Hi! I recently get some Bluescreens which have the Error Code SYSTEM_SERVICE_EXCEPTION . I really dont know what this means, and the internet also didnt help me a lot. I got the dump file and I would kindly ask someone, if they could help me. The last 2 BSOD happened right when I logged into Windows and waited a bit. But both had other causes. I already updated my BIOS and ran Memtest86, which said that everything was fine with my RAM. Dump file:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff8036a200000 PsLoadedModuleList = 0xfffff8036ae2a830
Debug session time: Tue Aug 20 21:09:06.869 2024 (UTC + 2:00)
System Uptime: 0 days 4:03:50.478
Loading Kernel Symbols
...............................................................
........Page 76f6cd not present in the dump file. Type ".hh dbgerr004" for details
........................................................
.......................................Page 3ff97f not present in the dump file. Type ".hh dbgerr004" for details
..Page 79e425 not present in the dump file. Type ".hh dbgerr004" for details
..Page 3fdbfe not present in the dump file. Type ".hh dbgerr004" for details
.....................
.............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000da`e0a5b018). Type ".hh dbgerr001" for details
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff8036a5fe2a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd301754dd870=000000000000003b
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck
Arg2: fffff8036e0a5ffe, Address of the instruction which caused the BugCheck
Arg3: ffffd301754de170, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1546
Key : Analysis.Elapsed.mSec
Value: 1571
Key : Analysis.IO.Other.Mb
Value: 9
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 26
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 27795
Key : Analysis.Memory.CommitPeak.Mb
Value: 101
Key : Bugcheck.Code.KiBugCheckData
Value: 0x3b
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Bugcheck.Code.TargetModel
Value: 0x3b
Key : Failure.Bucket
Value: 0x3B\_C000001D\_CI!Gv5ce9b7
Key : Failure.Hash
Value: {4f198501-d289-cef5-c85d-4d73d82524e7}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 16908288
Key : Hypervisor.Flags.ValueHex
Value: 1020000
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb\_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff8036e0a5ffe
BUGCHECK_P3: ffffd301754de170
BUGCHECK_P4: 0
FILE_IN_CAB: MEMORY.DMP
FAULTING_THREAD: ffffbe8cb2997040
CONTEXT: ffffd301754de170 -- (.cxr 0xffffd301754de170)
rax=00000000dfdb277f rbx=0000000027995d12 rcx=fffff8036e0c40e0
rdx=c95c83fb00000000 rsi=ffffd301754decf0 rdi=0000000032dfafe4
rip=fffff8036e0a5ffe rsp=ffffd301754deb70 rbp=ffffd301754dece0
r8=0000000000374cc0 r9=0000000000000097 r10=0000000015fa5b7d
r11=00000000752bb141 r12=0000000000000001 r13=0000000000000000
r14=0000000000000005 r15=ffffe5888ce48ba0
iopl=0 ov up ei ng nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050a96
CI!Gv5ce9b7+0xae:
fffff803`6e0a5ffe ea ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: sppsvc.exe
STACK_TEXT:
ffffd301754deb70 0000000027995d12 : fffff8036e0c000f ffffd301754deba0 0000000000000000 32dfafe41546f2f6 : CI!Gv5ce9b7+0xae
ffffd301754deb78 fffff8036e0c000f : ffffd301754deba0 0000000000000000 32dfafe41546f2f6 2df0b5b3e865df30 : 0x27995d12
ffffd301754deb80 fffff8036e0abc99 : 0000000000000000 00000000000e499e 0000000000000005 0000000000000000 : CI!Gvb3afc4+0x137
ffffd301754deee0 fffff8036e009fff : c11b999c187b4d0e 0000000000000005 0000000000000000 00000000000e499e : CI!peauthvbn_StoreParameter+0x3d
ffffd301754def30 fffff8036e0807af : 0000000000000000 0000000000000000 ffffe588b393ec50 ffffe588b393ec50 : CI!PEAuthStoreParameter+0x5f
ffffd301754def60 fffff8036e080a74 : 0000000000004668 ffffd301754df039 ffffbe8c9e4e14a0 ffffbe8cae73c0c0 : CI!I_PEUpdatePEHashBucket+0x157
ffffd301754defa0 fffff8036a84fb41 : 0000000000000000 0000000000000000 000000000000ff00 ffffbe8cba6eb0c0 : CI!I_PEProcessNotify+0x34
ffffd301754defd0 fffff8036a7e6d70 : ffffbe8cae73c000 ffffbe8cae73c0c0 0000000000000000 0000000000000000 : nt!PspCallProcessNotifyRoutines+0x255
ffffd301754df0a0 fffff8036a8498ee : ffffbe8cb2997478 0000000000000000 ffffd301754df269 0000000000000000 : nt!PspExitProcess+0x70
ffffd301754df0d0 fffff8036a8483b8 : ffffbe8c00000000 fffff8036a42df01 0000000000000000 000000dae0a70000 : nt!PspExitThread+0x5b2
ffffd301754df1d0 fffff8036a4265bd : 0000000000000000 fffff8036a453201 ffffbe8cbb330101 fffff80300000010 : nt!KiSchedulerApcTerminate+0x38
ffffd301754df210 fffff8036a603940 : 000002d4cc760b50 ffffd301754df2d0 ffffd301754df480 ffffd301754df300 : nt!KiDeliverApc+0x60d
ffffd301754df2d0 fffff8036a6122af : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiInitiateUserApc+0x70
ffffd301754df410 00007fff38b70ff4 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceExit+0x9f
000000dae13ffb78 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x00007fff`38b70ff4
SYMBOL_NAME: CI!Gv5ce9b7+ae
MODULE_NAME: CI
IMAGE_NAME: CI.dll
STACK_COMMAND: .cxr 0xffffd301754de170 ; kb
BUCKET_ID_FUNC_OFFSET: ae
FAILURE_BUCKET_ID: 0x3B_C000001D_CI!Gv5ce9b7
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4f198501-d289-cef5-c85d-4d73d82524e7}
Followup: MachineOwner