1050 Ti mavi ekran

İşletim sistemi
Windows 10
  • HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
  • HDD Sentinel yazılımından ekran görüntüsü atın.
  • MemTest86 ile belleklerde tarama yapın.
  • DDU ile Intel sürücünüzü de NVIDIA sürücünüzü de kaldırıp WHQL onaylı güncel sürücüyü kurun.
    • Sürücüleri kaldırdıktan sonra Intel için bunu, NVIDIA için bunu kurun.
  • Vanguard'ı kaldırın.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck
Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17144

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8060ecc96da

BUGCHECK_P3: ffffbb068275cbe0

BUGCHECK_P4: 0

CONTEXT:  ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0)
rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000
rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8
rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678
r8=0000000000000001  r9=0000000001000000 r10=0000000000000000
r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000
r14=0000000000000000 r15=0000000000000300
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!RtlRbRemoveNode+0x35a:
fffff806`0ecc96da 498b4110        mov     rax,qword ptr [r9+10h] ds:002b:00000000`01000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  consent.exe

STACK_TEXT:
ffffbb06`8275d5e8 fffff806`0ecc7ce5     : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a
ffffbb06`8275d600 fffff806`0ecc7aca     : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45
ffffbb06`8275d6c0 fffff806`0eccb048     : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffbb06`8275d720 fffff806`0f3b1094     : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffffbb06`8275d860 fffff806`1c2f34a1     : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffbb06`8275d8b0 fffff806`1c3d495e     : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31
ffffbb06`8275d8e0 fffff806`1c3d465b     : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de
ffffbb06`8275dad0 fffff806`0ee05fb8     : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb
ffffbb06`8275db00 00007ffe`e5a347e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f2`4987afe8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4


SYMBOL_NAME:  dxgkrnl!operator new+31

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .cxr 0xffffbb068275cbe0 ; kb

BUCKET_ID_FUNC_OFFSET:  31

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!operator_new

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2554216e-e8f7-13c5-17bb-08af0abb9161}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011cce76de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6155

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9237

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8011cce76de

BUGCHECK_P3: 0

BUGCHECK_P4: 0

READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffff58b`0777e5e8 fffff801`1ce30105     : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx
fffff58b`0777e5f0 fffff801`1ce066ac     : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
fffff58b`0777ecb0 fffff801`1ce02843     : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff58b`0777ee90 fffff801`1cce76de     : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443
fffff58b`0777f020 fffff801`1cce5c67     : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
fffff58b`0777f200 fffff801`1d0f0a09     : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67
fffff58b`0777f270 fffff801`1d0afbf9     : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9
fffff58b`0777f460 fffff801`1d0c76cf     : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9
fffff58b`0777f6e0 fffff801`1d066cc3     : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af
fffff58b`0777fa70 fffff801`1ce05fb8     : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23
fffff58b`0777fab0 fffff801`1cdf8400     : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28
fffff58b`0777fc48 fffff801`21f8c4ab     : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage
fffff58b`0777fc50 fffff801`21f766f6     : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83
fffff58b`0777fce0 fffff801`1d1059d6     : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6
fffff58b`0777fe70 fffff801`1d046636     : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6
fffff58b`0777feb0 fffff801`1cfe7914     : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2
fffff58b`0777ff70 fffff801`1cfe7d0a     : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294
fffff58b`07780230 fffff801`1ce05fb8     : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a
fffff58b`07780a90 00007ffe`72d4d5a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`952fcd58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4


SYMBOL_NAME:  WdFilter!MpGetProcessById+83

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

IMAGE_VERSION:  4.18.2009.7

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  83

FAILURE_BUCKET_ID:  0x1E_c0000005_R_WdFilter!MpGetProcessById

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck
Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16419

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff806746e76de

BUGCHECK_P3: ffff848057490fe0

BUGCHECK_P4: 0

CONTEXT:  ffff848057490fe0 -- (.cxr 0xffff848057490fe0)
rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00
r8=ffff848057491d38  r9=ffff848057491d70 r10=ffff958f9a350dec
r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0
r14=ffff848057491cf4 r15=ffffa889dd2b6120
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e:
fffff806`746e76de ae              scas    byte ptr [rdi] ds:002b:00000000`00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

