Sorunun ana kaynağı Vanguard. Vanguard kaldırıp kurmayı deneyin. Sorun genel bir sorun.
[CODE title="Kodlar"]KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff8066119f9d0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2217
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7432
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 10792
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000096
BUGCHECK_P2: fffff8066119f9d0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff806`65882158 fffff806`630f5c6e : 00000000`0000001e ffffffff`c0000096 fffff806`6119f9d0 00000000`00000000 : nt!KeBugCheckEx
fffff806`65882160 fffff806`62fffbaf : fffff806`630f5c4c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff806`658821a0 fffff806`62e87547 : fffff806`65882710 00000000`00000000 fffff806`6586dda0 fffff806`62ffa85e : nt!RtlpExecuteHandlerForException+0xf
fffff806`658821d0 fffff806`62e86136 : fffff806`6586ce08 fffff806`65882e20 fffff806`6586ce08 ffffe38c`4ce4aaa0 : nt!RtlDispatchException+0x297
fffff806`658828f0 fffff806`62ff7b82 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff806`65882fb0 fffff806`62ff7b50 : fffff806`63008da5 00000000`ffffffff 00000000`00000000 00000000`ffffffff : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff806`6586ccc8 fffff806`63008da5 : 00000000`ffffffff 00000000`00000000 00000000`ffffffff 00000000`000000d8 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff806`6586ccd0 fffff806`63004ae0 : 00000000`00000001 00000000`00000000 00000000`00000002 ffffcd01`a5e6b180 : nt!KiExceptionDispatch+0x125
fffff806`6586ceb0 fffff806`6119f9d0 : ffffe38c`4ce4aaa0 fffff806`64b1533d ffffe38c`51b775b0 ffffcd01`a63eb000 : nt!KiGeneralProtectionFault+0x320
fffff806`6586d040 ffffe38c`4ce4aaa0 : fffff806`64b1533d ffffe38c`51b775b0 ffffcd01`a63eb000 00000000`00000001 : vgk+0x4f9d0
fffff806`6586d048 fffff806`64b1533d : ffffe38c`51b775b0 ffffcd01`a63eb000 00000000`00000001 00000000`00000001 : 0xffffe38c`4ce4aaa0
fffff806`6586d050 00000000`ffffffff : 00000000`00000800 ffffe38c`4ce4ac10 ffffe38c`4ce4ac0c ffffe38c`4ce4aaa0 : ataport!AtaPortGetPhysicalAddress+0x3d
fffff806`6586d0c0 00000000`00000800 : ffffe38c`4ce4ac10 ffffe38c`4ce4ac0c ffffe38c`4ce4aaa0 ffffe38c`4d8f76e0 : 0xffffffff
fffff806`6586d0c8 ffffe38c`4ce4ac10 : ffffe38c`4ce4ac0c ffffe38c`4ce4aaa0 ffffe38c`4d8f76e0 00000000`00000002 : 0x800
fffff806`6586d0d0 ffffe38c`4ce4ac0c : ffffe38c`4ce4aaa0 ffffe38c`4d8f76e0 00000000`00000002 fffff806`6586d158 : 0xffffe38c`4ce4ac10
fffff806`6586d0d8 ffffe38c`4ce4aaa0 : ffffe38c`4d8f76e0 00000000`00000002 fffff806`6586d158 fffff806`68fc3aa8 : 0xffffe38c`4ce4ac0c
fffff806`6586d0e0 ffffe38c`4d8f76e0 : 00000000`00000002 fffff806`6586d158 fffff806`68fc3aa8 ffffe38c`4ce49970 : 0xffffe38c`4ce4aaa0
fffff806`6586d0e8 00000000`00000002 : fffff806`6586d158 fffff806`68fc3aa8 ffffe38c`4ce49970 ffffe38c`4ce4ac00 : 0xffffe38c`4d8f76e0
fffff806`6586d0f0 fffff806`6586d158 : fffff806`68fc3aa8 ffffe38c`4ce49970 ffffe38c`4ce4ac00 ffffe38c`4ce4ac18 : 0x2
fffff806`6586d0f8 fffff806`68fc3aa8 : ffffe38c`4ce49970 ffffe38c`4ce4ac00 ffffe38c`4ce4ac18 fffff806`6586d144 : 0xfffff806`6586d158
fffff806`6586d100 fffff806`62f0dede : 00000000`00000000 fffff806`6586d200 00000000`00000001 fffff806`00000000 : mouhid!MouHid_ReadComplete+0x758
fffff806`6586d1a0 fffff806`62f0dda7 : 00000000`00000008 00000000`00000006 ffffe38c`4d0eb1f0 ffffe38c`4c816950 : nt!IopfCompleteRequest+0x11e
fffff806`6586d290 fffff806`68f2aef5 : ffffe38c`4c816950 00000000`00000007 ffffe38c`4c816940 00000000`00000007 : nt!IofCompleteRequest+0x17
fffff806`6586d2c0 fffff806`68f2a7ed : ffffe38c`4d0eb1f0 ffffe38c`4d0eb102 ffffe38c`4d0eb1f0 00000000`00000007 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff806`6586d3c0 fffff806`62f0dede : ffffe38c`4cee4a20 ffffe38c`4cee4a20 fffff806`6586d401 fffff806`62e128ff : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff806`6586d460 fffff806`62f0dda7 : ffff935d`00000000 fffff806`698e8200 00000000`00000000 01000000`00100000 : nt!IopfCompleteRequest+0x11e
fffff806`6586d550 fffff806`68a02c17 : ffffe38c`50e8d3e0 ffffe38c`4f96b01c ffffe38c`4c95e1a0 ffffffff`ffffffff : nt!IofCompleteRequest+0x17
fffff806`6586d580 fffff806`68a022ae : ffffe38c`4c95e1a0 ffffe38c`4f96b01c ffffe38c`4c95e1a0 00000000`00000000 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x867
fffff806`6586d850 fffff806`689ff98d : ffffe38c`4f96b154 ffffe38c`4c95f180 ffffe38c`4c95e1a0 ffffe38c`487d4240 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x22e
fffff806`6586d8b0 fffff806`68a0781c : ffffe38c`4c95f0e8 ffffe38c`4c95e050 ffffe38c`488d9c02 ffffe38c`487d4240 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x24d
fffff806`6586d920 fffff806`62f230ce : fffff806`6586daa0 ffffe38c`487d3000 fffff806`6586dc90 fffff806`5d902180 : USBPORT!USBPORT_Xdpc_Worker_IocDpc+0x18c
fffff806`6586d9a0 fffff806`62f223b4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`6586db10 fffff806`62ffa85e : 00000000`00000000 fffff806`5d902180 fffff806`63926a00 ffffe38c`512d5080 : nt!KiRetireDpcList+0x1f4
fffff806`6586dda0 00000000`00000000 : fffff806`6586e000 fffff806`65868000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: vgk+4f9d0
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4f9d0
FAILURE_BUCKET_ID: 0x1E_c0000096_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a12159ce-3331-0cde-43dd-ad042f045e26}
Followup: MachineOwner[/CODE]