System service exception hatası

MSI yazılımlarını ve Adobe Photoshop Elements'i kaldırın. Daha sonra tekrar indirebilirsiniz.

BİOS'u 7C56v14 kodlu sürüme güncelleyin. (Beta sürüme değil.)

Aşağıdaki rehberi uygulayın. Sonucu paylaşın.

[CODE title="Kod"]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\011521-7312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`40000000 PsLoadedModuleList = 0xfffff801`40c2a2b0
Debug session time: Fri Jan 15 13:54:11.063 2021 (UTC + 3:00)
System Uptime: 0 days 15:46:54.698
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`403f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb889`646b44e0=000000000000003b
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8014087638d, Address of the instruction which caused the bugcheck
Arg3: ffffb889646b4de0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6671

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 10405

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8014087638d

BUGCHECK_P3: ffffb889646b4de0

BUGCHECK_P4: 0

CONTEXT: ffffb889646b4de0 -- (.cxr 0xffffb889646b4de0)
rax=ffffb889646b5818 rbx=ffffbc05138b1e30 rcx=0000020000000000
rdx=ffffb889646b5870 rsi=0000000000000000 rdi=ffffbc050bcc1ea0
rip=fffff8014087638d rsp=ffffb889646b57e0 rbp=ffffb889646b5a39
r8=0000000000000000 r9=7fffbc050bcc1ed0 r10=7ffffffffffffffc
r11=ffffb889646b5780 r12=0000000000000000 r13=0000000000000000
r14=ffffbc05138b1e00 r15=00000000ffff8009
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!CmpKeyEnumStackFreeResumeContext+0x1d:
fffff801`4087638d 0fb701 movzx eax,word ptr [rcx] ds:002b:00000200`00000000=????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: GoogleCrashHandler64.exe

STACK_TEXT:
ffffb889`646b57e0 fffff801`407eb9f9 : ffffbc05`138b1e30 ffffb889`646b5a39 00000000`00000000 ffffbc05`0bcc1ea0 : nt!CmpKeyEnumStackFreeResumeContext+0x1d
ffffb889`646b5820 fffff801`405faef0 : ffff8087`c32c3ae0 ffffbc05`138b1e00 00000000`00000000 00000000`00000000 : nt!CmpDeleteKeyObject+0x1c9339
ffffb889`646b58b0 fffff801`40261277 : 00000000`00000000 00000000`00000000 ffffb889`646b5a39 ffffbc05`138b1e30 : nt!ObpRemoveObjectRoutine+0x80
ffffb889`646b5910 fffff801`4062887e : ffff8087`c32c3ae0 00000000`00000000 00000000`00000000 ffffbc05`10a9c340 : nt!ObfDereferenceObjectWithTag+0xc7
ffffb889`646b5950 fffff801`4062c4fc : 00000000`000000d0 00000000`00000000 00000000`00000000 fffff801`406358fa : nt!ObCloseHandleTableEntry+0x29e
ffffb889`646b5a90 fffff801`404071b8 : 00007ffd`9e727100 00000212`d1260000 ffffb889`646b5b80 ffff8087`cb97e080 : nt!NtClose+0xec
ffffb889`646b5b00 00007ffd`9f5ac194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001f`dacff7a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`9f5ac194


SYMBOL_NAME: nt!CmpKeyEnumStackFreeResumeContext+1d

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .cxr 0xffffb889646b4de0 ; kb

BUCKET_ID_FUNC_OFFSET: 1d

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CmpKeyEnumStackFreeResumeContext

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b7a0748a-2b44-5712-9569-e12b3062e779}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\123120-6203-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`40800000 PsLoadedModuleList = 0xfffff806`4142a2b0
Debug session time: Thu Dec 31 12:05:04.100 2020 (UTC + 3:00)
System Uptime: 1 days 10:30:08.734
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`40bf5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffef08`f3792230=000000000000007e
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80640bfd6b7, The address that the exception occurred at
Arg3: ffffef08f3793228, Exception Record Address
Arg4: ffffef08f3792a60, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 9984

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 23209

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80640bfd6b7

BUGCHECK_P3: ffffef08f3793228

BUGCHECK_P4: ffffef08f3792a60

EXCEPTION_RECORD: ffffef08f3793228 -- (.exr 0xffffef08f3793228)
ExceptionAddress: fffff80640bfd6b7 (nt!ExpInterlockedPopEntrySListFault)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffef08f3792a60 -- (.cxr 0xffffef08f3792a60)
rax=00000007e86b0004 rbx=ffff80050baae4e8 rcx=fffff8064144eae0
rdx=ec126ad6e6a5ebe0 rsi=0000000000000010 rdi=0000000000000000
rip=fffff80640bfd6b7 rsp=ffffef08f3793460 rbp=0000000000000001
r8=ec126ad6e6a5ebe0 r9=0000000000000000 r10=fffff8064144eae0
r11=0000000000000000 r12=ffff80050baae508 r13=ffff80050baae460
r14=fffff8064144c6c0 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!ExpInterlockedPopEntrySListFault:
fffff806`40bfd6b7 498b08 mov rcx,qword ptr [r8] ds:002b:ec126ad6`e6a5ebe0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff806414fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064140f330: Unable to get Flags value from nt!KdVersionBlock
fffff8064140f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffffef08`f3793460 fffff806`40a24cf4 : ffffd90a`3d492148 fffff806`41450b40 00000000`00000001 ffff8005`0baae460 : nt!ExpInterlockedPopEntrySListFault
ffffef08`f3793470 fffff806`40aba39c : ffff8005`0baae4e8 ffffef08`f3793579 00000000`00000000 00000000`00000019 : nt!MiGetInPageSupportBlock+0x40
ffffef08`f37934a0 fffff806`40e3ea63 : ffff8005`0baae460 00000000`00000000 ffff8004`00000011 00000000`00000000 : nt!MiPfPutPagesInTransition+0x1bc
ffffef08`f37935e0 fffff806`40abe39f : ffff8005`0a633a20 ffffef08`f37937f0 ffff8005`0baae460 ffff8005`0dec5500 : nt!MmPrefetchForCacheManager+0xb7
ffffef08`f3793640 fffff806`40bb2bb0 : ffff8005`00004000 00000000`00000000 00000000`00024000 ffff8004`fa132080 : nt!CcAsyncReadPrefetch+0x13f
ffffef08`f37936f0 fffff806`40b17e25 : ffff8004`fa132080 ffff8004`fa132080 fffff806`40bb2a20 ffff8004`fa3e8420 : nt!CcAsyncReadWorker+0x190
ffffef08`f3793c10 fffff806`40bfcdd8 : ffff9500`d6e40180 ffff8004`fa132080 fffff806`40b17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffef08`f3793c60 00000000`00000000 : ffffef08`f3794000 ffffef08`f378e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!MiGetInPageSupportBlock+40

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .cxr 0xffffef08f3792a60 ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 40

FAILURE_BUCKET_ID: AV_nt!MiGetInPageSupportBlock

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ca996487-bb12-da65-51b7-f25961015b60}

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\010521-7140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`7f600000 PsLoadedModuleList = 0xfffff803`8022a2b0
Debug session time: Tue Jan 5 20:10:53.223 2021 (UTC + 3:00)
System Uptime: 2 days 0:06:07.857
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
..............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`7f9f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbb06`2b84be70=000000000000001a
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffff10006fb1a80
Arg3: 0000000000000068
Arg4: 0000000000000069

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4937

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 7521

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffff10006fb1a80

BUGCHECK_P3: 68

BUGCHECK_P4: 69

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: MsMpEng.exe

STACK_TEXT:
ffffbb06`2b84be68 fffff803`7f89a5da : 00000000`0000001a 00000000`00041790 fffff100`06fb1a80 00000000`00000068 : nt!KeBugCheckEx
ffffbb06`2b84be70 fffff803`7f89ad6e : 00000000`00000000 ffffbb06`2b84c580 fffff081`1f182000 ffffbb06`2b84c4d0 : nt!MiDeletePteRun+0x17da
ffffbb06`2b84c080 fffff803`7f80bedd : 00000000`00000000 ffff9485`3f288700 ffffbb06`2b84c4d0 fffff081`1f181ea0 : nt!MiDeleteVaTail+0x6e
ffffbb06`2b84c0b0 fffff803`7f80bafb : fffff0f8`00000000 ffff9485`3f288700 ffffbb06`00000000 ffffbb06`2b84c520 : nt!MiWalkPageTablesRecursively+0xc6d
ffffbb06`2b84c150 fffff803`7f80bafb : fffff0f8`7c2047c0 ffff9485`3f288700 ffffbb06`00000001 ffffbb06`2b84c530 : nt!MiWalkPageTablesRecursively+0x88b
ffffbb06`2b84c1f0 fffff803`7f80bafb : fffff0f8`7c204000 ffff9485`3f288700 ffffbb06`00000002 ffffbb06`2b84c540 : nt!MiWalkPageTablesRecursively+0x88b
ffffbb06`2b84c290 fffff803`7f85de6b : 00000000`00000000 ffff9485`3f288700 00000000`00000003 ffffbb06`2b84c550 : nt!MiWalkPageTablesRecursively+0x88b
ffffbb06`2b84c330 fffff803`7f89b991 : ffffbb06`2b84c4d0 ffff9485`00000000 00000000`00000002 fffff803`00000000 : nt!MiWalkPageTables+0x36b
ffffbb06`2b84c430 fffff803`7f86baf0 : 00000000`00000001 ffffbb06`00000000 ffff9485`3f288550 ffff9485`3f280080 : nt!MiDeletePagablePteRange+0x4f1
ffffbb06`2b84c740 fffff803`7fc35343 : ffff9485`3f280080 00000000`00000000 ffff9485`00000000 ffff9485`00000000 : nt!MiDeleteVad+0x360
ffffbb06`2b84c850 fffff803`7fc335ff : ffff9485`436a5540 ffff9485`436a5540 ffff9485`4ba34b70 ffff9485`3f288080 : nt!MiCleanVad+0x43
ffffbb06`2b84c880 fffff803`7fc5d6e4 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9485`3f288080 : nt!MmCleanProcessAddressSpace+0x137
ffffbb06`2b84c900 fffff803`7fd06596 : ffff9485`3f288080 ffff8186`2a068060 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffbb06`2b84c990 fffff803`7fd09a8e : ffff9485`00000000 00000000`00000001 00000000`00000000 000000b0`79d79000 : nt!PspExitThread+0x5f6
ffffbb06`2b84ca90 fffff803`7fa071b8 : ffff9485`3f288080 ffff9485`3f280080 ffffbb06`2b84cb80 00000000`000007b2 : nt!NtTerminateProcess+0xde
ffffbb06`2b84cb00 00007ffa`d948c534 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b0`79a9f958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d948c534


SYMBOL_NAME: nt!MiDeletePteRun+17da

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 17da

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup: MachineOwner
---------
[/CODE]
 
Driver Booster kullandın mı? Kullandıysan belirt.

BlueStack yüklüyse kaldır.

cFosSpeed yazılımını kaldır.

Ekran kartı sürücülerin güncelliğini kontrol eder misin? Güncel değil ise güncelle.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı