kado1082
Picopat
- Katılım
- 8 Eylül 2020
- Mesajlar
- 270
minidump.rar dosyalar bunlar, sorun nedir?
Son düzenleyen: Moderatör:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck
Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17144
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8060ecc96da
BUGCHECK_P3: ffffbb068275cbe0
BUGCHECK_P4: 0
CONTEXT: ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0)
rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000
rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8
rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678
r8=0000000000000001 r9=0000000001000000 r10=0000000000000000
r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000
r14=0000000000000000 r15=0000000000000300
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!RtlRbRemoveNode+0x35a:
fffff806`0ecc96da 498b4110 mov rax,qword ptr [r9+10h] ds:002b:00000000`01000010=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: consent.exe
STACK_TEXT:
ffffbb06`8275d5e8 fffff806`0ecc7ce5 : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a
ffffbb06`8275d600 fffff806`0ecc7aca : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45
ffffbb06`8275d6c0 fffff806`0eccb048 : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffbb06`8275d720 fffff806`0f3b1094 : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffffbb06`8275d860 fffff806`1c2f34a1 : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffbb06`8275d8b0 fffff806`1c3d495e : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31
ffffbb06`8275d8e0 fffff806`1c3d465b : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de
ffffbb06`8275dad0 fffff806`0ee05fb8 : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb
ffffbb06`8275db00 00007ffe`e5a347e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f2`4987afe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4
SYMBOL_NAME: dxgkrnl!operator new+31
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .cxr 0xffffbb068275cbe0 ; kb
BUCKET_ID_FUNC_OFFSET: 31
FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!operator_new
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2554216e-e8f7-13c5-17bb-08af0abb9161}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011cce76de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6155
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9237
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8011cce76de
BUGCHECK_P3: 0
BUGCHECK_P4: 0
READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
fffff58b`0777e5e8 fffff801`1ce30105 : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx
fffff58b`0777e5f0 fffff801`1ce066ac : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
fffff58b`0777ecb0 fffff801`1ce02843 : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff58b`0777ee90 fffff801`1cce76de : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443
fffff58b`0777f020 fffff801`1cce5c67 : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
fffff58b`0777f200 fffff801`1d0f0a09 : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67
fffff58b`0777f270 fffff801`1d0afbf9 : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9
fffff58b`0777f460 fffff801`1d0c76cf : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9
fffff58b`0777f6e0 fffff801`1d066cc3 : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af
fffff58b`0777fa70 fffff801`1ce05fb8 : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23
fffff58b`0777fab0 fffff801`1cdf8400 : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28
fffff58b`0777fc48 fffff801`21f8c4ab : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage
fffff58b`0777fc50 fffff801`21f766f6 : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83
fffff58b`0777fce0 fffff801`1d1059d6 : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6
fffff58b`0777fe70 fffff801`1d046636 : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6
fffff58b`0777feb0 fffff801`1cfe7914 : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2
fffff58b`0777ff70 fffff801`1cfe7d0a : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294
fffff58b`07780230 fffff801`1ce05fb8 : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a
fffff58b`07780a90 00007ffe`72d4d5a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`952fcd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4
SYMBOL_NAME: WdFilter!MpGetProcessById+83
MODULE_NAME: WdFilter
IMAGE_NAME: WdFilter.sys
IMAGE_VERSION: 4.18.2009.7
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 83
FAILURE_BUCKET_ID: 0x1E_c0000005_R_WdFilter!MpGetProcessById
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck
Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16419
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff806746e76de
BUGCHECK_P3: ffff848057490fe0
BUGCHECK_P4: 0
CONTEXT: ffff848057490fe0 -- (.cxr 0xffff848057490fe0)
rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00
r8=ffff848057491d38 r9=ffff848057491d70 r10=ffff958f9a350dec
r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0
r14=ffff848057491cf4 r15=ffffa889dd2b6120
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e:
fffff806`746e76de ae scas byte ptr [rdi] ds:002b:00000000`00000000=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
MISALIGNED_IP:
nt!SeAccessCheckWithHintWithAdminlessChecks+79e
fffff806`746e76de ae scas byte ptr [rdi]
STACK_TEXT:
ffff8480`574919e0 fffff806`746e5c67 : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
ffff8480`57491bc0 fffff806`74af0a09 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67
ffff8480`57491c30 fffff806`74aafbf9 : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9
ffff8480`57491e20 fffff806`806756f1 : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9
ffff8480`574920a0 fffff806`80674cbf : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531
ffff8480`57492180 fffff806`807743d8 : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b
ffff8480`574921b0 fffff806`807603cb : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178
ffff8480`57492250 fffff806`80763561 : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::Present+0x9eb
ffff8480`57492830 fffff806`74805fb8 : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1
ffff8480`57492b00 00007ffe`6f394334 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`18b4e1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334
SYMBOL_NAME: dxgkrnl!NotifyPendingFlipPresent+531
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.546
STACK_COMMAND: .cxr 0xffff848057490fe0 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
- HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
- HDD Sentinel yazılımından ekran görüntüsü atın.
