SYSTEM_SERVICE_EXCEPTION hatası

Katılım
15 Temmuz 2015
Mesajlar
1.328
Makaleler
9
Çözümler
4
Merhabalar, sadece oyun oynarken ( CS:GO) aniden bilgisayar kapanıyor ve mavi ekran veriyor. Ekran sürekli aynı fakat verdiği hatalar değişiyor:
  • SYSTEM_SERVICE_EXCEPTION
  • SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
  • KERNEL_SECURITY_CHECK_FAILURE

Açılan diğer konulara baktım, ekran kartı sürücüsü güncel. Diğer bileşenlerle alakalı sıkıntı olup olamayacağını bilmiyorum, kurulu programlarım bunlar:



Sistem:
  • PowerColor R7 265.
  • FX X6 6350.
  • M5A97LE r2.0.
  • Cooler Master RC-430 500W.
  • Crucial 4 GB 1600MHz.
  • Windows 10 64 Bit.
Sıcaklık sorunu olduğunu düşünmüyorum; oyun esnasında ortalama GPU 60°, CPU ise 40° civarında oluyor.

Minidump dosyalarım:
@Recep Baltaş minidump dosyalarına bakmaya zamanınız olursa sevinirim.


 
Son düzenleyen: Moderatör:
Windows 10 2004 sürümüne geçer misin?

 
Son düzenleyen: Moderatör:
Bellek testi yapınız ilk olarak.


Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8037628c9ce, The address that the exception occurred at
Arg3: ffff84834e8b5518, Exception Record Address
Arg4: ffff8c81f1ab2930, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8037628c9ce

BUGCHECK_P3: ffff84834e8b5518

BUGCHECK_P4: ffff8c81f1ab2930

EXCEPTION_RECORD:  ffff84834e8b5518 -- (.exr 0xffff84834e8b5518)
ExceptionAddress: fffff8037628c9ce (nt!KxWaitForLockOwnerShip+0x000000000000000e)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffff8c81f1ab2930 -- (.cxr 0xffff8c81f1ab2930)
rax=0000000000000000 rbx=ffff84834e8b5860 rcx=ffff84834e8b5860
rdx=0008000000000000 rsi=00000000001b0486 rdi=ffffcb05ba857db8
rip=fffff8037628c9ce rsp=ffff84834e8b5750 rbp=ffff84834e8b5889
 r8=0000000000000089  r9=0000000000000000 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffffcb05b62da010 r13=ffffc70001a4aaa0
r14=fffff8037666a400 r15=00000000ffffffff
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KxWaitForLockOwnerShip+0xe:
fffff803`7628c9ce 48890a          mov     qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff803767733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037662a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8037662a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

BAD_STACK_POINTER:  ffff8c81f1ab20c8

STACK_TEXT: 
ffff8483`4e8b5750 fffff803`7631777d : ffffcb05`ba45a8a0 ffffcb05`ba45a8b0 00000000`00000001 00000000`003f9b00 : nt!KxWaitForLockOwnerShip+0xe
ffff8483`4e8b5780 fffff803`76349f4e : ffffcb05`ba857cd0 ffffcb05`b5cc0028 00000000`001b0486 00000000`001b0485 : nt!KeAcquireInStackQueuedSpinLock+0x7d
ffff8483`4e8b57b0 fffff803`7634aa08 : ffffcb05`b62da010 ffff8483`00000001 00000000`001b0486 00000000`00000000 : nt!MiStoreWriteModifiedPages+0x376
ffff8483`4e8b58f0 fffff803`7639169a : ffffcb05`b62da010 00000000`00000100 fffff803`000d09db ffffcb05`00000100 : nt!MiGatherPagefilePages+0x44c
ffff8483`4e8b59f0 fffff803`7626bcd5 : ffffcb05`b64cc080 ffffcb05`b64cc080 00000000`00000080 fffff803`76391440 : nt!MiModifiedPageWriter+0x25a
ffff8483`4e8b5c10 fffff803`763c9998 : ffff8c81`f1c80180 ffffcb05`b64cc080 fffff803`7626bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8483`4e8b5c60 00000000`00000000 : ffff8483`4e8b6000 ffff8483`4e8b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffff8c81f1ab2930 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5e1ad-426c-3e07-1dfd-b329bf712cb6}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffff9a8068cb1ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9a8068cb1f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffff9a8068cb1ff0

BUGCHECK_P3: ffff9a8068cb1f48

BUGCHECK_P4: 0

TRAP_FRAME:  ffff9a8068cb1ff0 -- (.trap 0xffff9a8068cb1ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffb0e66c55000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffffb0e66c5b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804170002f1 rsp=ffff9a8068cb2180 rbp=ffff9a8068cb26f0
 r8=fffffb0e66c5b000  r9=ffff9a8068cb2710 r10=ffff870cb52ed080
r11=000000a69d0fdd68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x19e355:
fffff804`170002f1 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9a8068cb1f48 -- (.exr 0xffff9a8068cb1f48)
ExceptionAddress: fffff804170002f1 (nt!RtlpGetStackLimitsEx+0x000000000019e355)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steamwebhelper.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  ffff9a8068cb1cc8

