SYSTEM_SERVICE_EXCEPTION mavi ekran hatası

İşletim sistemi
Windows 10

Blueloss

Femtopat
Katılım
10 Aralık 2020
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Merhabalar, oncelikle yaptığım denemelerden bahsedeyim.

-Driverlari guncelledim.
-Ekran kartini guncelledim.
-BIOS vs onlara da baktim.
-CMD'den onerdikleri bazi kodlari yaptim ama gene de sorunu cozemedim.

Benim dusuncem yakin zamanda Windows 10 guncellemesi yaptim ve RAM'lerimi degistirdim. İkisinden birinin olabilecegini dusunuyorum. Yardimci olabilirseniz cok mutlu olurum.

 

Dosya Ekleri

  • indir.png
    indir.png
    79,5 KB · Görüntüleme: 23
Son düzenleyen: Moderatör:
  • Apple cihazınıza ait iTunes gibi yazılımları kaldırın.
  • USBPcap yazılımını kaldırın.
  • Harici bir Wi-Fi adaptör kullanıyorsunuz, bunun da yazılımını güncelleyin.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1728.18235\120920-7140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`08a00000 PsLoadedModuleList = 0xfffff803`0962a2b0
Debug session time: Wed Dec 9 20:56:49.922 2020 (UTC + 3:00)
System Uptime: 0 days 0:46:07.576
Loading Kernel Symbols
...............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`08d9d840 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffff8a86`f20c6610=000000000000003b
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80308c848a7, Address of the instruction which caused the bugcheck
Arg3: ffff8a86f20c6f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3312

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 19997

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80308c848a7

BUGCHECK_P3: ffff8a86f20c6f20

BUGCHECK_P4: 0

CONTEXT:  ffff8a86f20c6f20 -- (.cxr 0xffff8a86f20c6f20)
rax=0000000000000000 rbx=fffe8c08d90c9bb0 rcx=fffe8c08d90c9be0
rdx=000000007457624f rsi=fffe8c08d90c9be0 rdi=ffffffffffffffff
rip=fffff80308c848a7 rsp=ffff8a86f20c7920 rbp=ffff8a86f20c7a80
r8=0000000000000078 r9=ffff8a86f20c7748 r10=0000000000000000
r11=ffff8a86f20c7770 r12=000000babf7aeec0 r13=00000000bf7af100
r14=0000000000000601 r15=7fffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!ObfDereferenceObjectWithTag+0x27:
fffff803`08c848a7 f0480fc13b lock xadd qword ptr [rbx],rdi ds:002b:fffe8c08`d90c9bb0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.exe

STACK_TEXT:
ffff8a86`f20c7920 fffff803`08fe1a9c : 00000000`00000000 000000ba`bf7aed00 ffff8a86`f20c7901 000000ba`bf7ae900 : nt!ObfDereferenceObjectWithTag+0x27
ffff8a86`f20c7960 fffff803`08fe19e0 : ffff8c08`d677d080 000000ba`bf7aedf8 00000000`00000000 000000ba`bf7aeec0 : nt!ObWaitForSingleObject+0xac
ffff8a86`f20c79c0 fffff803`08daf175 : 00000259`00000000 ffff8c08`00000001 ffff8a86`f20c7a18 ffffffff`ffb673e0 : nt!NtWaitForSingleObject+0x60
ffff8a86`f20c7a00 00007ffc`0b50ae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ba`bf7aedc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0b50ae54


SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+27

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1

STACK_COMMAND: .cxr 0xffff8a86f20c6f20 ; kb

BUCKET_ID_FUNC_OFFSET: 27

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObfDereferenceObjectWithTag

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {7ebf58a2-0210-7815-d6f6-0e4124026922}

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1728.25960\121020-6734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`56800000 PsLoadedModuleList = 0xfffff803`5742a2b0
Debug session time: Thu Dec 10 23:21:46.802 2020 (UTC + 3:00)
System Uptime: 0 days 7:09:20.451
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`56bf5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff8a0b`3155df00=000000000000003b
6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80356e2b7ab, Address of the instruction which caused the bugcheck
Arg3: ffff8a0b3155e800, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5499

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 55658

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80356e2b7ab

BUGCHECK_P3: ffff8a0b3155e800

BUGCHECK_P4: 0

CONTEXT:  ffff8a0b3155e800 -- (.cxr 0xffff8a0b3155e800)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc60e78325080
rdx=ffff8d0092520ec0 rsi=ffdf8d00926fcdf0 rdi=ffff8d0092520ec0
rip=fffff80356e2b7ab rsp=ffff8a0b3155f200 rbp=ffff8a0b3155f320
r8=ffff8a0b3155f210  r9=0000000000000000 r10=7ffffffffffffffc
r11=ffff8a0b3155f1e0 r12=0000000000000001 r13=ffffc60e78325080
r14=ffff8a0b3155f720 r15=0000000000000007
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!ObpCreateHandle+0x3fb:
fffff803`56e2b7ab 488b4608        mov     rax,qword ptr [rsi+8] ds:002b:ffdf8d00`926fcdf8=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steamwebhelper.exe

STACK_TEXT:
ffff8a0b`3155f200 fffff803`56de0f69     : ffff8a0b`3155f720 ffffc60e`78325080 00000000`00000000 00000000`00000000 : nt!ObpCreateHandle+0x3fb
ffff8a0b`3155f3f0 fffff803`56de1557     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByPointer+0x1b9
ffff8a0b`3155f670 fffff803`56de0343     : ffffadf4`2aa9f373 0000004f`001fffff 0000004f`51d8c620 00000000`00000000 : nt!PsOpenThread+0x213
ffff8a0b`3155f9c0 fffff803`56c071b5     : ffffc60e`78320000 ffffc60e`78325080 00000205`86447890 ffffffff`feced300 : nt!NtOpenThread+0x23
ffff8a0b`3155fa00 00000205`8636d974     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004f`51d8c098 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000205`8636d974


SYMBOL_NAME:  nt!ObpCreateHandle+3fb

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xffff8a0b3155e800 ; kb

BUCKET_ID_FUNC_OFFSET:  3fb

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ObpCreateHandle

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dcd9630c-1938-35ea-221a-7b842c7aa859}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı