My computer crashes frequently, sometimes with a green screen, sometimes without

子熙 王 20 Reputation points
2024-01-18T11:07:38.2333333+00:00

Version Windows 11 Pro Insider Preview Version number 23H2 Installation date 1/5/2024 OS version 26020.1000 Experience Windows Feature Experience Pack 1000.26020.1000.0 In most cases, I can enter the desktop normally, and then it may run stably, or it may restart immediately within 1 minute, and occasionally flash the green screen; If there is no problem within 1 minute, it will randomly restart at the next time

Microsoft (R) Windows Debugger Version 10.0.22621.2428 AMD64 

Copyright (c) Microsoft Corporation. All rights reserved. 

 

 

Loading Dump File [C:\Windows\Minidump\011724-6859-01.dmp] 

Mini Kernel Dump File: Only registers and stack trace are available 

 

Symbol search path is: srv* 

Executable search path is:  

Windows 10 Kernel Version 26020 MP (20 procs) Free x64 

Product: WinNt, suite: TerminalServer SingleUserTS 

Machine Name: 

Kernel base = 0xfffff807`7fa00000 PsLoadedModuleList = 0xfffff807`806f37f0 

Debug session time: Wed Jan 17 15:29:08.975 2024 (UTC + 8:00) 

System Uptime: 0 days 0:00:17.981 

Loading Kernel Symbols 

............................................................... 

................................................................ 

................................................................ 

....................... 

Loading User Symbols 

Loading unloaded module list 

........... 

For analysis of this file, run !analyze -v 

10: kd> !analyze -v 

******************************************************************************* 

*                                                                             * 

*                        Bugcheck Analysis                                    * 

*                                                                             * 

******************************************************************************* 

 

SYSTEM_SERVICE_EXCEPTION (3b) 

An exception happened while executing a system service routine. 

Arguments: 

Arg1: 00000000c0000005, Exception code that caused the BugCheck 

Arg2: fffff8077fd13c69, Address of the instruction which caused the BugCheck 

Arg3: ffffab0ee12f1b10, Address of the context record for the exception that caused the BugCheck 

Arg4: 0000000000000000, zero. 

 

Debugging Details: 

------------------ 

 

 

KEY_VALUES_STRING: 1 

 

    Key  : Analysis.CPU.mSec 

    Value: 781 

 

    Key  : Analysis.DebugAnalysisManager 

    Value: Create 

 

    Key  : Analysis.Elapsed.mSec 

    Value: 799 

 

    Key  : Analysis.Init.CPU.mSec 

    Value: 2139 

 

    Key  : Analysis.Init.Elapsed.mSec 

    Value: 56179 

 

    Key  : Analysis.Memory.CommitPeak.Mb 

    Value: 98 

 

 

FILE_IN_CAB:  011724-6859-01.dmp 

 

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b 

 

 

DUMP_FILE_ATTRIBUTES: 0x1808 

  Kernel Generated Triage Dump 

 

BUGCHECK_CODE:  3b 

 

BUGCHECK_P1: c0000005 

 

BUGCHECK_P2: fffff8077fd13c69 

 

BUGCHECK_P3: ffffab0ee12f1b10 

 

BUGCHECK_P4: 0 

 

CONTEXT:  ffffab0ee12f1b10 -- (.cxr 0xffffab0ee12f1b10) 

rax=0000000000000000 rbx=0000026ea88010f0 rcx=0000000000000000 

rdx=ffffe2059c772dc8 rsi=0000000000000001 rdi=00000000000000c9 

rip=fffff8077fd13c69 rsp=ffffab0ee12f2590 rbp=0000000000000001 

 r8=ffffe2059c110dc8  r9=ffffe2059c73fdc8 r10=ffffe2058f8002d0 

r11=ffffe2059c110dc8 r12=0000000000000000 r13=0000000000000001 

r14=0000000000000000 r15=00000000000000e8 

iopl=0         nv up ei pl nz na po nc 

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206 

nt!RtlRbInsertNodeEx+0xe9: 

fffff807`7fd13c69 f6431001        test    byte ptr [rbx+10h],1 ds:002b:0000026e`a8801100=?? 

Resetting default scope 

 

BLACKBOXBSD: 1 (!blackboxbsd) 

 

 

BLACKBOXNTFS: 1 (!blackboxntfs) 

 

 

BLACKBOXPNP: 1 (!blackboxpnp) 

 

 

BLACKBOXWINLOGON: 1 

 

CUSTOMER_CRASH_COUNT:  1 

 

PROCESS_NAME:  dllhost.exe 

 

STACK_TEXT:   

ffffab0e`e12f2590 fffff807`7fca372c     : 00000000`00000000 ffffe205`9c110dc8 ffffffff`ffffffff 00000000`00000001 : nt!RtlRbInsertNodeEx+0xe9 

ffffab0e`e12f25d0 fffff807`7fca2579     : ffffe205`9cd2ebe0 ffffe205`00000000 00000000`9c724000 ffffe205`00000000 : nt!RtlpHpVsContextFreeList+0x1cc 

ffffab0e`e12f2680 fffff807`7fc0d231     : ffffe205`9cd2ebd0 00000000`00000000 ffffe205`9cd2ebe0 ffffe205`9cd2ebd0 : nt!RtlpHpSegFree+0x299 

ffffab0e`e12f26e0 fffff807`804e311b     : 00000000`00000000 ffffab0e`e12f27b9 00000000`00000102 00000000`00000000 : nt!RtlpHpFreeHeapInternal+0xb5 

ffffab0e`e12f2720 fffff807`7fe49fd0     : ffffe205`9e327010 ffffe205`9e30a378 ffffe205`8f800000 ffffe205`9e30a060 : nt!ExFreePoolWithTag+0x53b 

ffffab0e`e12f2820 fffff807`8022f428     : ffffe205`9cd2ebe0 ffffe205`9e30a030 ffffe205`8f800000 00000000`00000000 : nt!SepFreeTokenCapabilities+0x20 

ffffab0e`e12f2850 fffff807`80230417     : 00000000`00000000 ffffe205`9e30a030 00000000`00000000 fffff807`00000000 : nt!SepTokenDeleteMethod+0x208 

ffffab0e`e12f2890 fffff807`7fc10735     : 00000000`00000000 ffffe205`9e30a030 ffffe205`9e30a030 ffffe205`9e30a060 : nt!ObpRemoveObjectRoutine+0x107 

ffffab0e`e12f28f0 fffff807`8024a516     : 00000000`00000001 00000000`00000000 ffffbe87`d9b73910 00000000`000003fc : nt!ObfDereferenceObjectWithTag+0xe5 

ffffab0e`e12f2930 fffff807`800805d5     : ffffbe87`d9b730c0 ffffbe87`d9b730c0 ffffab0e`e12f2aa0 00000000`00000000 : nt!NtClose+0x3f6 

ffffab0e`e12f2a20 00007ff8`39948c04     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 

00000068`5e5fdde8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`39948c04 

 

 

SYMBOL_NAME:  nt!RtlRbInsertNodeEx+e9 

 

MODULE_NAME: nt 

 

IMAGE_NAME:  ntkrnlmp.exe 

 

IMAGE_VERSION:  10.0.26020.1000 

 

STACK_COMMAND:  .cxr 0xffffab0ee12f1b10 ; kb 

 

BUCKET_ID_FUNC_OFFSET:  e9 

 

FAILURE_BUCKET_ID:  AV_nt!RtlRbInsertNodeEx 

 

OSPLATFORM_TYPE:  x64 

 

OSNAME:  Windows 10 

 

FAILURE_ID_HASH:  {397a8882-da53-7c7b-53a2-3c65d4285a8e} 

 

Followup:     MachineOwner 

--------- 

 

Microsoft (R) Windows Debugger Version 10.0.22621.2428 AMD64 

Copyright (c) Microsoft Corporation. All rights reserved. 

 

 

Loading Dump File [C:\Windows\Minidump\011724-7609-01.dmp] 

Mini Kernel Dump File: Only registers and stack trace are available 

 

Symbol search path is: srv* 

Executable search path is:  

Windows 10 Kernel Version 26020 MP (20 procs) Free x64 

Product: WinNt, suite: TerminalServer SingleUserTS 

Machine Name: 

Kernel base = 0xfffff802`4e600000 PsLoadedModuleList = 0xfffff802`4f2f37f0 

Debug session time: Wed Jan 17 15:28:33.124 2024 (UTC + 8:00) 

System Uptime: 0 days 0:00:57.131 

Loading Kernel Symbols 

............................................................... 