STACK_TEXT: 
ffff9a80`68cb1cc8 fffff804`16fd41e9 : 00000000`00000139 00000000`00000004 ffff9a80`68cb1ff0 ffff9a80`68cb1f48 : nt!KeBugCheckEx
ffff9a80`68cb1cd0 fffff804`16fd4610 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9a80`68cb1e10 fffff804`16fd29a3 : fffff804`16e69038 fffff804`1720e88c ffff9a80`68cb27d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9a80`68cb1ff0 fffff804`170002f1 : 00000000`00000000 00000000`0000035e 0005e380`00ab7000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x323
ffff9a80`68cb2180 fffff804`1705982a : 00000000`00000000 00000000`00000000 ffff9a80`68cb26f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x19e355
ffff9a80`68cb21b0 fffff804`16efe85e : fffffb0e`66c5a068 ffff9a80`68cb2e30 fffffb0e`66c5a068 00000000`00000001 : nt!RtlDispatchException+0x15fa0a
ffff9a80`68cb2900 fffff804`16fc3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffff9a80`68cb2fb0 fffff804`16fc31d0 : fffff804`16fd4316 00000000`00000028 00000000`00000000 fffffb0e`66c59fe1 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffb0e`66c59f28 fffff804`16fd4316 : 00000000`00000028 00000000`00000000 fffffb0e`66c59fe1 fffff804`16ecd1f7 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffb0e`66c59f30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8006a68c9ce, Address of the instruction which caused the bugcheck
Arg3: ffffc98006cb2930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 19

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8006a68c9ce

BUGCHECK_P3: ffffc98006cb2930

BUGCHECK_P4: 0

CONTEXT:  ffffc98006cb2930 -- (.cxr 0xffffc98006cb2930)
rax=0000000000000000 rbx=fffffa0f83d1dde0 rcx=fffffa0f83d1dde0
rdx=0008000000000000 rsi=ffff888dc0625010 rdi=ffffae88607a4690
rip=fffff8006a68c9ce rsp=fffffa0f83d1dd50 rbp=fffffa0f83d1de70
 r8=000000000000021c  r9=0000000000000000 r10=fffff8006a711000
r11=ffffb97cd3e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000a16ce3 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KxWaitForLockOwnerShip+0xe:
fffff800`6a68c9ce 48890a          mov     qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

BAD_STACK_POINTER:  ffffc98006cb1ff8

STACK_TEXT: 
fffffa0f`83d1dd50 fffff800`6a71777d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0xe
fffffa0f`83d1dd80 fffff800`6a71105c : ffffae88`607a4630 ffff888d`c0911000 00000000`fffffde4 ffff88b8`2fa6f7d7 : nt!KeAcquireInStackQueuedSpinLock+0x7d
fffffa0f`83d1ddb0 ffff88b8`2f7e6415 : ffff888d`c0911000 fffffa0f`83d1de70 ffff888d`c0911000 ffffb97c`d3e00000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0x5c
fffffa0f`83d1de10 ffff88b8`2f45b022 : 00000000`00000000 fffffa0f`83d1de70 ffff888d`c0625010 ffff888d`c0911000 : win32kbase!GreReleaseSemaphoreInternal+0x15
fffffa0f`83d1de40 00000000`00000000 : fffffa0f`83d1de70 ffff888d`c0625010 ffff888d`c0911000 ffff888d`c0911000 : win32kfull+0x5b022


SYMBOL_NAME:  win32kbase!GreReleaseSemaphoreInternal+15

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffffc98006cb2930 ; kb

BUCKET_ID_FUNC_OFFSET:  15

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_win32kbase!GreReleaseSemaphoreInternal

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {be9879cf-2916-f071-51a9-d6fff044b73c}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80532c8c9ce, The address that the exception occurred at
Arg3: ffffc388510bc518, Exception Record Address
Arg4: ffffd901c98ab930, Context Record Address

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 42

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.CorruptModuleList
    Value: 1


ADDITIONAL_XML: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80532c8c9ce

BUGCHECK_P3: ffffc388510bc518

BUGCHECK_P4: ffffd901c98ab930

EXCEPTION_RECORD:  ffffc388510bc518 -- (.exr 0xffffc388510bc518)
Cannot read Exception record @ ffffc388510bc518

