063d62 : dxgmms2!VIDMM_RECYCLE_BLOCK::Allocate+0x36860
ffffc686`ae06ed00 fffff800`6c0a05da     : 00000000`00000000 00000000`00010000 ffffe084`dd3ac978 ffffe084`dd3ac920 : dxgmms2!VIDMM_RECYCLE_HEAP::CreateBlockForType+0x66
ffffc686`ae06ed30 fffff800`6c0a1fa8     : 00000000`00000000 00000000`00010000 00000000`00000001 ffffc686`0000001c : dxgmms2!VIDMM_RECYCLE_HEAP::CreateBlockAndRange+0x42
ffffc686`ae06eda0 fffff800`6c0a1d87     : ffffe084`dd3ac978 00000000`00160000 00000000`00000001 ffffc686`ae06ef70 : dxgmms2!VIDMM_RECYCLE_HEAP::Allocate+0x128
ffffc686`ae06ee70 fffff800`6c0ba1c8     : ffffe084`ce010300 00000000`00000000 ffffe084`ce013900 00000000`00000002 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Allocate+0x127
ffffc686`ae06ef00 fffff800`6c0b9b36     : 00000000`00000001 00000000`33306956 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::CommitLocalBackingStore+0x498
ffffc686`ae06f000 fffff800`6c0b91fd     : ffffe084`e2e87490 00000000`00000002 ffffb600`00000000 ffff908a`db8f0010 : dxgmms2!VIDMM_GLOBAL::OpenLocalAllocation+0x116
ffffc686`ae06f0c0 fffff800`6c0b8d96     : ffffc686`ae06f388 ffffe084`e39adbd0 ffff908a`db8f0010 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::OpenOneAllocation+0x42d
ffffc686`ae06f240 fffff800`6c052523     : 00000000`00000000 00000000`01001002 00000000`00000000 ffffc686`00000005 : dxgmms2!VIDMM_GLOBAL::OpenAllocation+0x52
ffffc686`ae06f290 fffff800`4e55067e     : 00000000`00000000 fffff692`9fee79ff ffff908a`851055c0 00000000`00000000 : dxgmms2!VidMmOpenAllocation+0x53
ffffc686`ae06f2f0 fffff800`4e4f3a9e     : 00000000`00000000 ffffc686`ae06f830 ffff908a`80598860 ffff908a`80598b30 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations+0x8ee
ffffc686`ae06f400 fffff800`4e4f01f3     : ffffe084`d8b96c30 ffffc686`ae06fac0 00000000`00000000 ffff908a`88d2a820 : dxgkrnl!DXGDEVICE::CreateAllocation+0x124e
ffffc686`ae06f770 fffff800`4e5574ed     : ffffe084`ddac0f34 00000000`00501802 ffffe084`ddac35c0 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0xbd3
ffffc686`ae06fa00 fffff800`3440ff9a     : ffffe084`ddac35c0 ffffe084`e2cc5260 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkCreateAllocation+0xd
ffffc686`ae06fa40 00007ff8`f7d94784     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3ef
000000ea`f2bdb258 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f7d94784


SYMBOL_NAME:  dxgmms2!McGenEventWrite_EtwWriteTransfer+27

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr 0xffffc686ae06e1b0 ; kb

BUCKET_ID_FUNC_OFFSET:  27

FAILURE_BUCKET_ID:  AV_dxgmms2!McGenEventWrite_EtwWriteTransfer

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5f66c0bb-d30c-22d8-775d-3fe51eb41150}

Followup:     MachineOwner
---------
 
Son düzenleme:
Çözüm
İllaki formata gerek yok.
NVIDIA sürücü güncellemesiyle çözülüyor mu diye bir bakın.
Çözülmezse yeni mavi ekran dosyalarını paylaşın.
Yine benzer hatalar varsa ve format atmak istiyorsanız atabilirsiniz, benim için sorun yok. USB'den temiz kurulum her zaman için ilaç gibidir zaten.
 

Yeni konular

Geri
Yukarı