- Katılım
- 28 Nisan 2020
- Mesajlar
- 45.301
- Makaleler
- 41
- Çözümler
- 143
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8022ecda163, Address of the instruction which caused the bugcheck
Arg3: ffffe10acec33a00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6828
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 20294
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8022ecda163
BUGCHECK_P3: ffffe10acec33a00
BUGCHECK_P4: 0
CONTEXT: ffffe10acec33a00 -- (.cxr 0xffffe10acec33a00)
rax=00000000ffffffff rbx=0008000000000000 rcx=0008000000000000
rdx=0000000000000008 rsi=ffffe58d4e75bb10 rdi=00000000000000bb
rip=fffff8022ecda163 rsp=ffffe10acec34400 rbp=ffffe58d3d0c5140
r8=ffffe58d52638080 r9=0000000000000000 r10=0000000000000000
r11=0000000000000169 r12=0000000000000000 r13=0000000000000070
r14=ffffe58d4e75bb10 r15=0008000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!PspDereferenceQuotaBlock+0x1b:
fffff802`2ecda163 f00fc18100020000 lock xadd dword ptr [rcx+200h],eax ds:002b:00080000`00000200=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RDR2.exe
STACK_TEXT:
ffffe10a`cec34400 fffff802`2ecc01af : ffffe58d`4e75bb30 ffffe58d`4e75bb10 00000000`000000bb ffffe58d`45c11c40 : nt!PspDereferenceQuotaBlock+0x1b
ffffe10a`cec34430 fffff802`2ecbff08 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x24f
ffffe10a`cec34490 fffff802`2e8dbaa7 : 00000000`00000000 00000000`00000000 ffffe10a`cec34619 ffffe58d`4e75bb60 : nt!ObpRemoveObjectRoutine+0x88
ffffe10a`cec344f0 fffff802`2eced70e : ffffe58d`3d0c5140 00000000`00000001 ffffe58d`00000000 ffffffff`ffffffff : nt!ObfDereferenceObjectWithTag+0xc7
ffffe10a`cec34530 fffff802`2eca4dc5 : ffffe58d`4a51c558 fffff802`2e8dbd99 ffffe58d`50258570 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
ffffe10a`cec34670 fffff802`2eca70ad : ffffe58d`4a51c520 ffffe58d`4d345080 ffffffff`ffffff01 ffffe58d`526384d8 : nt!ExSweepHandleTable+0xd5
ffffe10a`cec34720 fffff802`2ebf1647 : ffffffff`ffffffff ffffe58d`52638080 ffffe10a`cec34770 ffffe58d`00000000 : nt!ObKillProcess+0x35
ffffe10a`cec34750 fffff802`2ebe6f96 : ffffe58d`52638080 ffffce85`1b5b2060 ffffe10a`cec34990 00000000`00000000 : nt!PspRundownSingleProcess+0x133
ffffe10a`cec347d0 fffff802`2ec7a978 : ffffe58d`cfffffff ffff8180`00000001 ffffe10a`cec349e0 00000000`0035a000 : nt!PspExitThread+0x5f6
ffffe10a`cec348d0 fffff802`2e8e2707 : 00000000`400c0088 00000000`00000000 00000000`00000000 ffffe10a`cec34b00 : nt!KiSchedulerApcTerminate+0x38
ffffe10a`cec34910 fffff802`2e9f8b40 : 00000001`04aafe08 ffffe10a`cec349c0 ffffe10a`cec34b80 00000000`00000000 : nt!KiDeliverApc+0x487
ffffe10a`cec349c0 fffff802`2ea0605f : 00000000`00000000 00000000`00000000 ffffe10a`cec34b18 ffffffff`ff676980 : nt!KiInitiateUserApc+0x70
ffffe10a`cec34b00 00007ffb`88b4be14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000001`04aafdd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`88b4be14
SYMBOL_NAME: nt!PspDereferenceQuotaBlock+1b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffe10acec33a00 ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PspDereferenceQuotaBlock
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7a45ee28-7cce-d9df-0178-12f4a9caa1f3}
Followup: MachineOwner
---------
Hata o halde korsandan gibi gözüküyor hocam. Zira sistem işleyişini biraz yerine getiremiyor sanırım kopya korumayı aşmak için ne teknik kullanıldıysa artık. Ki aceleyle çıkan çoğu crack bu tarz hatalara neden olabiliyor. Mahreminiz varsa raporları paylaşmayabilirsiniz. Tekrar hata alınca konuya yazarsınız.@24099 biraz korsan evet. ASUS yazılımlarını kullanmıyorum mouse ışığı hariç kaldırabilirim. Rapor 1 ve 3'ü yaptım ama maşallah mahremimizi ortaya dökecek türden output verdi 3. olan, hepsi mi yüklenecek? @yika38 Razer yazılımı vardı ama silmiştim o hala görünüyor mu?
Memtest86 ve HD Tune ile bir tarama yapabilirim.
Evet, dökümlerde var görünüyor. Yeniden kontrol edin, varsa Revo Uninstaller ile kaldırmayı deneyebilirsiniz.@yika38 Razer yazılımı vardı ama silmiştim, o hâlâ görünüyor mu?
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000080000040, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80478a8f975, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3186
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3365
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 80000040
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80478a8f975
READ_ADDRESS: fffff804792fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047920f340: Unable to get Flags value from nt!KdVersionBlock
fffff8047920f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000080000040
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AMDRSServ.exe
TRAP_FRAME: ffffed0c8b39c660 -- (.trap 0xffffed0c8b39c660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000080000000
rdx=0000000080000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80478a8f975 rsp=ffffed0c8b39c7f0 rbp=ffffffffffffffff
r8=ffffed0c8b39c820 r9=00000000ffffffff r10=7ffffffffffffffc
r11=00000251a1f60000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiFinishVadDeletion+0x13d395:
fffff804`78a8f975 8b4140 mov eax,dword ptr [rcx+40h] ds:00000000`80000040=????????
Resetting default scope
STACK_TEXT:
ffffed0c`8b39c518 fffff804`78a06569 : 00000000`0000000a 00000000`80000040 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffed0c`8b39c520 fffff804`78a02869 : 00000000`00000000 00000000`00000000 00000000`ffffffde 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffed0c`8b39c660 fffff804`78a8f975 : ffff9c81`4390d300 ffffffff`ffffffff ffff9c81`44ea74c0 ffff9c81`4390d300 : nt!KiPageFault+0x469
ffffed0c`8b39c7f0 fffff804`78923264 : 00000000`00000002 ffffcf04`00000001 ffff9c81`00000001 ffff9c81`00000000 : nt!MiFinishVadDeletion+0x13d395
ffffed0c`8b39c890 fffff804`78d04aa9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0xae4
ffffed0c`8b39c9a0 fffff804`78d04882 : ffff9c81`44ea74c0 00000000`00000000 ffff9c81`4390d300 00000000`00000000 : nt!MiUnmapVad+0x49
ffffed0c`8b39c9d0 fffff804`78d046f9 : ffffa653`4b2402b2 000000ca`15fffb40 00000000`0002ee30 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffed0c`8b39cab0 fffff804`78a05fb8 : ffff9c81`449830c0 00000251`a1f60000 00000000`00000000 ffff9c81`4390d300 : nt!NtUnmapViewOfSectionEx+0x99
ffffed0c`8b39cb00 00007ff9`7ca8f704 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ca`15fffb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`7ca8f704
SYMBOL_NAME: nt!MiFinishVadDeletion+13d395
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 13d395
FAILURE_BUCKET_ID: AV_nt!MiFinishVadDeletion
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a2df16c8-e5b6-769c-9909-e3d909490283}
Followup: MachineOwner
---------
Reyiz sıkıntı ramdan dolayı mıydı ?@yika38 @24099 öncelikle teşekkür ederim ilginiz için. Biraz daha oynadım oyun dondu, masaüstüne attı, 5 saniye sonra mavi ekran. Sorun oyundan kaynaklıysa vaktinizi boşuna almak istemem, malum. HD Tune taraması yaptım sorun çıkmadı. AIDA64 sildim, Afterburner ayarım yok. Geriye yalnızca memtest kalıyor onu da yarın yapacağım.
Bu da ikinci mavi ekran hatası;
File on MEGA
mega.nz
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.