CONTEXT:  ffffd901c98ab930 -- (.cxr 0xffffd901c98ab930)
rax=0000000000000000 rbx=ffffc388510bc860 rcx=ffffc388510bc860
rdx=0008000000000000 rsi=000000000039e235 rdi=ffffb30fc94cdee8
rip=fffff80532c8c9ce rsp=ffffc388510bc750 rbp=ffffc388510bc889
 r8=000000000000001d  r9=0000000000000000 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffffb30fcf2c5010 r13=ffffef8001872720
r14=fffff8053306a400 r15=00000000ffffffff
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
fffff805`32c8c9ce ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffffd901`c98ab0c8 fffff805`32ddb416 : 00000000`0000007e ffffffff`c0000005 fffff805`32c8c9ce ffffc388`510bc518 : 0xfffff805`32dc2390
ffffd901`c98ab0d0 00000000`0000007e : ffffffff`c0000005 fffff805`32c8c9ce ffffc388`510bc518 ffffd901`c98ab930 : 0xfffff805`32ddb416
ffffd901`c98ab0d8 ffffffff`c0000005 : fffff805`32c8c9ce ffffc388`510bc518 ffffd901`c98ab930 00000000`00000000 : 0x7e
ffffd901`c98ab0e0 fffff805`32c8c9ce : ffffc388`510bc518 ffffd901`c98ab930 00000000`00000000 00000000`0006bcd5 : 0xffffffff`c0000005
ffffd901`c98ab0e8 ffffc388`510bc518 : ffffd901`c98ab930 00000000`00000000 00000000`0006bcd5 fffff805`32d9d37c : 0xfffff805`32c8c9ce
ffffd901`c98ab0f0 ffffd901`c98ab930 : 00000000`00000000 00000000`0006bcd5 fffff805`32d9d37c fffff805`00000003 : 0xffffc388`510bc518
ffffd901`c98ab0f8 00000000`00000000 : 00000000`0006bcd5 fffff805`32d9d37c fffff805`00000003 ffffc388`510bcc10 : 0xffffd901`c98ab930


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8050f28c9ce, Address of the instruction which caused the bugcheck
Arg3: ffffe200a1cb2930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 4

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8050f28c9ce

BUGCHECK_P3: ffffe200a1cb2930

BUGCHECK_P4: 0

CONTEXT:  ffffe200a1cb2930 -- (.cxr 0xffffe200a1cb2930)
rax=0000000000000000 rbx=fffffd09d7539ff0 rcx=fffffd09d7539ff0
rdx=0008000000000000 rsi=0000000000000000 rdi=fffff8050f78d3e0
rip=fffff8050f28c9ce rsp=fffffd09d7539f90 rbp=ffff9f86d278a3c0
 r8=00000000ffffffff  r9=7fffaf869ea6e240 r10=7ffffffffffffffc
r11=000000000000001b r12=0000000000000003 r13=fffffd09d753a1c0
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff805`0f28c9ce 48890a          mov     qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

BAD_STACK_POINTER:  ffffe200a1cb1ff8

STACK_TEXT: 
fffffd09`d7539f90 fffff805`0f30f459 : 00000000`00000000 fffff805`0f8c076e 00000000`00000000 ffffaf86`00000000 : nt!KxWaitForLockOwnerShip+0xe
fffffd09`d7539fc0 fffff805`0f8b6019 : fffffd09`d753a150 fffffd09`d753a940 00000000`00000001 fffffd09`d753a940 : nt!ExReleaseResourceLite+0x119
fffffd09`d753a020 fffff805`0f8bd066 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmpUnlockRegistry+0x19
fffffd09`d753a050 fffff805`0f8b8934 : fffffd09`0000001c fffffd09`d753a3a0 fffffd09`d753a368 00000000`00000000 : nt!CmpDoParseKey+0x2196
fffffd09`d753a2f0 fffff805`0f8b681f : ffff9f86`d3ea7010 ffffaf86`9ea35b01 ffff9f86`00000000 00000000`00000001 : nt!CmpParseKey+0x274
fffffd09`d753a510 fffff805`0f8b4c81 : ffff9f86`d3ea7000 fffffd09`d753a758 00000000`00000040 ffff9f86`c6ac5da0 : nt!ObpLookupObjectName+0x78f
fffffd09`d753a6d0 fffff805`0f8be19c : ffff9f86`00000001 00000000`00000000 00000000`00000000 ffff9f86`c6ac5da0 : nt!ObOpenObjectByNameEx+0x201
fffffd09`d753a810 fffff805`0f8be01d : 00000030`941fe588 fffffd09`d753ab80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
fffffd09`d753a860 fffff805`0f802002 : 00000000`00000004 000001f8`eda1c740 00000000`000000a0 00000000`00000008 : nt!CmOpenKey+0x29d
fffffd09`d753aac0 fffff805`0f3d3c18 : 00000000`00000000 fffffd09`d753ab80 fffffd09`d753ab80 ffff9f86`d5703060 : nt!NtOpenKey+0x12
fffffd09`d753ab00 00007ffe`4e8dc2b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000030`941fe528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4e8dc2b4


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffffe200a1cb2930 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d727c4af-27c7-04e4-888d-ab8b74fdce06}

Followup:     MachineOwner
---------
 
Bellek testi yapınız ilk olarak.


Öncelikle zaman ayırdığınız için çok teşekkür ederim, siz yazmadan önce yabancı forumlarda araştırmıştım ve çözümü buymuş:

Kod:
Solution:

1.Run cmd.exe
2.c:
3.BCDEDIT /SET {default} bootmenupolicy legacy
4.exit
5.Finally problem solved.

Bu kod ne işe yarıyor peki? 2 gündür sorunsuz oynuyorum.
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…