MISALIGNED_IP:
nt!SeAccessCheckWithHintWithAdminlessChecks+79e
fffff806`746e76de ae              scas    byte ptr [rdi]

STACK_TEXT:
ffff8480`574919e0 fffff806`746e5c67     : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
ffff8480`57491bc0 fffff806`74af0a09     : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67
ffff8480`57491c30 fffff806`74aafbf9     : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9
ffff8480`57491e20 fffff806`806756f1     : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9
ffff8480`574920a0 fffff806`80674cbf     : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531
ffff8480`57492180 fffff806`807743d8     : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b
ffff8480`574921b0 fffff806`807603cb     : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178
ffff8480`57492250 fffff806`80763561     : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::Present+0x9eb
ffff8480`57492830 fffff806`74805fb8     : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1
ffff8480`57492b00 00007ffe`6f394334     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`18b4e1f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334


SYMBOL_NAME:  dxgkrnl!NotifyPendingFlipPresent+531

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .cxr 0xffff848057490fe0 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------

Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz nedir?
 
Son düzenleme:
  • HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
  • HDD Sentinel yazılımından ekran görüntüsü atın.
  • Memtest86 ile belleklerde tarama yapın.
  • DDU ile ekran kartı sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
  • Vanguard'ı kaldırın.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck
Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5233

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 17144

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8060ecc96da

BUGCHECK_P3: ffffbb068275cbe0

BUGCHECK_P4: 0

CONTEXT: ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0)
rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000
rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8
rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678
r8=0000000000000001 r9=0000000001000000 r10=0000000000000000
r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000
r14=0000000000000000 r15=0000000000000300
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!RtlRbRemoveNode+0x35a:
fffff806`0ecc96da 498b4110 mov rax,qword ptr [r9+10h] ds:002b:00000000`01000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: consent.exe

STACK_TEXT:
ffffbb06`8275d5e8 fffff806`0ecc7ce5 : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a
ffffbb06`8275d600 fffff806`0ecc7aca : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45
ffffbb06`8275d6c0 fffff806`0eccb048 : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffbb06`8275d720 fffff806`0f3b1094 : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffffbb06`8275d860 fffff806`1c2f34a1 : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffbb06`8275d8b0 fffff806`1c3d495e : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31
ffffbb06`8275d8e0 fffff806`1c3d465b : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de
ffffbb06`8275dad0 fffff806`0ee05fb8 : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb
ffffbb06`8275db00 00007ffe`e5a347e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f2`4987afe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4

SYMBOL_NAME: dxgkrnl!operator new+31

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.546

STACK_COMMAND: .cxr 0xffffbb068275cbe0 ; kb

BUCKET_ID_FUNC_OFFSET: 31

FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!operator_new

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2554216e-e8f7-13c5-17bb-08af0abb9161}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011cce76de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6155

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 9237

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8011cce76de

BUGCHECK_P3: 0

BUGCHECK_P4: 0

READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffff58b`0777e5e8 fffff801`1ce30105 : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx
fffff58b`0777e5f0 fffff801`1ce066ac : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
fffff58b`0777ecb0 fffff801`1ce02843 : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff58b`0777ee90 fffff801`1cce76de : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443
fffff58b`0777f020 fffff801`1cce5c67 : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
fffff58b`0777f200 fffff801`1d0f0a09 : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67
fffff58b`0777f270 fffff801`1d0afbf9 : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9
fffff58b`0777f460 fffff801`1d0c76cf : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9
fffff58b`0777f6e0 fffff801`1d066cc3 : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af
fffff58b`0777fa70 fffff801`1ce05fb8 : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23
fffff58b`0777fab0 fffff801`1cdf8400 : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28
fffff58b`0777fc48 fffff801`21f8c4ab : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage
fffff58b`0777fc50 fffff801`21f766f6 : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83
fffff58b`0777fce0 fffff801`1d1059d6 : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6
fffff58b`0777fe70 fffff801`1d046636 : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6
fffff58b`0777feb0 fffff801`1cfe7914 : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2
fffff58b`0777ff70 fffff801`1cfe7d0a : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294
fffff58b`07780230 fffff801`1ce05fb8 : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a
fffff58b`07780a90 00007ffe`72d4d5a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`952fcd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4

SYMBOL_NAME: WdFilter!MpGetProcessById+83

MODULE_NAME: WdFilter

IMAGE_NAME: WdFilter.sys

IMAGE_VERSION: 4.18.2009.7

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 83

FAILURE_BUCKET_ID: 0x1E_c0000005_R_WdFilter!MpGetProcessById

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck
Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6343

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 16419

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff806746e76de

BUGCHECK_P3: ffff848057490fe0

BUGCHECK_P4: 0

CONTEXT: ffff848057490fe0 -- (.cxr 0xffff848057490fe0)
rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00
r8=ffff848057491d38 r9=ffff848057491d70 r10=ffff958f9a350dec
r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0
r14=ffff848057491cf4 r15=ffffa889dd2b6120
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e:
fffff806`746e76de ae scas byte ptr [rdi] ds:002b:00000000`00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

MISALIGNED_IP:
nt!SeAccessCheckWithHintWithAdminlessChecks+79e
fffff806`746e76de ae scas byte ptr [rdi]

STACK_TEXT:
ffff8480`574919e0 fffff806`746e5c67 : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
ffff8480`57491bc0 fffff806`74af0a09 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67
ffff8480`57491c30 fffff806`74aafbf9 : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9
ffff8480`57491e20 fffff806`806756f1 : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9
ffff8480`574920a0 fffff806`80674cbf : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531
ffff8480`57492180 fffff806`807743d8 : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b
ffff8480`574921b0 fffff806`807603cb : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178
ffff8480`57492250 fffff806`80763561 : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::present+0x9eb
ffff8480`57492830 fffff806`74805fb8 : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1
ffff8480`57492b00 00007ffe`6f394334 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`18b4e1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334

SYMBOL_NAME: dxgkrnl!NotifyPendingFlipPresent+531

IMAGE_NAME: hardware

IMAGE_VERSION: 10.0.19041.546

STACK_COMMAND: .cxr 0xffff848057490fe0 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID: IP_MISALIGNED

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner
---------

Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz nedir?

  • HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
  • HDD Sentinel yazılımından ekran görüntüsü atın.
  • Memtest86 ile belleklerde tarama yapın.
  • DDU ile ekran kartı sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
  • Vanguard'ı kaldırın.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck
Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5233

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 17144

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8060ecc96da

BUGCHECK_P3: ffffbb068275cbe0

BUGCHECK_P4: 0

CONTEXT: ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0)
rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000
rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8
rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678
r8=0000000000000001 r9=0000000001000000 r10=0000000000000000
r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000
r14=0000000000000000 r15=0000000000000300
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!RtlRbRemoveNode+0x35a:
fffff806`0ecc96da 498b4110 mov rax,qword ptr [r9+10h] ds:002b:00000000`01000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: consent.exe

STACK_TEXT:
ffffbb06`8275d5e8 fffff806`0ecc7ce5 : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a
ffffbb06`8275d600 fffff806`0ecc7aca : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45
ffffbb06`8275d6c0 fffff806`0eccb048 : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffbb06`8275d720 fffff806`0f3b1094 : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffffbb06`8275d860 fffff806`1c2f34a1 : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffbb06`8275d8b0 fffff806`1c3d495e : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31
ffffbb06`8275d8e0 fffff806`1c3d465b : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de
ffffbb06`8275dad0 fffff806`0ee05fb8 : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb
ffffbb06`8275db00 00007ffe`e5a347e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f2`4987afe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4

SYMBOL_NAME: dxgkrnl!operator new+31

MODULE_NAME: dxgkrnl

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.546

STACK_COMMAND: .cxr 0xffffbb068275cbe0 ; kb

BUCKET_ID_FUNC_OFFSET: 31

FAILURE_BUCKET_ID: 0x3B_c0000005_dxgkrnl!operator_new

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2554216e-e8f7-13c5-17bb-08af0abb9161}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011cce76de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6155

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 9237

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8011cce76de

BUGCHECK_P3: 0

BUGCHECK_P4: 0

READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffff58b`0777e5e8 fffff801`1ce30105 : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx
fffff58b`0777e5f0 fffff801`1ce066ac : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
fffff58b`0777ecb0 fffff801`1ce02843 : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff58b`0777ee90 fffff801`1cce76de : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443
fffff58b`0777f020 fffff801`1cce5c67 : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
fffff58b`0777f200 fffff801`1d0f0a09 : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67
fffff58b`0777f270 fffff801`1d0afbf9 : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9
fffff58b`0777f460 fffff801`1d0c76cf : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9
fffff58b`0777f6e0 fffff801`1d066cc3 : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af
fffff58b`0777fa70 fffff801`1ce05fb8 : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23
fffff58b`0777fab0 fffff801`1cdf8400 : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28
fffff58b`0777fc48 fffff801`21f8c4ab : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage
fffff58b`0777fc50 fffff801`21f766f6 : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83
fffff58b`0777fce0 fffff801`1d1059d6 : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6
fffff58b`0777fe70 fffff801`1d046636 : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6
fffff58b`0777feb0 fffff801`1cfe7914 : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2
fffff58b`0777ff70 fffff801`1cfe7d0a : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294
fffff58b`07780230 fffff801`1ce05fb8 : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a
fffff58b`07780a90 00007ffe`72d4d5a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`952fcd58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4

SYMBOL_NAME: WdFilter!MpGetProcessById+83

MODULE_NAME: WdFilter

IMAGE_NAME: WdFilter.sys

IMAGE_VERSION: 4.18.2009.7

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 83

FAILURE_BUCKET_ID: 0x1E_c0000005_R_WdFilter!MpGetProcessById

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck
Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6343

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 16419

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff806746e76de

BUGCHECK_P3: ffff848057490fe0

BUGCHECK_P4: 0

CONTEXT: ffff848057490fe0 -- (.cxr 0xffff848057490fe0)
rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00
r8=ffff848057491d38 r9=ffff848057491d70 r10=ffff958f9a350dec
r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0
r14=ffff848057491cf4 r15=ffffa889dd2b6120
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e:
fffff806`746e76de ae scas byte ptr [rdi] ds:002b:00000000`00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

MISALIGNED_IP:
nt!SeAccessCheckWithHintWithAdminlessChecks+79e
fffff806`746e76de ae scas byte ptr [rdi]

STACK_TEXT:
ffff8480`574919e0 fffff806`746e5c67 : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
ffff8480`57491bc0 fffff806`74af0a09 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67
ffff8480`57491c30 fffff806`74aafbf9 : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9
ffff8480`57491e20 fffff806`806756f1 : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9
ffff8480`574920a0 fffff806`80674cbf : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531
ffff8480`57492180 fffff806`807743d8 : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b
ffff8480`574921b0 fffff806`807603cb : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178
ffff8480`57492250 fffff806`80763561 : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::present+0x9eb
ffff8480`57492830 fffff806`74805fb8 : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1
ffff8480`57492b00 00007ffe`6f394334 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`18b4e1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334

SYMBOL_NAME: dxgkrnl!NotifyPendingFlipPresent+531

IMAGE_NAME: hardware

IMAGE_VERSION: 10.0.19041.546

STACK_COMMAND: .cxr 0xffff848057490fe0 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID: IP_MISALIGNED

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup: MachineOwner
---------

Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz nedir?

Vanguard'ı kaldırmak zorunlu mu Valorant için lazım.
 
  • HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
  • HDD Sentinel yazılımından ekran görüntüsü atın.
  • MemTest86 ile belleklerde tarama yapın.
  • DDU ile ekran kartı sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
  • Vanguard'ı kaldırın.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck
Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17144

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8060ecc96da

BUGCHECK_P3: ffffbb068275cbe0

BUGCHECK_P4: 0

CONTEXT:  ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0)
rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000
rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8
rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678
r8=0000000000000001  r9=0000000001000000 r10=0000000000000000
r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000
r14=0000000000000000 r15=0000000000000300
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!RtlRbRemoveNode+0x35a:
fffff806`0ecc96da 498b4110        mov     rax,qword ptr [r9+10h] ds:002b:00000000`01000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  consent.exe

STACK_TEXT:
ffffbb06`8275d5e8 fffff806`0ecc7ce5     : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a
ffffbb06`8275d600 fffff806`0ecc7aca     : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45
ffffbb06`8275d6c0 fffff806`0eccb048     : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffbb06`8275d720 fffff806`0f3b1094     : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffffbb06`8275d860 fffff806`1c2f34a1     : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffbb06`8275d8b0 fffff806`1c3d495e     : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31
ffffbb06`8275d8e0 fffff806`1c3d465b     : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de
ffffbb06`8275dad0 fffff806`0ee05fb8     : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb
ffffbb06`8275db00 00007ffe`e5a347e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f2`4987afe8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4


SYMBOL_NAME:  dxgkrnl!operator new+31

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .cxr 0xffffbb068275cbe0 ; kb

BUCKET_ID_FUNC_OFFSET:  31

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!operator_new

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2554216e-e8f7-13c5-17bb-08af0abb9161}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011cce76de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6155

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9237

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8011cce76de

BUGCHECK_P3: 0

BUGCHECK_P4: 0

READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffff58b`0777e5e8 fffff801`1ce30105     : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx
fffff58b`0777e5f0 fffff801`1ce066ac     : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
fffff58b`0777ecb0 fffff801`1ce02843     : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff58b`0777ee90 fffff801`1cce76de     : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443
fffff58b`0777f020 fffff801`1cce5c67     : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
fffff58b`0777f200 fffff801`1d0f0a09     : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67
fffff58b`0777f270 fffff801`1d0afbf9     : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9
fffff58b`0777f460 fffff801`1d0c76cf     : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9
fffff58b`0777f6e0 fffff801`1d066cc3     : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af
fffff58b`0777fa70 fffff801`1ce05fb8     : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23
fffff58b`0777fab0 fffff801`1cdf8400     : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28
fffff58b`0777fc48 fffff801`21f8c4ab     : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage
fffff58b`0777fc50 fffff801`21f766f6     : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83
fffff58b`0777fce0 fffff801`1d1059d6     : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6
fffff58b`0777fe70 fffff801`1d046636     : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6
fffff58b`0777feb0 fffff801`1cfe7914     : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2
fffff58b`0777ff70 fffff801`1cfe7d0a     : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294
fffff58b`07780230 fffff801`1ce05fb8     : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a
fffff58b`07780a90 00007ffe`72d4d5a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`952fcd58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4


SYMBOL_NAME:  WdFilter!MpGetProcessById+83

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

IMAGE_VERSION:  4.18.2009.7

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  83

FAILURE_BUCKET_ID:  0x1E_c0000005_R_WdFilter!MpGetProcessById

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck
Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16419

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff806746e76de

BUGCHECK_P3: ffff848057490fe0

BUGCHECK_P4: 0

CONTEXT:  ffff848057490fe0 -- (.cxr 0xffff848057490fe0)
rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00
r8=ffff848057491d38  r9=ffff848057491d70 r10=ffff958f9a350dec
r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0
r14=ffff848057491cf4 r15=ffffa889dd2b6120
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e:
fffff806`746e76de ae              scas    byte ptr [rdi] ds:002b:00000000`00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

MISALIGNED_IP:
nt!SeAccessCheckWithHintWithAdminlessChecks+79e
fffff806`746e76de ae              scas    byte ptr [rdi]

STACK_TEXT:
ffff8480`574919e0 fffff806`746e5c67     : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
ffff8480`57491bc0 fffff806`74af0a09     : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67
ffff8480`57491c30 fffff806`74aafbf9     : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9
ffff8480`57491e20 fffff806`806756f1     : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9
ffff8480`574920a0 fffff806`80674cbf     : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531
ffff8480`57492180 fffff806`807743d8     : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b
ffff8480`574921b0 fffff806`807603cb     : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178
ffff8480`57492250 fffff806`80763561     : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::Present+0x9eb
ffff8480`57492830 fffff806`74805fb8     : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1
ffff8480`57492b00 00007ffe`6f394334     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`18b4e1f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334


SYMBOL_NAME:  dxgkrnl!NotifyPendingFlipPresent+531

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .cxr 0xffff848057490fe0 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------

Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz
Vanguard'ı kaldırmak zorunlu mu Valorant için lazım.
  • HD Tune ile tüm disklerinizde "Error Scan" yapın. "Quick Scan" kapalı olsun.
  • HDD Sentinel yazılımından ekran görüntüsü atın.
  • MemTest86 ile belleklerde tarama yapın.
  • DDU ile ekran kartı sürücünüzü kaldırıp WHQL onaylı güncel sürücüyü kurun.
  • Vanguard'ı kaldırın.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060ecc96da, Address of the instruction which caused the bugcheck
Arg3: ffffbb068275cbe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17144

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8060ecc96da

BUGCHECK_P3: ffffbb068275cbe0

BUGCHECK_P4: 0

CONTEXT:  ffffbb068275cbe0 -- (.cxr 0xffffbb068275cbe0)
rax=0000000000000000 rbx=ffff8c0a6ce00290 rcx=0000000001000000
rdx=ffff8c0a7cc71fe8 rsi=0000000000000000 rdi=ffff8c0a7cc71fe8
rip=fffff8060ecc96da rsp=ffffbb068275d5e8 rbp=ffffbb068275d678
r8=0000000000000001  r9=0000000001000000 r10=0000000000000000
r11=ffff8c0a7ccdafe8 r12=0000000000000000 r13=ffff8c0a7cc6d000
r14=0000000000000000 r15=0000000000000300
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!RtlRbRemoveNode+0x35a:
fffff806`0ecc96da 498b4110        mov     rax,qword ptr [r9+10h] ds:002b:00000000`01000010=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  consent.exe

STACK_TEXT:
ffffbb06`8275d5e8 fffff806`0ecc7ce5     : ffffbb06`8275d678 00000000`000000e2 ffff8c0a`7cc71fe0 00000000`00000300 : nt!RtlRbRemoveNode+0x35a
ffffbb06`8275d600 fffff806`0ecc7aca     : ffff9f02`00000000 fffff806`00000000 ffff9f02`cf95b080 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x45
ffffbb06`8275d6c0 fffff806`0eccb048     : 00000000`00000000 0a000001`00000e00 ffffbb06`8275d801 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffbb06`8275d720 fffff806`0f3b1094     : 00000000`00000000 00000000`00000000 00000000`4b677844 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffffbb06`8275d860 fffff806`1c2f34a1     : 00000000`00000000 ffffbb06`8275db80 00000272`46dd88d0 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffbb06`8275d8b0 fffff806`1c3d495e     : ffffbb06`8275db80 00000000`00000000 00000272`46dd88d0 ffffffff`ffffffff : dxgkrnl!operator new+0x31
ffffbb06`8275d8e0 fffff806`1c3d465b     : 00007ffe`d7ccbc50 000000f2`4987b501 ffff9f02`cf95b080 ffffacfe`c9000000 : dxgkrnl!DxgkCreateContextVirtualImpl+0x2de
ffffbb06`8275dad0 fffff806`0ee05fb8     : ffff9f02`00000000 ffff9f02`00000001 ffffbb06`8275db80 ffffbb06`8275db80 : dxgkrnl!DxgkCreateContextVirtual+0xb
ffffbb06`8275db00 00007ffe`e5a347e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f2`4987afe8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e5a347e4


SYMBOL_NAME:  dxgkrnl!operator new+31

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .cxr 0xffffbb068275cbe0 ; kb

BUCKET_ID_FUNC_OFFSET:  31

FAILURE_BUCKET_ID:  0x3B_c0000005_dxgkrnl!operator_new

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2554216e-e8f7-13c5-17bb-08af0abb9161}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011cce76de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6155

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9237

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8011cce76de

BUGCHECK_P3: 0

BUGCHECK_P4: 0

READ_ADDRESS: fffff8011d6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8011d60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
fffff58b`0777e5e8 fffff801`1ce30105     : 00000000`0000001e ffffffff`c0000005 fffff801`1cce76de 00000000`00000000 : nt!KeBugCheckEx
fffff58b`0777e5f0 fffff801`1ce066ac     : 00000000`00001000 fffff58b`0777ee90 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1de8e5
fffff58b`0777ecb0 fffff801`1ce02843     : 00000000`00000000 ffffdf8a`43002340 00000000`00000050 00000000`00000000 : nt!KiExceptionDispatch+0x12c
fffff58b`0777ee90 fffff801`1cce76de     : fffff58b`0777f4f0 0a000002`454cf867 fffff6fb`402f6560 fffff801`1ccee92e : nt!KiPageFault+0x443
fffff58b`0777f020 fffff801`1cce5c67     : 00000000`00000000 00000000`00000000 ffffdf8a`436bb900 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
fffff58b`0777f200 fffff801`1d0f0a09     : ffffc380`000020a8 00000000`00000000 fffff801`1d6514c0 00000000`00000d10 : nt!SeAccessCheck+0x67
fffff58b`0777f270 fffff801`1d0afbf9     : fffff58b`0777f7f0 ffffdf8a`49f0c080 00000000`00000000 ffffc080`04754730 : nt!ObpCreateHandle+0x7c9
fffff58b`0777f460 fffff801`1d0c76cf     : 00000000`00000001 fffff58b`0777fb30 00000000`00000000 01b00030`00020410 : nt!ObOpenObjectByPointer+0x1b9
fffff58b`0777f6e0 fffff801`1d066cc3     : 00000000`000000a0 00000000`00000ddd 00000000`00000003 ffffae86`55b06b00 : nt!PsOpenProcess+0x3af
fffff58b`0777fa70 fffff801`1ce05fb8     : ffffae86`48200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!NtOpenProcess+0x23
fffff58b`0777fab0 fffff801`1cdf8400     : fffff801`21f8c4ab 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 : nt!KiSystemServiceCopyEnd+0x28
fffff58b`0777fc48 fffff801`21f8c4ab     : 00000000`00000000 00000000`00000000 ffffdf8a`436c2c01 00000000`00000000 : nt!KiServiceLinkage
fffff58b`0777fc50 fffff801`21f766f6     : 00000000`00000814 00000000`00000000 00000000`00000090 00000000`00000000 : WdFilter!MpGetProcessById+0x83
fffff58b`0777fce0 fffff801`1d1059d6     : 00000000`00000000 fffff801`1d6ec020 fffff801`1d6ec020 ffffdf8a`49f0c080 : WdFilter!MpCreateThreadNotifyRoutine+0xe6
fffff58b`0777fe70 fffff801`1d046636     : fffff58b`07780a10 ffffdf8a`4b85d4c0 00000000`00000000 ffffdf8a`4b85d4c0 : nt!PspCallThreadNotifyRoutines+0xc6
fffff58b`0777feb0 fffff801`1cfe7914     : ffffdf8a`4b85d4c0 ffffdf8a`49f0c080 fffff58b`077807c0 fffff58b`0777ffd4 : nt!PspInsertThread+0x6d2
fffff58b`0777ff70 fffff801`1cfe7d0a     : fffff58b`077802a0 fffff58b`077807a0 00000000`00000000 00000000`00000001 : nt!PspCreateThread+0x294
fffff58b`07780230 fffff801`1ce05fb8     : ffffdf8a`49f2a080 000000bd`952fd2b8 fffff58b`07780aa8 00000000`00000001 : nt!NtCreateThreadEx+0x23a
fffff58b`07780a90 00007ffe`72d4d5a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`952fcd58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`72d4d5a4


SYMBOL_NAME:  WdFilter!MpGetProcessById+83

MODULE_NAME: WdFilter

IMAGE_NAME:  WdFilter.sys

IMAGE_VERSION:  4.18.2009.7

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  83

FAILURE_BUCKET_ID:  0x1E_c0000005_R_WdFilter!MpGetProcessById

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ebb7f28b-98d9-e717-5f85-3f987bfc7f2f}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff806746e76de, Address of the instruction which caused the bugcheck
Arg3: ffff848057490fe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16419

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff806746e76de

BUGCHECK_P3: ffff848057490fe0

BUGCHECK_P4: 0

CONTEXT:  ffff848057490fe0 -- (.cxr 0xffff848057490fe0)
rax=0000000000000001 rbx=00000000ffffffff rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806746e76de rsp=ffff8480574919e0 rbp=ffff848057491b00
r8=ffff848057491d38  r9=ffff848057491d70 r10=ffff958f9a350dec
r11=ffff848057491bc0 r12=0000000000000003 r13=ffff848057491ee0
r14=ffff848057491cf4 r15=ffffa889dd2b6120
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e:
fffff806`746e76de ae              scas    byte ptr [rdi] ds:002b:00000000`00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

MISALIGNED_IP:
nt!SeAccessCheckWithHintWithAdminlessChecks+79e
fffff806`746e76de ae              scas    byte ptr [rdi]

STACK_TEXT:
ffff8480`574919e0 fffff806`746e5c67     : 00000000`00000000 00000000`00000000 ffff958f`9a350da0 00000000`00000000 : nt!SeAccessCheckWithHintWithAdminlessChecks+0x79e
ffff8480`57491bc0 fffff806`74af0a09     : 00000000`00000001 00000000`00000000 00000000`00000000 ffff958f`9dfe16b0 : nt!SeAccessCheck+0x67
ffff8480`57491c30 fffff806`74aafbf9     : ffffa889`d91af060 00000000`00000040 00000000`00000000 ffff8480`00000003 : nt!ObpCreateHandle+0x7c9
ffff8480`57491e20 fffff806`806756f1     : ffff8480`57492119 ffff958f`a0296340 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByPointer+0x1b9
ffff8480`574920a0 fffff806`80674cbf     : 00000000`00000001 00000000`00000000 00000000`00000000 ffff8480`57492a20 : dxgkrnl!NotifyPendingFlipPresent+0x531
ffff8480`57492180 fffff806`807743d8     : ffff8480`57492a28 ffff8480`57492210 ffff8480`57492910 00000000`00000001 : dxgkrnl!DxgkQuerySwapChainBindingStatus+0x2b
ffff8480`574921b0 fffff806`807603cb     : ffffa889`cc49d660 00000000`00000000 ffff958f`9df8d000 00000000`00000000 : dxgkrnl!SubmitPresentHistoryTokenPreparation+0x178
ffff8480`57492250 fffff806`80763561     : ffffa889`cc49d660 ffff8480`57492b80 00000000`00000000 ffff958f`9df8d000 : dxgkrnl!DXGCONTEXT::Present+0x9eb
ffff8480`57492830 fffff806`74805fb8     : ffff958f`a5cf2080 ffff958f`a5cf2080 00000000`0f800000 ffff958f`a8974cd0 : dxgkrnl!DxgkPresent+0x7f1
ffff8480`57492b00 00007ffe`6f394334     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`18b4e1f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6f394334


SYMBOL_NAME:  dxgkrnl!NotifyPendingFlipPresent+531

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .cxr 0xffff848057490fe0 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------

Sistem bilgilerinizi göremiyorum. Sistem özellikleriniz nedir?
Intel(R) Core(TM) i7-4770 CPU @ 3.40 GHz
Asus GTX 1050ti
4x4 Corsair + Gskill 1333MHz Ram
Samsung Evo SSD SATA 3
WD Green 2TB + WD 640GB BLUE
Asus Anakart
 
DDU ile Intel sürücülerinizi de NVIDIA sürücülerinizi de kaldırın, önceki mesajımı düzenledim. Ardından Intel için bunu, NVIDIA için bunu kurun.

Anakartınızın tam modelini belirtirseniz BIOS güncellemesi olup olmadığına bakalım.
 

Yeni konular

Yeni mesajlar

Geri
Yukarı