locked
BSOD SYSTEM_SERVICE_EXCEPTION (3b) RRS feed

  • Question

  • I have been getting BSOD sporadically. In even viewer is see these results: The computer has rebooted from a bugcheck.  The bugcheck was: 0x0000003b (0x00000000c0000005, 0xfffff8d76a398ee2, 0xffffdc85e3021140, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: f6c7e39f-eacd-4859-aab6-408a8df85b6b.

    Any help would be appreciated. I highly suspicious that it's a driver issue, but I can't pinpoint it.

    Here is the memory.dmp:

    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

    Symbol search path is: srv*
    Executable search path is: 
    Windows 10 Kernel Version 19041 MP (16 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff800`74800000 PsLoadedModuleList = 0xfffff800`7542a2b0
    Debug session time: Sat Jun 20 11:10:36.739 2020 (UTC - 4:00)
    System Uptime: 0 days 3:34:01.371
    Loading Kernel Symbols
    ...............................................................
    ......Page 181ce9 not present in the dump file. Type ".hh dbgerr004" for details
    ..........................................................
    ............................................Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    ......Page 1be5c1 not present in the dump file. Type ".hh dbgerr004" for details
    ..............
    ......................................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 00000025`9670a018).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    .....................
    For analysis of this file, run !analyze -v
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: ffffd80dd65d8ee2, Address of the instruction which caused the bugcheck
    Arg3: ffff830705dfd140, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.

    Debugging Details:
    ------------------

    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details

    KEY_VALUES_STRING: 1

        Key  : Analysis.CPU.Sec
        Value: 4

        Key  : Analysis.DebugAnalysisProvider.CPP
        Value: Create: 8007007e on MILLERLITE

        Key  : Analysis.DebugData
        Value: CreateObject

        Key  : Analysis.DebugModel
        Value: CreateObject

        Key  : Analysis.Elapsed.Sec
        Value: 12

        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 69

        Key  : Analysis.System
        Value: CreateObject


    BUGCHECK_CODE:  3b

    BUGCHECK_P1: c0000005

    BUGCHECK_P2: ffffd80dd65d8ee2

    BUGCHECK_P3: ffff830705dfd140

    BUGCHECK_P4: 0

    CONTEXT:  ffff830705dfd140 -- (.cxr 0xffff830705dfd140)
    rax=0000000000000002 rbx=0000000000000001 rcx=0000000000000008
    rdx=ffff830705dfdd20 rsi=ffff830705dfdd50 rdi=ffffd82484107620
    rip=ffffd80dd65d8ee2 rsp=ffff830705dfdb40 rbp=0000000000200000
     r8=0000000000000000  r9=ffffd82487311460 r10=ffffd80dd57decd0
    r11=0000000000000009 r12=ffffd824887a3690 r13=ffffd80dd68144e0
    r14=0000000000000000 r15=ffffd80dd685a000
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
    win32kfull!xxxSkipSysMsgEx+0x1f6:
    ffffd80d`d65d8ee2 096b64          or      dword ptr [rbx+64h],ebp ds:002b:00000000`00000065=????????
    Resetting default scope

    BLACKBOXBSD: 1 (!blackboxbsd)


    BLACKBOXNTFS: 1 (!blackboxntfs)


    BLACKBOXPNP: 1 (!blackboxpnp)


    BLACKBOXWINLOGON: 1

    PROCESS_NAME:  msedge.exe

    STACK_TEXT:  
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    Page 7eff05 not present in the dump file. Type ".hh dbgerr004" for details
    ffff8307`05dfdb40 ffffd80d`d65dcecb : ffffd824`84107620 00000000`00000020 ffff8307`05dfeb80 00000000`00000000 : win32kfull!xxxSkipSysMsgEx+0x1f6
    ffff8307`05dfdc30 ffffd80d`d65dfca6 : ffffd824`84107620 ffff8307`05dfe9d8 00000000`00000000 00000000`00000000 : win32kfull!xxxScanSysQueue+0x206b
    ffff8307`05dfe4e0 ffffd80d`d65ded58 : ffff8307`05dfe9d8 00000000`00000000 00000000`00000000 ffff8307`05dfeaa8 : win32kfull!xxxRealInternalGetMessage+0xee6
    ffff8307`05dfe980 ffffd80d`d52871ad : ffff9f02`f8692080 00000025`96ffebb8 ffff8307`05dfeaa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
    ffff8307`05dfea40 fffff800`74bef378 : 00000025`96ffecb0 00000000`00002200 00000000`00000040 000001b8`bed14c20 : win32k!NtUserPeekMessage+0x29
    ffff8307`05dfea90 00007ffb`a94c1064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
    00000025`96ffeb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a94c1064


    SYMBOL_NAME:  win32kfull!xxxSkipSysMsgEx+1f6

    MODULE_NAME: win32kfull

    IMAGE_NAME:  win32kfull.sys

    STACK_COMMAND:  .cxr 0xffff830705dfd140 ; kb

    BUCKET_ID_FUNC_OFFSET:  1f6

    FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!xxxSkipSysMsgEx

    OS_VERSION:  10.0.19041.1

    BUILDLAB_STR:  vb_release

    OSPLATFORM_TYPE:  x64

    OSNAME:  Windows 10

    FAILURE_ID_HASH:  {2fd5c67d-19b6-9247-c2ef-c7e379d2e384}

    Followup:     MachineOwner

    Saturday, June 20, 2020 5:40 PM

All replies

  • Also to add, I have been noticing this error. I can only guess that it may be related??

    Metadata staging failed, result=0x80004005 for container '{D9449311-AAC1-56C1-A2AC-D0D8F91F634C}'

    Saturday, June 20, 2020 5:45 PM
  • OS_VERSION:  10.0.19041.1
    did you install the release version and all updates?

    I can't see 3rd party code in the stack, but still might be due to some.
    Is this only happening while browsing (
    PROCESS_NAME:  msedge.exe)?
    Any 3rd party Antivirus / security software installed?

    Saturday, June 20, 2020 6:28 PM
  • The bugcheck displayed was 3B.

    To evaluate the BSOD please post logs for troubleshooting.

    Using administrative command prompt copy and paste this whole command.

    Make sure the default language is English so that the logs can be scanned and read.

    Choose the applicable link for the operating system:
    https://www.tenforums.com/tutorials/3813-language-add-remove-change-windows-10-a.html
    https://www.eightforums.com/threads/language-add-or-remove-in-windows-8.5849/
    https://www.sevenforums.com/tutorials/87317-display-language-change.html

    The command will automatically collect the computer files and place them on the desktop.

    Then use 7zip to organize the files and one drive, drop box, or google drive to place share links into the thread for troubleshooting.

    https://support.office.com/en-us/article/Share-OneDrive-files-and-folders-9fcc2f7d-de0c-4cec-93b0-a82024800c07

    This command will automatically collect these files:  msinfo32, mini dumps, drivers, hosts, install, uninstall, services, startup, event viewer files, etc.

    Open administrative command prompt and copy and paste the whole command:

    copy %SystemRoot%\minidump\*.dmp "%USERPROFILE%\Desktop\"&dxdiag /t %Temp%\dxdiag.txt&copy %Temp%\dxdiag.txt "%USERPROFILE%\Desktop\SFdebugFiles\"&type %SystemRoot%\System32\drivers\etc\hosts >> "%USERPROFILE%\Desktop\hosts.txt"&systeminfo > "%USERPROFILE%\Desktop\systeminfo.txt"&driverquery /v > "%USERPROFILE%\Desktop\drivers.txt" &msinfo32 /nfo "%USERPROFILE%\Desktop\msinfo32.nfo"&wevtutil qe System /f:text > "%USERPROFILE%\Desktop\eventlog.txt"&reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall "%USERPROFILE%\Desktop\uninstall.txt"&reg export "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components" "%USERPROFILE%\Desktop\installed.txt"&net start > "%USERPROFILE%\Desktop\services.txt"&REM wmic startup list full /format:htable >"%USERPROFILE%\Desktop\startup.html"&wmic STARTUP GET Caption, Command, User >"%USERPROFILE%\Desktop\startup.txt"

    There are two files for you to find manually:

    a) C:\Windows\MEMORY.DMP

    Use file explorer > this PC > local C: drive > right upper corner search enter the above to find results.

    b) dxdiag:  

    In the left lower corner search type:  dxdiag > When the DirectX Diagnostic Tool opens click on the next page button so that each tab is opened > click on save all information > save to desktop > post one drive or drop box share link into the thread
    .
    .
    .
    .
    .

    Please remember to vote and to mark the replies as answers if they help.

    On the bottom of each post there is:

    Propose as answer = answered the question

    On the left side of each post:  Vote = a helpful post
    .
    .
    .
    .
    .

    Saturday, June 20, 2020 7:52 PM