................................................................ 

................................................................ 

........................ 

Loading User Symbols 

Loading unloaded module list 

............ 

For analysis of this file, run !analyze -v 

9: kd> !analyze -v 

******************************************************************************* 

*                                                                             * 

*                        Bugcheck Analysis                                    * 

*                                                                             * 

******************************************************************************* 

 

SYSTEM_SERVICE_EXCEPTION (3b) 

An exception happened while executing a system service routine. 

Arguments: 

Arg1: 00000000c0000005, Exception code that caused the BugCheck 

Arg2: fffff8024e98b653, Address of the instruction which caused the BugCheck 

Arg3: fffffc05e962e3d0, Address of the context record for the exception that caused the BugCheck 

Arg4: 0000000000000000, zero. 

 

Debugging Details: 

------------------ 

 

 

KEY_VALUES_STRING: 1 

 

    Key  : Analysis.CPU.mSec 

    Value: 765 

 

    Key  : Analysis.DebugAnalysisManager 

    Value: Create 

 

    Key  : Analysis.Elapsed.mSec 

    Value: 754 

 

    Key  : Analysis.Init.CPU.mSec 

    Value: 749 

 

    Key  : Analysis.Init.Elapsed.mSec 

    Value: 10734 

 

    Key  : Analysis.Memory.CommitPeak.Mb 

    Value: 94 

 

 

FILE_IN_CAB:  011724-7609-01.dmp 

 

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b 

 

 

DUMP_FILE_ATTRIBUTES: 0x1808 

  Kernel Generated Triage Dump 

 

BUGCHECK_CODE:  3b 

 

BUGCHECK_P1: c0000005 

 

BUGCHECK_P2: fffff8024e98b653 

 

BUGCHECK_P3: fffffc05e962e3d0 

 

BUGCHECK_P4: 0 

 

CONTEXT:  fffffc05e962e3d0 -- (.cxr 0xfffffc05e962e3d0) 

rax=0000000000000000 rbx=ffffa80e93817060 rcx=ffffa80e93817060 

rdx=ffffa80e90a292e0 rsi=ffffa80e93817148 rdi=00046b76ffffffe0 

rip=fffff8024e98b653 rsp=fffffc05e962ee50 rbp=fffffc05e962efd0 

 r8=0000000000000000  r9=0000000000000000 r10=0000000000000001 

r11=0000000000000000 r12=0000000000000000 r13=ffffa80e90a292e0 

r14=fffffc05e962f780 r15=0000000000001000 

iopl=0         nv up ei pl nz na pe nc 

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202 

nt!SepTokenIsOwner+0x53: 

fffff802`4e98b653 0fb64701        movzx   eax,byte ptr [rdi+1] ds:002b:00046b76`ffffffe1=?? 

Resetting default scope 

 

BLACKBOXBSD: 1 (!blackboxbsd) 

 

 

BLACKBOXNTFS: 1 (!blackboxntfs) 

 

 

BLACKBOXPNP: 1 (!blackboxpnp) 

 

 

BLACKBOXWINLOGON: 1 

 

CUSTOMER_CRASH_COUNT:  1 

 

PROCESS_NAME:  svchost.exe 

 

STACK_TEXT:   

fffffc05`e962ee50 fffff802`4e92ce00     : 00000000`00001000 00000000`ffffffff fffffc05`e962ef00 fffffc05`e962efd0 : nt!SepTokenIsOwner+0x53 

fffffc05`e962eeb0 fffff802`4e92c5d2     : 00000000`96a020ff fffffc05`e962f760 00000000`00003440 ffffa80e`886003b9 : nt!SeAccessCheckWithHint+0x820 

fffffc05`e962f080 fffff802`4ee410f1     : 00000000`00000000 ffffa80e`886039c0 ffffa80e`886003e8 ffffa80e`88600380 : nt!SeAccessCheck+0x62 

fffffc05`e962f0f0 fffff802`4ee3f2de     : fffffc05`e962f760 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCreateHandle+0x251 

fffffc05`e962f3e0 fffff802`4ee3d6c2     : ffffa80e`93817060 ffffa80e`93817060 00000000`00000000 ffffa80e`938175e0 : nt!ObOpenObjectByPointer+0x1be 

fffffc05`e962f640 fffff802`4ee3d243     : 00000204`4e6fc940 00000204`00001000 00000204`4f442710 00000204`4f463000 : nt!PsOpenProcess+0x472 

fffffc05`e962f9e0 fffff802`4ec805d5     : 00000000`221173e0 00000204`4e6d8918 ffff9787`e040b080 00000204`4f45c5e0 : nt!NtOpenProcess+0x23 

fffffc05`e962fa20 00007ffb`62968ee4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 

0000002c`a20fce18 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`62968ee4 

 

 

SYMBOL_NAME:  nt!SepTokenIsOwner+53 

 

MODULE_NAME: nt 

 

IMAGE_NAME:  ntkrnlmp.exe 

 

IMAGE_VERSION:  10.0.26020.1000 

 

STACK_COMMAND:  .cxr 0xfffffc05e962e3d0 ; kb 

 

BUCKET_ID_FUNC_OFFSET:  53 

 

FAILURE_BUCKET_ID:  AV_nt!SepTokenIsOwner 

 

OSPLATFORM_TYPE:  x64 

 

OSNAME:  Windows 10 

 

FAILURE_ID_HASH:  {f53836b7-9e32-b8b8-a494-f80344c52319} 

 

Followup:     MachineOwner 

--------- 

 


 

Microsoft (R) Windows Debugger Version 10.0.22621.2428 AMD64 

Copyright (c) Microsoft Corporation. All rights reserved. 

 

 

Loading Dump File [C:\Windows\Minidump\011724-7828-01.dmp] 

Mini Kernel Dump File: Only registers and stack trace are available 

 

Symbol search path is: srv* 

Executable search path is:  

Windows 10 Kernel Version 26020 MP (20 procs) Free x64 

Product: WinNt, suite: TerminalServer SingleUserTS 

Machine Name: 

Kernel base = 0xfffff801`68e00000 PsLoadedModuleList = 0xfffff801`69af37f0 

Debug session time: Wed Jan 17 19:10:08.622 2024 (UTC + 8:00) 

System Uptime: 0 days 3:06:19.629 

Loading Kernel Symbols 

............................................................... 

................................................................ 

................................................................ 

............................... 

Loading User Symbols 

Loading unloaded module list 

............... 

For analysis of this file, run !analyze -v 

16: kd> !analyze -v 

******************************************************************************* 

*                                                                             * 

*                        Bugcheck Analysis                                    * 

*                                                                             * 

******************************************************************************* 

 

SYSTEM_SERVICE_EXCEPTION (3b) 

An exception happened while executing a system service routine. 

Arguments: 

Arg1: 00000000c0000005, Exception code that caused the BugCheck 

Arg2: fffff801696414b6, Address of the instruction which caused the BugCheck 

Arg3: ffffb38f136798c0, Address of the context record for the exception that caused the BugCheck 

Arg4: 0000000000000000, zero. 

 

Debugging Details: 

------------------ 

 

 

KEY_VALUES_STRING: 1 

 

    Key  : Analysis.CPU.mSec 

    Value: 765 

 

    Key  : Analysis.DebugAnalysisManager 

    Value: Create 

 

    Key  : Analysis.Elapsed.mSec 

    Value: 765 

 

    Key  : Analysis.Init.CPU.mSec 

    Value: 655 

 

    Key  : Analysis.Init.Elapsed.mSec 

    Value: 21753 

 

    Key  : Analysis.Memory.CommitPeak.Mb 

    Value: 94 

 

 

FILE_IN_CAB:  011724-7828-01.dmp 

 

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b 

 

 

DUMP_FILE_ATTRIBUTES: 0x1808 

  Kernel Generated Triage Dump 

 

BUGCHECK_CODE:  3b 

 

BUGCHECK_P1: c0000005 

 

BUGCHECK_P2: fffff801696414b6 

 

BUGCHECK_P3: ffffb38f136798c0 

 

BUGCHECK_P4: 0 

 

CONTEXT:  ffffb38f136798c0 -- (.cxr 0xffffb38f136798c0) 

rax=ffff928f6c684910 rbx=ffff928f6cfe4650 rcx=7ffffffffffffffc 

rdx=0000000000000000 rsi=0000000000020019 rdi=ffffe40c9a9be4c0 

rip=fffff801696414b6 rsp=ffffb38f1367a340 rbp=ffffb38f1367a460 

 r8=0000000000000000  r9=ffffe40c9a9be040 r10=7ffffffffffffffc 

r11=ffff928f6d341fc0 r12=fffff80168e00000 r13=ffffe40ccfb271b0 

r14=0000000000000000 r15=0000000000000000 

iopl=0         nv up ei pl nz na pe nc 

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202 

nt!ObpCreateHandle+0x616: 

fffff801`696414b6 488b4608        mov     rax,qword ptr [rsi+8] ds:002b:00000000`00020021=???????????????? 

Resetting default scope 

 

BLACKBOXBSD: 1 (!blackboxbsd) 

 

 

BLACKBOXNTFS: 1 (!blackboxntfs) 

 

 

BLACKBOXPNP: 1 (!blackboxpnp) 

 

 

BLACKBOXWINLOGON: 1 

 

CUSTOMER_CRASH_COUNT:  1 

 

PROCESS_NAME:  svchost.exe 

 

STACK_TEXT:   

ffffb38f`1367a340 fffff801`6966f874     : 00000000`00000001 ffffb38f`1367a6b8 ffff928f`00000040 ffff928f`3aff4900 : nt!ObpCreateHandle+0x616 

ffffb38f`1367a630 fffff801`6966ecf9     : ffffb38f`00000000 ffff928f`3aff4900 00000032`8017d1e8 00000000`00000000 : nt!ObOpenObjectByNameEx+0x3e4 

ffffb38f`1367a780 fffff801`6966ea28     : 00000032`8017d1b8 00000000`00000000 00000000`00000000 fffff801`69481985 : nt!CmOpenKey+0x2a9 

ffffb38f`1367a9d0 fffff801`694805d5     : ffff928f`6c6840c0 00000000`00000000 ffff928f`6c6840c0 00000032`8017d520 : nt!NtOpenKeyEx+0x48 

ffffb38f`1367aa20 00007ffc`b496af74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 

00000032`8017d198 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b496af74 

 

 

SYMBOL_NAME:  nt!ObpCreateHandle+616 

 

MODULE_NAME: nt 

 

IMAGE_NAME:  ntkrnlmp.exe 

 

IMAGE_VERSION:  10.0.26020.1000 

 

STACK_COMMAND:  .cxr 0xffffb38f136798c0 ; kb 

 

BUCKET_ID_FUNC_OFFSET:  616 

 

FAILURE_BUCKET_ID:  AV_nt!ObpCreateHandle 

 

OSPLATFORM_TYPE:  x64 

 

OSNAME:  Windows 10 

 

FAILURE_ID_HASH:  {6445ac53-9c98-18b9-3bfd-02841264dd5b} 

 

Followup:     MachineOwner 

--------- 
Windows 11
Windows 11
A Microsoft operating system designed for productivity, creativity, and ease of use.
10,721 questions
0 comments No comments
{count} votes

Accepted answer
  1. sopsss 75 Reputation points
    2024-01-18T13:25:10.3333333+00:00

    Hi. Based on the windbg dump you've provided, I would suggest to repair your windows using a win11 ISO or running an SFC scan on the device (which may or may not work depending on the severity). It seems that parts of your system has corrupted which triggers the green screen when it access that certain part of the system.

    Please keep me updated whether this resolves your problem!

    This is a guide for repairing windows using an ISO:
    https://answers.microsoft.com/en-us/windows/forum/all/how-to-perform-a-repair-upgrade-using-the-windows/35160fbe-9352-4e70-9887-f40096ec3085

    This is a guide for repairing windows using SFC scan:
    https://support.microsoft.com/en-gb/topic/use-the-system-file-checker-tool-to-repair-missing-or-corrupted-system-files-79aa86cb-ca52-166a-92a3-966e85d4094e


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.