Çözüldü SYSTEM_SERVICE_EXCEPTION win32kbase.sys mavi ekran

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Memtest86 ile USB üzerinden RAM testi yap. Ayrıca Kaspersky indirip virüs taraması yap, dosyalardan birinde bir keylogger virüsünün takma adını gördüm, ne olur ne olmaz tarat sistemi. Ayrıca Social Club uygulamasını da kaldırıp tekrar kur.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff892ea4aaf21, Address of the instruction which caused the bugcheck
Arg3: ffff88874daecec0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 5

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff892ea4aaf21

BUGCHECK_P3: ffff88874daecec0

BUGCHECK_P4: 0

CONTEXT:  ffff88874daecec0 -- (.cxr 0xffff88874daecec0)
rax=ffffa705e5a37000 rbx=0000000000000401 rcx=0000000000000401
rdx=0000000075845600 rsi=0000000000000012 rdi=0000000000000000
rip=fffff892ea4aaf21 rsp=ffff88874daed8b0 rbp=ffff88874daed930
r8=ffff88874daeda80  r9=ffff88874daeda88 r10=fffff801758f4bf0
r11=ffff88874daed930 r12=ffff88874daeda88 r13=6572685402980000
r14=fffff8c7841c4540 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
win32kfull!TransformMessageBetweenCoordinateSpaces+0xa1:
fffff892`ea4aaf21 4939bd68010000  cmp     qword ptr [r13+168h],rdi ds:002b:65726854`02980168=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  SocialClubHelper.exe

STACK_TEXT:
ffff8887`4daed8b0 fffff892`ea4acdc3 : 00000000`00000040 00000000`00000000 00000000`00000008 ffff8887`4daeda50 : win32kfull!TransformMessageBetweenCoordinateSpaces+0xa1
ffff8887`4daed970 fffff892`ea4adaba : 00000000`00000001 00000000`00000401 00000000`00000000 00000000`00000000 : win32kfull!_PostTransformableMessageExtended+0x5a3
ffff8887`4daeda70 fffff801`759d3c18 : ffffa705`e5a37080 ffff8887`4daedb80 00000000`00000000 0000025f`49372c30 : win32kfull!NtUserPostMessage+0x13a
ffff8887`4daedb00 00007ffa`7e591284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000db`b229f2b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`7e591284


SYMBOL_NAME:  win32kfull!TransformMessageBetweenCoordinateSpaces+a1

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .cxr 0xffff88874daecec0 ; kb

BUCKET_ID_FUNC_OFFSET:  a1

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!TransformMessageBetweenCoordinateSpaces

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {129324e6-9c21-cbdc-3142-a4ec3c91c702}

Followup:     MachineOwner
---------
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff9fad0ebe5c11, Virtual address for the attempted write.
Arg2: 81000007cec0d021, PTE contents.
Arg3: fffffe875d045100, (reserved)
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 6

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff9fad0ebe5c11

BUGCHECK_P2: 81000007cec0d021

BUGCHECK_P3: fffffe875d045100

BUGCHECK_P4: b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  fffffe875d045100 -- (.trap 0xfffffe875d045100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa38eb78d5080
rdx=ffffa38eae2ab380 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9fad0ea166c5 rsp=fffffe875d045290 rbp=fffffe875d045389
r8=ffff8d0873bdb001  r9=fffff8055d600000 r10=fffff8055dcbaa00
r11=ffff8d08711c3040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
win32kbase!rimConvertUserToKernelEventHandle+0x4d:
ffff9fad`0ea166c5 488b0544f51c00  mov     rax,qword ptr [win32kbase!ExEventObjectType (ffff9fad`0ebe5c10)] ds:ffff9fad`0ebe5c10={nt!ExEventObjectType (fffff805`5db73020)}
Resetting default scope

STACK_TEXT:
fffffe87`5d044e58 fffff805`5d82de6a : 00000000`000000be ffff9fad`0ebe5c11 81000007`cec0d021 fffffe87`5d045100 : nt!KeBugCheckEx
fffffe87`5d044e60 fffff805`5d6c91af : 00000000`00000001 00000000`00000003 00000000`00000000 ffff9fad`0ebe5c11 : nt!MiSystemFault+0x195dca
fffffe87`5d044f60 fffff805`5d7d041e : 00000000`00000000 00000000`00000000 00000000`00000040 00000000`00000001 : nt!MmAccessFault+0x34f
fffffe87`5d045100 ffff9fad`0ea166c5 : ffffa38e`b784bbb0 00000000`00000000 ffffa38e`00000001 ffff9fad`0e9e93d6 : nt!KiPageFault+0x35e
fffffe87`5d045290 ffff9fad`0ea14baf : ffffa38e`b784bbb0 ffffa38e`b7749c60 ffff9fad`0ebbb0d0 00000000`00010039 : win32kbase!rimConvertUserToKernelEventHandle+0x4d
fffffe87`5d0452e0 ffff9fad`0ea17665 : ffff9fc8`406063f0 ffff9fc8`406063f0 ffff9fc8`406063f0 ffffa38e`b78d6070 : win32kbase!RIMReadInput+0xdf
fffffe87`5d0453d0 ffff9fad`0eb2a2e8 : ffff9fad`0eb830e0 fffffe87`5d045520 ffff9fc8`406063f0 00000000`00000000 : win32kbase!CBaseInput::Read+0x55
fffffe87`5d045420 ffff9fad`0ea12820 : 00000000`00000040 ffff9fad`0eb830e0 00000000`00000001 fffff805`5d713f04 : win32kbase!CBaseInput::OnReadNotification+0x4c8
fffffe87`5d045560 ffff9fad`0ea12582 : 00000000`00000010 ffff9fc8`4067b4c0 00000000`00000006 ffff3ba1`77cb8bbf : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x290
fffffe87`5d0456d0 ffff9fad`0ea11c4e : 00000000`00000003 00000000`00002000 ffff9fc8`4061c000 ffff9fad`0ebbfb10 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
fffffe87`5d045700 ffff9fad`0ea11a52 : 00000000`00000006 00000000`00002000 00000000`00000006 fffff805`5d71108a : win32kbase!LegacyInputDispatcher::Dispatch+0x52
fffffe87`5d045730 ffff9fad`0e60e638 : ffff9fc8`4061c050 ffff9fc8`4061c050 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x102
fffffe87`5d045860 ffff9fad`0e60e273 : 00000000`00000004 00000000`00000004 00000000`0000000c ffff9fad`0ebc71e0 : win32kfull!xxxDesktopThreadWaiter+0x130
fffffe87`5d0458e0 ffff9fad`0ea53b1d : ffffa38e`b78d5080 ffffa38e`b78d5080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x403
fffffe87`5d0459c0 ffff9fad`0e615e9f : ffffa38e`b78d5080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x22d
fffffe87`5d045ad0 fffff805`5d7d3c18 : ffffa38e`b78d5080 00000000`00000005 00000289`e94041a0 00000000`000003e0 : win32kfull!NtUserCallNoParam+0x6f
fffffe87`5d045b00 00007ffa`23a71144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a5`d95ff758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`23a71144


SYMBOL_NAME:  win32kbase!rimConvertUserToKernelEventHandle+4d

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4d

FAILURE_BUCKET_ID:  0xBE_win32kbase!rimConvertUserToKernelEventHandle

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {48c15d95-8b0d-9f37-bd65-f8e7b00857a5}

Followup:     MachineOwner
---------
 
@r.yasar10 ilginize teşekkür ederim. Sağolun
Merhaba arkadaşlar. @r.yasar10 arkadaşımızın tavsiyesi üzerine virüs testi ve Memtest86 testi yaptım. Virüs testinde virüse rastlamadım fakat Memtest86 testinde aşağıdaki ekran görüntüsünü paylaştığım sonuca ulaştım. Pek birşey anlamadım. Umarım yardımcı olursunuz. Teşekkürler.

 
Son düzenleme:
Uyumlu bellek alın, ala ala uyumsuz olanı almışsın. RAM ve Windows güncellemeleri kaynaklı.
 
Uyumlu bellek alın, ala ala uyumsuz olanı almışsın. RAM ve Windows güncellemeleri kaynaklı.
Belleklerim uyumlu. Bir hafta araştırmasını yapmıştım.
Belleklerim uyumlu. Bir hafta araştırmasını yapmıştım.
 

Dosya Ekleri

  • Screenshot_20200603-214445_Chrome.jpg
    Screenshot_20200603-214445_Chrome.jpg
    143,5 KB · Görüntüleme: 121
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı