SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M hatası

BIOS'u güncellememişsin. Ayrıca PC'de güvenlik yazılımı var mı Defender dışında?

Kod:
WINLOGON_FATAL_ERROR (c000021a)
The Winlogon process terminated unexpectedly.
Arguments:
Arg1: ffffab07b66ae0e0, String that identifies the problem.
Arg2: ffffffffc0000428, Error Code.
Arg3: 0000000000000000
Arg4: 0000012a2d000000

Debugging Details:
------------------

ETW minidump data unavailable

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2437

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11316

    Key  : Analysis.IO.Other.Mb
    Value: 6

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 18

    Key  : Analysis.Init.CPU.mSec
    Value: 234

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8784

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xc000021a

    Key  : Bugcheck.Code.Register
    Value: 0x4c

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120921-27203-01.dmp

ERROR_CODE: (NTSTATUS) 0xc000021a - { nemli Sistem Hatas }  %hs sistem i lemi, 0x

EXCEPTION_CODE_STR:  c000021a

EXCEPTION_PARAMETER1:  ffffab07b66ae0e0

EXCEPTION_PARAMETER2:  ffffffffc0000428

EXCEPTION_PARAMETER3:  0000000000000000

EXCEPTION_PARAMETER4: 12a2d000000

BUGCHECK_CODE:  c000021a

BUGCHECK_P1: ffffab07b66ae0e0

BUGCHECK_P2: ffffffffc0000428

BUGCHECK_P3: 0

BUGCHECK_P4: 12a2d000000

PROCESS_NAME:  smss.exe

ADDITIONAL_DEBUG_TEXT:  initial session process or

IMAGE_NAME:  ntkrnlmp.exe

MODULE_NAME: nt

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

STACK_TEXT:
ffffe18a`cbd80598 fffff803`5f5ae38a     : 00000000`0000004c 00000000`c000021a ffffe18a`cbea03f0 ffffc00a`42854d10 : nt!KeBugCheckEx
ffffe18a`cbd805a0 fffff803`5f58f31b     : ffffe18a`cbd806c0 ffffe18a`cbd80660 ffffe18a`cbd806c0 ffffe18a`cbd80660 : nt!PopGracefulShutdown+0x29a
ffffe18a`cbd805e0 fffff803`5f595e6c     : 00000000`00000001 fffff803`00000006 00000000`00000005 00000000`00000000 : nt!PopTransitionSystemPowerStateEx+0x1217
ffffe18a`cbd806a0 fffff803`5f008cb8     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!NtSetSystemPowerState+0x4c
ffffe18a`cbd80880 fffff803`5effb100     : fffff803`5f443a9b 00000000`00000014 ffffffff`ffffff00 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffe18a`cbd80a18 fffff803`5f443a9b     : 00000000`00000014 ffffffff`ffffff00 00000000`00000000 fffff803`5f8239a0 : nt!KiServiceLinkage
ffffe18a`cbd80a20 fffff803`5f363379     : 00000000`00000000 ffffc00a`3fd17a60 00000000`00000000 00000000`00000000 : nt!PopIssueActionRequest+0xe0603
ffffe18a`cbd80ac0 fffff803`5ef53764     : 00000000`00000001 00000000`00000000 ffffffff`ffffffff fffff803`5f823900 : nt!PopPolicyWorkerAction+0x79
ffffe18a`cbd80b30 fffff803`5eeb8515     : ffffc00a`00000001 ffffc00a`41b32040 fffff803`5ef536d0 ffffc00a`00000000 : nt!PopPolicyWorkerThread+0x94
ffffe18a`cbd80b70 fffff803`5ef55855     : ffffc00a`41b32040 00000000`00000080 ffffc00a`3fc9f040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffe18a`cbd80c10 fffff803`5effe8f8     : ffffd080`ede80180 ffffc00a`41b32040 fffff803`5ef55800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe18a`cbd80c60 00000000`00000000     : ffffe18a`cbd81000 ffffe18a`cbd7b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!PopTransitionSystemPowerStateEx+1217

IMAGE_VERSION:  10.0.19041.1348

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1217

FAILURE_BUCKET_ID:  0xc000021a_SmpDestroyControlBlock_smss.exe_Terminated_c0000428_nt!PopTransitionSystemPowerStateEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {11c026a4-042b-4c24-02dc-2da456397475}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffffa1392b57e13c, Address of the instruction which caused the BugCheck
Arg3: ffffea80a7d9bbd0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3030

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11815

    Key  : Analysis.IO.Other.Mb
    Value: 7

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 23

    Key  : Analysis.Init.CPU.mSec
    Value: 311

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9998

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 95

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120821-28390-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffa1392b57e13c

BUGCHECK_P3: ffffea80a7d9bbd0

BUGCHECK_P4: 0

CONTEXT:  ffffea80a7d9bbd0 -- (.cxr 0xffffea80a7d9bbd0)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa1392b7c3ea4
rdx=0000000000000000 rsi=ffffa15c8060ed18 rdi=ffffa15c8060ed18
rip=ffffa1392b57e13c rsp=ffffea80a7d9c5d0 rbp=ffffea80a7d9c699
 r8=0000000000000000  r9=0000000000000000 r10=ffffa15c8060b010
r11=0000000000000001 r12=0000000000000000 r13=ffffea80a7d9c780
r14=0000000000000005 r15=ffffa1392b7c3ea4
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
win32kfull!MAPPER::bFoundExactMatch+0x20c:
ffffa139`2b57e13c 66453b463c      cmp     r8w,word ptr [r14+3Ch] ds:002b:00000000`00000041=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT:
ffffea80`a7d9c5d0 ffffa139`2b57def4     : ffffa15c`8060a6c0 ffffa15c`8060a6c0 ffffa15c`8066d470 ffffea80`a7d9c9e0 : win32kfull!MAPPER::bFoundExactMatch+0x20c
ffffea80`a7d9c700 ffffa139`2b57f7fc     : 00000000`00000000 ffffa15c`846688a8 00000000`00000000 ffffa15c`8066d470 : win32kfull!ppfeGetAMatch+0x1e4
ffffea80`a7d9c8f0 ffffa139`2b57f2f5     : 00000000`00000000 00000000`00000000 ffffea80`a7d9c9e8 ffffea80`a7d9ca00 : win32kfull!LFONTOBJ::ppfeMapFont+0x28c
ffffea80`a7d9c9b0 ffffa139`2b57f095     : 00000000`00000000 00000000`00000020 ffffa15c`80615000 00000000`00000000 : win32kfull!GreGetTextFaceW+0x1d5
ffffea80`a7d9ca60 ffffa139`2bd0c081     : 00000000`190100d1 00000067`7ea7c600 ffffa139`2bd0c06c fffff804`3f21ddd0 : win32kfull!NtGdiGetTextFaceW+0x85
ffffea80`a7d9cac0 fffff804`3ea08cb8     : 00000067`7ea7c600 ffffea80`a7d9cb80 ffffea80`00000000 ffffa139`2bd0c06c : win32k!NtGdiGetTextFaceW+0x15
ffffea80`a7d9cb00 00007ffc`2e7d1fe4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000067`7ea7c508 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2e7d1fe4


SYMBOL_NAME:  win32kfull!MAPPER::bFoundExactMatch+20c

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.1348

STACK_COMMAND:  .cxr 0xffffea80a7d9bbd0 ; kb

BUCKET_ID_FUNC_OFFSET:  20c

FAILURE_BUCKET_ID:  AV_win32kfull!MAPPER::bFoundExactMatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {44a94e3b-0111-b7b3-b6e9-09dcf25c0fd6}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 00000000001664a7, entry in list being removed
Arg3: 000000000021f37f, highest physical page number
Arg4: 0000000000000001, reference count of entry being removed

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1827

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10598

    Key  : Analysis.IO.Other.Mb
    Value: 7

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 22

    Key  : Analysis.Init.CPU.mSec
    Value: 250

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9167

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x4e

    Key  : Bugcheck.Code.Register
    Value: 0x4e

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120921-27437-01.dmp

BUGCHECK_CODE:  4e

BUGCHECK_P1: 2

BUGCHECK_P2: 1664a7

BUGCHECK_P3: 21f37f

BUGCHECK_P4: 1

BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

TRAP_FRAME:  ffff890103f6f460 -- (.trap 0xffff890103f6f460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000007
rdx=00000000001717a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8024c6cc2a2 rsp=ffff890103f6f5f8 rbp=ffffa805f8466000
 r8=000000000000001c  r9=ffffbb8847952080 r10=ffffa805fd0957a0
r11=00000000000007a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!HvpGetCellPaged+0xa2:
fffff802`4c6cc2a2 418b02          mov     eax,dword ptr [r10] ds:ffffa805`fd0957a0=ffffff98
Resetting default scope

STACK_TEXT:
ffff8901`03f6efa8 fffff802`4c2aa8f9     : 00000000`0000004e 00000000`00000002 00000000`001664a7 00000000`0021f37f : nt!KeBugCheckEx
ffff8901`03f6efb0 fffff802`4c2a9990     : 00000000`00000003 00000000`00000000 ffffa805`f8ac48e0 00000000`00000000 : nt!MiUnlinkPageFromList+0xc89
ffff8901`03f6f040 fffff802`4c2a8f74     : ffff8901`03f6f1e0 ffff8901`03f6f280 0000000f`ffffffff 80000001`664a7962 : nt!MiHandleTransitionFault+0x180
ffff8901`03f6f0c0 fffff802`4c2a11fe     : ffff8901`03f6f1e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiResolveTransitionFault+0x424
ffff8901`03f6f180 fffff802`4c29f119     : 00000000`00000000 00000000`00000000 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x3fe
ffff8901`03f6f2c0 fffff802`4c40545e     : 00000000`00000000 00000000`000000c0 00000000`000000d0 00000000`00000000 : nt!MmAccessFault+0x189
ffff8901`03f6f460 fffff802`4c6cc2a2     : fffff802`4c5e69df 00000000`9817fa5c ffff8901`03f6f920 00000000`00000000 : nt!KiPageFault+0x35e
ffff8901`03f6f5f8 fffff802`4c5e69df     : 00000000`9817fa5c ffff8901`03f6f920 00000000`00000000 ffffa805`f851e010 : nt!HvpGetCellPaged+0xa2
ffff8901`03f6f600 fffff802`4c5ec815     : 00000001`ffffffff 00000000`3d165065 ffff8901`03f70068 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffff8901`03f6f650 fffff802`4c5efa39     : ffffa805`f851e010 00000000`00000001 ffff8901`03f6f850 ffff8901`03f6f8d0 : nt!CmpWalkOneLevel+0x6f5
ffff8901`03f6f750 fffff802`4c5ee323     : ffffa805`0000001c ffff8901`03f6faa0 ffff8901`03f6fa58 ffffbb88`4f116010 : nt!CmpDoParseKey+0x849
ffff8901`03f6f9f0 fffff802`4c5f23ee     : fffff802`4c5ee001 00000000`00000000 ffffbb88`4f116010 00000000`01f63400 : nt!CmpParseKey+0x2c3
ffff8901`03f6fb90 fffff802`4c6948aa     : ffffbb88`4f116000 ffff8901`03f6fdf8 00000000`00000240 ffffbb88`479f5d20 : nt!ObpLookupObjectName+0x3fe
ffff8901`03f6fd60 fffff802`4c69468c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffbb88`479f5d20 : nt!ObOpenObjectByNameEx+0x1fa
ffff8901`03f6fe90 fffff802`4c6941b1     : ffff8901`03f70380 ffff8901`03f70200 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffff8901`03f6fee0 fffff802`4c6e3212     : 00000001`00000000 ffffa805`f910f000 00000000`001697e2 00000000`00000000 : nt!CmOpenKey+0x2c1
ffff8901`03f70140 fffff802`4c408cb8     : 00000000`00000001 fffff802`50600000 ffff8901`03f704a0 00000000`00000000 : nt!NtOpenKey+0x12
ffff8901`03f70180 fffff802`4c3fb100     : fffff802`4c5e1bc0 00000000`00000000 ffff8901`03f70379 ffff8901`03f70698 : nt!KiSystemServiceCopyEnd+0x28
ffff8901`03f70318 fffff802`4c5e1bc0     : 00000000`00000000 ffff8901`03f70379 ffff8901`03f70698 ffffffff`ffffffff : nt!KiServiceLinkage
ffff8901`03f70320 fffff802`4c6c9f54     : ffffa805`f9010000 00000000`000000ac ffff8901`03f70698 00000000`00000000 : nt!RtlpGetRegistryHandle+0x12c
ffff8901`03f703e0 fffff802`4c6c9cde     : ffffa805`f90100b0 fffff802`4c29f2a3 00000000`00000111 00000000`00000000 : nt!RtlpGetTimeZoneInfoHandle+0x44
ffff8901`03f70660 fffff802`4c6c995b     : ffffa805`f9010000 00000000`00989680 ffffa805`f9010068 ffffbb88`4794e600 : nt!RtlpQueryTimeZoneInformationWorker+0x5e
ffff8901`03f70930 fffff802`4c6c91d7     : ffffffff`ffffff00 ffff8901`03f70a59 ffffffff`ffffff00 ffffbb88`00000000 : nt!EtwpAddLogHeader+0x237
ffff8901`03f709e0 fffff802`4c6c8fdb     : ffffffff`ffffffff ffffffff`ffffffff ffffffff`800005a0 ffffbb88`4794e600 : nt!EtwpUpdateFileHeader+0xf3
ffff8901`03f70ac0 fffff802`4c6ca206     : ffffbb88`4794e600 ffffbb88`4794e600 ffffffff`ffffff01 ffffffff`fffffffd : nt!EtwpCreateLogFile+0x1f3
ffff8901`03f70b90 fffff802`4c355855     : ffffffff`fffffffd ffffbb88`47952080 00000000`00000080 fffff802`4c6c9fd0 : nt!EtwpLogger+0x236
ffff8901`03f70c10 fffff802`4c3fe8f8     : ffffdf01`3e128180 ffffbb88`47952080 fffff802`4c355800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8901`03f70c60 00000000`00000000     : ffff8901`03f71000 ffff8901`03f6b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiUnlinkPageFromList+c89

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1348

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  c89

FAILURE_BUCKET_ID:  0x4E_2_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b084f841-86a9-e353-1d26-a04cfe7406b4}

Followup:     MachineOwner
---------
 

Geri
Yukarı