- Memtest86 ile belleklerde tarama yapın.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net- DDU ile ekran kartı sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net- Vanguard'ı kaldırın.
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5233 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 17144 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8060ecc96da BUGCHECK_P3: ffffbb068275cbe0 BUGCHECK_P4: 0 CONTEXT: ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0) rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000 rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8 rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678 r8=0000000000000001 r9=0000000001000000 r10=0000000000000000 r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000 r14=0000000000000000 r15=0000000000000300 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!RtlRbRemoveNode+0x35a: fffff806`0ecc96da 498b4110 mov rax,qword ptr [r9+10h] ds:002b:00000000`01000010=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: consent.exe STACK_TEXT: ffffbb06`8275d5e8 fffff806`0ecc7ce5 : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a ffffbb06`8275d600 fffff806`0ecc7aca : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45 ffffbb06`8275d6c0 fffff806`0eccb048 : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa ffffbb06`8275d720 fffff806`0f3b1094 : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888 ffffbb06`8275d860 fffff806`1c2f34a1 : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64 ffffbb06`8275d8b0 fffff806`1c3d495e : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31 ffffbb06`8275d8e0 fffff806`1c3d465b : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de ffffbb06`8275dad0 fffff806`0ee05fb8 : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb ffffbb06`8275db00 00007ffe`e5a347e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f2`4987afe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4 SYMBOL_NAME: dxgkrnl!operator new+31 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffffbb068275cbe0 ; kb BUCKET_ID_FUNC_OFFSET: 31 FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!operator_new OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {2554216e-e8f7-13c5-17bb-08af0abb9161} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8011cce76de, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6155 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 9237 Key : Analysis.Memory.CommitPeak.Mb Value: 80 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8011cce76de BUGCHECK_P3: 0 BUGCHECK_P4: 0 READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000000 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 STACK_TEXT: fffff58b`0777e5e8 fffff801`1ce30105 : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx fffff58b`0777e5f0 fffff801`1ce066ac : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5 fffff58b`0777ecb0 fffff801`1ce02843 : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c fffff58b`0777ee90 fffff801`1cce76de : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443 fffff58b`0777f020 fffff801`1cce5c67 : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e fffff58b`0777f200 fffff801`1d0f0a09 : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67 fffff58b`0777f270 fffff801`1d0afbf9 : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9 fffff58b`0777f460 fffff801`1d0c76cf : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9 fffff58b`0777f6e0 fffff801`1d066cc3 : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af fffff58b`0777fa70 fffff801`1ce05fb8 : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23 fffff58b`0777fab0 fffff801`1cdf8400 : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28 fffff58b`0777fc48 fffff801`21f8c4ab : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage fffff58b`0777fc50 fffff801`21f766f6 : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83 fffff58b`0777fce0 fffff801`1d1059d6 : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6 fffff58b`0777fe70 fffff801`1d046636 : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6 fffff58b`0777feb0 fffff801`1cfe7914 : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2 fffff58b`0777ff70 fffff801`1cfe7d0a : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294 fffff58b`07780230 fffff801`1ce05fb8 : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a fffff58b`07780a90 00007ffe`72d4d5a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000bd`952fcd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4 SYMBOL_NAME: WdFilter!MpGetProcessById+83 MODULE_NAME: WdFilter IMAGE_NAME: WdFilter.sys IMAGE_VERSION: 4.18.2009.7 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 83 FAILURE_BUCKET_ID: 0x1E_c0000005_R_WdFilter!MpGetProcessById OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6343 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 16419 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff806746e76de BUGCHECK_P3: ffff848057490fe0 BUGCHECK_P4: 0 CONTEXT: ffff848057490fe0 -- (.cxr 0xffff848057490fe0) rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00 r8=ffff848057491d38 r9=ffff848057491d70 r10=ffff958f9a350dec r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0 r14=ffff848057491cf4 r15=ffffa889dd2b6120 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e: fffff806`746e76de ae scas byte ptr [rdi] ds:002b:00000000`00000000=?? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: dwm.exe MISALIGNED_IP: nt!SeAccessCheckWithHintWithAdminlessChecks+79e fffff806`746e76de ae scas byte ptr [rdi] STACK_TEXT: ffff8480`574919e0 fffff806`746e5c67 : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e ffff8480`57491bc0 fffff806`74af0a09 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67 ffff8480`57491c30 fffff806`74aafbf9 : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9 ffff8480`57491e20 fffff806`806756f1 : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9 ffff8480`574920a0 fffff806`80674cbf : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531 ffff8480`57492180 fffff806`807743d8 : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b ffff8480`574921b0 fffff806`807603cb : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178 ffff8480`57492250 fffff806`80763561 : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::present+0x9eb ffff8480`57492830 fffff806`74805fb8 : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1 ffff8480`57492b00 00007ffe`6f394334 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`18b4e1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334 SYMBOL_NAME: dxgkrnl!NotifyPendingFlipPresent+531 IMAGE_NAME: hardware IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffff848057490fe0 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner ---------
Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz nedir?
- HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
- HDD Sentinel yazılımından ekran görüntüsü atın.
- Memtest86 ile belleklerde tarama yapın.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net- DDU ile ekran kartı sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net- Vanguard'ı kaldırın.
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5233 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 17144 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8060ecc96da BUGCHECK_P3: ffffbb068275cbe0 BUGCHECK_P4: 0 CONTEXT: ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0) rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000 rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8 rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678 r8=0000000000000001 r9=0000000001000000 r10=0000000000000000 r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000 r14=0000000000000000 r15=0000000000000300 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!RtlRbRemoveNode+0x35a: fffff806`0ecc96da 498b4110 mov rax,qword ptr [r9+10h] ds:002b:00000000`01000010=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: consent.exe STACK_TEXT: ffffbb06`8275d5e8 fffff806`0ecc7ce5 : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a ffffbb06`8275d600 fffff806`0ecc7aca : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45 ffffbb06`8275d6c0 fffff806`0eccb048 : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa ffffbb06`8275d720 fffff806`0f3b1094 : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888 ffffbb06`8275d860 fffff806`1c2f34a1 : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64 ffffbb06`8275d8b0 fffff806`1c3d495e : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31 ffffbb06`8275d8e0 fffff806`1c3d465b : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de ffffbb06`8275dad0 fffff806`0ee05fb8 : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb ffffbb06`8275db00 00007ffe`e5a347e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f2`4987afe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4 SYMBOL_NAME: dxgkrnl!operator new+31 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffffbb068275cbe0 ; kb BUCKET_ID_FUNC_OFFSET: 31 FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!operator_new OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {2554216e-e8f7-13c5-17bb-08af0abb9161} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8011cce76de, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6155 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 9237 Key : Analysis.Memory.CommitPeak.Mb Value: 80 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8011cce76de BUGCHECK_P3: 0 BUGCHECK_P4: 0 READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000000 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 STACK_TEXT: fffff58b`0777e5e8 fffff801`1ce30105 : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx fffff58b`0777e5f0 fffff801`1ce066ac : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5 fffff58b`0777ecb0 fffff801`1ce02843 : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c fffff58b`0777ee90 fffff801`1cce76de : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443 fffff58b`0777f020 fffff801`1cce5c67 : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e fffff58b`0777f200 fffff801`1d0f0a09 : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67 fffff58b`0777f270 fffff801`1d0afbf9 : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9 fffff58b`0777f460 fffff801`1d0c76cf : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9 fffff58b`0777f6e0 fffff801`1d066cc3 : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af fffff58b`0777fa70 fffff801`1ce05fb8 : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23 fffff58b`0777fab0 fffff801`1cdf8400 : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28 fffff58b`0777fc48 fffff801`21f8c4ab : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage fffff58b`0777fc50 fffff801`21f766f6 : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83 fffff58b`0777fce0 fffff801`1d1059d6 : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6 fffff58b`0777fe70 fffff801`1d046636 : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6 fffff58b`0777feb0 fffff801`1cfe7914 : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2 fffff58b`0777ff70 fffff801`1cfe7d0a : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294 fffff58b`07780230 fffff801`1ce05fb8 : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a fffff58b`07780a90 00007ffe`72d4d5a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000bd`952fcd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4 SYMBOL_NAME: WdFilter!MpGetProcessById+83 MODULE_NAME: WdFilter IMAGE_NAME: WdFilter.sys IMAGE_VERSION: 4.18.2009.7 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 83 FAILURE_BUCKET_ID: 0x1E_c0000005_R_WdFilter!MpGetProcessById OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6343 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 16419 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff806746e76de BUGCHECK_P3: ffff848057490fe0 BUGCHECK_P4: 0 CONTEXT: ffff848057490fe0 -- (.cxr 0xffff848057490fe0) rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00 r8=ffff848057491d38 r9=ffff848057491d70 r10=ffff958f9a350dec r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0 r14=ffff848057491cf4 r15=ffffa889dd2b6120 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e: fffff806`746e76de ae scas byte ptr [rdi] ds:002b:00000000`00000000=?? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: dwm.exe MISALIGNED_IP: nt!SeAccessCheckWithHintWithAdminlessChecks+79e fffff806`746e76de ae scas byte ptr [rdi] STACK_TEXT: ffff8480`574919e0 fffff806`746e5c67 : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e ffff8480`57491bc0 fffff806`74af0a09 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67 ffff8480`57491c30 fffff806`74aafbf9 : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9 ffff8480`57491e20 fffff806`806756f1 : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9 ffff8480`574920a0 fffff806`80674cbf : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531 ffff8480`57492180 fffff806`807743d8 : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b ffff8480`574921b0 fffff806`807603cb : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178 ffff8480`57492250 fffff806`80763561 : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::present+0x9eb ffff8480`57492830 fffff806`74805fb8 : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1 ffff8480`57492b00 00007ffe`6f394334 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`18b4e1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334 SYMBOL_NAME: dxgkrnl!NotifyPendingFlipPresent+531 IMAGE_NAME: hardware IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffff848057490fe0 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner ---------
Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz nedir?
Valorant için lazım olduğunu ben de biliyorum. Şimdilik kaldırın, sonra yeniden kurarsınız.Vanguard'ı kaldırmak zorunlu mu? Valorant için lazım.
- HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
- HDD Sentinel yazılımından ekran görüntüsü atın.
- MemTest86 ile belleklerde tarama yapın.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net- DDU ile ekran kartı sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net- Vanguard'ı kaldırın.
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5233 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 17144 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8060ecc96da BUGCHECK_P3: ffffbb068275cbe0 BUGCHECK_P4: 0 CONTEXT: ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0) rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000 rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8 rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678 r8=0000000000000001 r9=0000000001000000 r10=0000000000000000 r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000 r14=0000000000000000 r15=0000000000000300 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!RtlRbRemoveNode+0x35a: fffff806`0ecc96da 498b4110 mov rax,qword ptr [r9+10h] ds:002b:00000000`01000010=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: consent.exe STACK_TEXT: ffffbb06`8275d5e8 fffff806`0ecc7ce5 : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a ffffbb06`8275d600 fffff806`0ecc7aca : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45 ffffbb06`8275d6c0 fffff806`0eccb048 : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa ffffbb06`8275d720 fffff806`0f3b1094 : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888 ffffbb06`8275d860 fffff806`1c2f34a1 : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64 ffffbb06`8275d8b0 fffff806`1c3d495e : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31 ffffbb06`8275d8e0 fffff806`1c3d465b : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de ffffbb06`8275dad0 fffff806`0ee05fb8 : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb ffffbb06`8275db00 00007ffe`e5a347e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f2`4987afe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4 SYMBOL_NAME: dxgkrnl!operator new+31 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffffbb068275cbe0 ; kb BUCKET_ID_FUNC_OFFSET: 31 FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!operator_new OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {2554216e-e8f7-13c5-17bb-08af0abb9161} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8011cce76de, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6155 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 9237 Key : Analysis.Memory.CommitPeak.Mb Value: 80 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8011cce76de BUGCHECK_P3: 0 BUGCHECK_P4: 0 READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000000 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 STACK_TEXT: fffff58b`0777e5e8 fffff801`1ce30105 : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx fffff58b`0777e5f0 fffff801`1ce066ac : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5 fffff58b`0777ecb0 fffff801`1ce02843 : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c fffff58b`0777ee90 fffff801`1cce76de : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443 fffff58b`0777f020 fffff801`1cce5c67 : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e fffff58b`0777f200 fffff801`1d0f0a09 : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67 fffff58b`0777f270 fffff801`1d0afbf9 : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9 fffff58b`0777f460 fffff801`1d0c76cf : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9 fffff58b`0777f6e0 fffff801`1d066cc3 : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af fffff58b`0777fa70 fffff801`1ce05fb8 : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23 fffff58b`0777fab0 fffff801`1cdf8400 : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28 fffff58b`0777fc48 fffff801`21f8c4ab : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage fffff58b`0777fc50 fffff801`21f766f6 : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83 fffff58b`0777fce0 fffff801`1d1059d6 : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6 fffff58b`0777fe70 fffff801`1d046636 : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6 fffff58b`0777feb0 fffff801`1cfe7914 : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2 fffff58b`0777ff70 fffff801`1cfe7d0a : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294 fffff58b`07780230 fffff801`1ce05fb8 : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a fffff58b`07780a90 00007ffe`72d4d5a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000bd`952fcd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4 SYMBOL_NAME: WdFilter!MpGetProcessById+83 MODULE_NAME: WdFilter IMAGE_NAME: WdFilter.sys IMAGE_VERSION: 4.18.2009.7 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 83 FAILURE_BUCKET_ID: 0x1E_c0000005_R_WdFilter!MpGetProcessById OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6343 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 16419 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff806746e76de BUGCHECK_P3: ffff848057490fe0 BUGCHECK_P4: 0 CONTEXT: ffff848057490fe0 -- (.cxr 0xffff848057490fe0) rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00 r8=ffff848057491d38 r9=ffff848057491d70 r10=ffff958f9a350dec r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0 r14=ffff848057491cf4 r15=ffffa889dd2b6120 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e: fffff806`746e76de ae scas byte ptr [rdi] ds:002b:00000000`00000000=?? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: dwm.exe MISALIGNED_IP: nt!SeAccessCheckWithHintWithAdminlessChecks+79e fffff806`746e76de ae scas byte ptr [rdi] STACK_TEXT: ffff8480`574919e0 fffff806`746e5c67 : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e ffff8480`57491bc0 fffff806`74af0a09 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67 ffff8480`57491c30 fffff806`74aafbf9 : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9 ffff8480`57491e20 fffff806`806756f1 : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9 ffff8480`574920a0 fffff806`80674cbf : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531 ffff8480`57492180 fffff806`807743d8 : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b ffff8480`574921b0 fffff806`807603cb : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178 ffff8480`57492250 fffff806`80763561 : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::Present+0x9eb ffff8480`57492830 fffff806`74805fb8 : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1 ffff8480`57492b00 00007ffe`6f394334 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`18b4e1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334 SYMBOL_NAME: dxgkrnl!NotifyPendingFlipPresent+531 IMAGE_NAME: hardware IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffff848057490fe0 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner ---------
Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz
Vanguard'ı kaldırmak zorunlu mu Valorant için lazım.
Intel(R) Core(TM) i7-4770 CPU @ 3.40 GHz
- HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
- HDD Sentinel yazılımından ekran görüntüsü atın.
- MemTest86 ile belleklerde tarama yapın.
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net- DDU ile ekran kartı sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net- Vanguard'ı kaldırın.
Kod:SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5233 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 17144 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8060ecc96da BUGCHECK_P3: ffffbb068275cbe0 BUGCHECK_P4: 0 CONTEXT: ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0) rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000 rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8 rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678 r8=0000000000000001 r9=0000000001000000 r10=0000000000000000 r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000 r14=0000000000000000 r15=0000000000000300 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!RtlRbRemoveNode+0x35a: fffff806`0ecc96da 498b4110 mov rax,qword ptr [r9+10h] ds:002b:00000000`01000010=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: consent.exe STACK_TEXT: ffffbb06`8275d5e8 fffff806`0ecc7ce5 : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a ffffbb06`8275d600 fffff806`0ecc7aca : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45 ffffbb06`8275d6c0 fffff806`0eccb048 : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa ffffbb06`8275d720 fffff806`0f3b1094 : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888 ffffbb06`8275d860 fffff806`1c2f34a1 : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64 ffffbb06`8275d8b0 fffff806`1c3d495e : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31 ffffbb06`8275d8e0 fffff806`1c3d465b : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de ffffbb06`8275dad0 fffff806`0ee05fb8 : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb ffffbb06`8275db00 00007ffe`e5a347e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000f2`4987afe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4 SYMBOL_NAME: dxgkrnl!operator new+31 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffffbb068275cbe0 ; kb BUCKET_ID_FUNC_OFFSET: 31 FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!operator_new OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {2554216e-e8f7-13c5-17bb-08af0abb9161} Followup: MachineOwner --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8011cce76de, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 0000000000000000, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6155 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 9237 Key : Analysis.Memory.CommitPeak.Mb Value: 80 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8011cce76de BUGCHECK_P3: 0 BUGCHECK_P4: 0 READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000000 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 STACK_TEXT: fffff58b`0777e5e8 fffff801`1ce30105 : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx fffff58b`0777e5f0 fffff801`1ce066ac : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5 fffff58b`0777ecb0 fffff801`1ce02843 : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c fffff58b`0777ee90 fffff801`1cce76de : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443 fffff58b`0777f020 fffff801`1cce5c67 : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e fffff58b`0777f200 fffff801`1d0f0a09 : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67 fffff58b`0777f270 fffff801`1d0afbf9 : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9 fffff58b`0777f460 fffff801`1d0c76cf : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9 fffff58b`0777f6e0 fffff801`1d066cc3 : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af fffff58b`0777fa70 fffff801`1ce05fb8 : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23 fffff58b`0777fab0 fffff801`1cdf8400 : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28 fffff58b`0777fc48 fffff801`21f8c4ab : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage fffff58b`0777fc50 fffff801`21f766f6 : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83 fffff58b`0777fce0 fffff801`1d1059d6 : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6 fffff58b`0777fe70 fffff801`1d046636 : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6 fffff58b`0777feb0 fffff801`1cfe7914 : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2 fffff58b`0777ff70 fffff801`1cfe7d0a : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294 fffff58b`07780230 fffff801`1ce05fb8 : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a fffff58b`07780a90 00007ffe`72d4d5a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000bd`952fcd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4 SYMBOL_NAME: WdFilter!MpGetProcessById+83 MODULE_NAME: WdFilter IMAGE_NAME: WdFilter.sys IMAGE_VERSION: 4.18.2009.7 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 83 FAILURE_BUCKET_ID: 0x1E_c0000005_R_WdFilter!MpGetProcessById OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6343 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 16419 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff806746e76de BUGCHECK_P3: ffff848057490fe0 BUGCHECK_P4: 0 CONTEXT: ffff848057490fe0 -- (.cxr 0xffff848057490fe0) rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00 r8=ffff848057491d38 r9=ffff848057491d70 r10=ffff958f9a350dec r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0 r14=ffff848057491cf4 r15=ffffa889dd2b6120 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e: fffff806`746e76de ae scas byte ptr [rdi] ds:002b:00000000`00000000=?? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: dwm.exe MISALIGNED_IP: nt!SeAccessCheckWithHintWithAdminlessChecks+79e fffff806`746e76de ae scas byte ptr [rdi] STACK_TEXT: ffff8480`574919e0 fffff806`746e5c67 : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e ffff8480`57491bc0 fffff806`74af0a09 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67 ffff8480`57491c30 fffff806`74aafbf9 : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9 ffff8480`57491e20 fffff806`806756f1 : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9 ffff8480`574920a0 fffff806`80674cbf : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531 ffff8480`57492180 fffff806`807743d8 : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b ffff8480`574921b0 fffff806`807603cb : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178 ffff8480`57492250 fffff806`80763561 : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::Present+0x9eb ffff8480`57492830 fffff806`74805fb8 : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1 ffff8480`57492b00 00007ffe`6f394334 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`18b4e1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334 SYMBOL_NAME: dxgkrnl!NotifyPendingFlipPresent+531 IMAGE_NAME: hardware IMAGE_VERSION: 10.0.19041.546 STACK_COMMAND: .cxr 0xffff848057490fe0 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner ---------
Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz nedir?
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.