************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`5ea00000 PsLoadedModuleList = 0xfffff803`5ee47590
Debug session time: Wed May 12 00:08:10.288 2021 (UTC + 3:00)
System Uptime: 0 days 0:18:04.328
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`5ebc1080 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8302`b1d6a0a0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80361959090, Address of the instruction which caused the BugCheck
Arg3: ffff8302b1d6a9d0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nsiproxy.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4108
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 53163
Key : Analysis.Init.CPU.mSec
Value: 2452
Key : Analysis.Init.Elapsed.mSec
Value: 69984
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80361959090
BUGCHECK_P3: ffff8302b1d6a9d0
BUGCHECK_P4: 0
CONTEXT: ffff8302b1d6a9d0 -- (.cxr 0xffff8302b1d6a9d0)
rax=00000000ffffffff rbx=0000000000000000 rcx=000000000000002c
rdx=ffff858528a1441c rsi=0000000000000008 rdi=ffff858528a14448
rip=fffff80361959090 rsp=ffff8302b1d6b3c8 rbp=ffff8302b1d6b459
r8=0000000000000018 r9=0000000000000002 r10=fffff803619a7630
r11=ffff8302b1d6b360 r12=fffff803619a7730 r13=0000000000000000
r14=ffff858528a143e8 r15=0000000000020019
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
NETIO!FeGetWfpGlobalPtr+0x1c0:
fffff803`61959090 8a01 mov al,byte ptr [rcx] ds:002b:00000000`0000002c=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8302`b1d6b3c8 fffff803`6193ff02 : 00000000`00000001 00000000`00000001 00000000`00000008 00000000`00000001 : NETIO!FeGetWfpGlobalPtr+0x1c0
ffff8302`b1d6b3d0 fffff803`6193f76a : 00000000`00000000 ffff8585`28a143e0 fffff803`61999508 ffff8585`28a14448 : NETIO!NsiGetParameterEx+0x602
ffff8302`b1d6b4c0 fffff803`9a5920c8 : 000000ed`171fe610 ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 : NETIO!NsiGetAllParametersEx+0x1ca
ffff8302`b1d6b5e0 000000ed`171fe610 : ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 00000000`00000000 : nsiproxy+0x20c8
ffff8302`b1d6b5e8 ffff8585`226e17b0 : ffff8585`28a143e0 00000000`00000001 00000000`00000000 000000ed`171fe648 : 0x000000ed`171fe610
ffff8302`b1d6b5f0 ffff8585`28a143e0 : 00000000`00000001 00000000`00000000 000000ed`171fe648 00000000`00000000 : 0xffff8585`226e17b0
ffff8302`b1d6b5f8 00000000`00000001 : 00000000`00000000 000000ed`171fe648 00000000`00000000 00000000`00000000 : 0xffff8585`28a143e0
ffff8302`b1d6b600 00000000`00000000 : 000000ed`171fe648 00000000`00000000 00000000`00000000 ffffb50b`8bcfc901 : 0x1
SYMBOL_NAME: NETIO!FeGetWfpGlobalPtr+1c0
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.18362.1110
STACK_COMMAND: .cxr 0xffff8302b1d6a9d0 ; kb
BUCKET_ID_FUNC_OFFSET: 1c0
FAILURE_BUCKET_ID: 0x3B_c0000005_NETIO!FeGetWfpGlobalPtr
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a0b73e8a-9a20-c58f-bed8-908a0fdcd6f4}
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80361959090, Address of the instruction which caused the BugCheck
Arg3: ffff8302b1d6a9d0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3078
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5954
Key : Analysis.Init.CPU.mSec
Value: 6562
Key : Analysis.Init.Elapsed.mSec
Value: 123151
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80361959090
BUGCHECK_P3: ffff8302b1d6a9d0
BUGCHECK_P4: 0
CONTEXT: ffff8302b1d6a9d0 -- (.cxr 0xffff8302b1d6a9d0)
rax=00000000ffffffff rbx=0000000000000000 rcx=000000000000002c
rdx=ffff858528a1441c rsi=0000000000000008 rdi=ffff858528a14448
rip=fffff80361959090 rsp=ffff8302b1d6b3c8 rbp=ffff8302b1d6b459
r8=0000000000000018 r9=0000000000000002 r10=fffff803619a7630
r11=ffff8302b1d6b360 r12=fffff803619a7730 r13=0000000000000000
r14=ffff858528a143e8 r15=0000000000020019
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
NETIO!FeGetWfpGlobalPtr+0x1c0:
fffff803`61959090 8a01 mov al,byte ptr [rcx] ds:002b:00000000`0000002c=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8302`b1d6b3c8 fffff803`6193ff02 : 00000000`00000001 00000000`00000001 00000000`00000008 00000000`00000001 : NETIO!FeGetWfpGlobalPtr+0x1c0
ffff8302`b1d6b3d0 fffff803`6193f76a : 00000000`00000000 ffff8585`28a143e0 fffff803`61999508 ffff8585`28a14448 : NETIO!NsiGetParameterEx+0x602
ffff8302`b1d6b4c0 fffff803`9a5920c8 : 000000ed`171fe610 ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 : NETIO!NsiGetAllParametersEx+0x1ca
ffff8302`b1d6b5e0 000000ed`171fe610 : ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 00000000`00000000 : nsiproxy+0x20c8
ffff8302`b1d6b5e8 ffff8585`226e17b0 : ffff8585`28a143e0 00000000`00000001 00000000`00000000 000000ed`171fe648 : 0x000000ed`171fe610
ffff8302`b1d6b5f0 ffff8585`28a143e0 : 00000000`00000001 00000000`00000000 000000ed`171fe648 00000000`00000000 : 0xffff8585`226e17b0
ffff8302`b1d6b5f8 00000000`00000001 : 00000000`00000000 000000ed`171fe648 00000000`00000000 00000000`00000000 : 0xffff8585`28a143e0
ffff8302`b1d6b600 00000000`00000000 : 000000ed`171fe648 00000000`00000000 00000000`00000000 ffffb50b`8bcfc901 : 0x1
SYMBOL_NAME: NETIO!FeGetWfpGlobalPtr+1c0
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.18362.1110
STACK_COMMAND: .cxr 0xffff8302b1d6a9d0 ; kb
BUCKET_ID_FUNC_OFFSET: 1c0
FAILURE_BUCKET_ID: 0x3B_c0000005_NETIO!FeGetWfpGlobalPtr
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a0b73e8a-9a20-c58f-bed8-908a0fdcd6f4}
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80361959090, Address of the instruction which caused the BugCheck
Arg3: ffff8302b1d6a9d0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6170
Key : Analysis.Init.CPU.mSec
Value: 9640
Key : Analysis.Init.Elapsed.mSec
Value: 129108
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80361959090
BUGCHECK_P3: ffff8302b1d6a9d0
BUGCHECK_P4: 0
CONTEXT: ffff8302b1d6a9d0 -- (.cxr 0xffff8302b1d6a9d0)
rax=00000000ffffffff rbx=0000000000000000 rcx=000000000000002c
rdx=ffff858528a1441c rsi=0000000000000008 rdi=ffff858528a14448
rip=fffff80361959090 rsp=ffff8302b1d6b3c8 rbp=ffff8302b1d6b459
r8=0000000000000018 r9=0000000000000002 r10=fffff803619a7630
r11=ffff8302b1d6b360 r12=fffff803619a7730 r13=0000000000000000
r14=ffff858528a143e8 r15=0000000000020019
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
NETIO!FeGetWfpGlobalPtr+0x1c0:
fffff803`61959090 8a01 mov al,byte ptr [rcx] ds:002b:00000000`0000002c=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8302`b1d6b3c8 fffff803`6193ff02 : 00000000`00000001 00000000`00000001 00000000`00000008 00000000`00000001 : NETIO!FeGetWfpGlobalPtr+0x1c0
ffff8302`b1d6b3d0 fffff803`6193f76a : 00000000`00000000 ffff8585`28a143e0 fffff803`61999508 ffff8585`28a14448 : NETIO!NsiGetParameterEx+0x602
ffff8302`b1d6b4c0 fffff803`9a5920c8 : 000000ed`171fe610 ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 : NETIO!NsiGetAllParametersEx+0x1ca
ffff8302`b1d6b5e0 000000ed`171fe610 : ffff8585`226e17b0 ffff8585`28a143e0 00000000`00000001 00000000`00000000 : nsiproxy+0x20c8
ffff8302`b1d6b5e8 ffff8585`226e17b0 : ffff8585`28a143e0 00000000`00000001 00000000`00000000 000000ed`171fe648 : 0x000000ed`171fe610
ffff8302`b1d6b5f0 ffff8585`28a143e0 : 00000000`00000001 00000000`00000000 000000ed`171fe648 00000000`00000000 : 0xffff8585`226e17b0
ffff8302`b1d6b5f8 00000000`00000001 : 00000000`00000000 000000ed`171fe648 00000000`00000000 00000000`00000000 : 0xffff8585`28a143e0
ffff8302`b1d6b600 00000000`00000000 : 000000ed`171fe648 00000000`00000000 00000000`00000000 ffffb50b`8bcfc901 : 0x1
SYMBOL_NAME: NETIO!FeGetWfpGlobalPtr+1c0
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.18362.1110
STACK_COMMAND: .cxr 0xffff8302b1d6a9d0 ; kb
BUCKET_ID_FUNC_OFFSET: 1c0
FAILURE_BUCKET_ID: 0x3B_c0000005_NETIO!FeGetWfpGlobalPtr
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a0b73e8a-9a20-c58f-bed8-908a0fdcd6f4}
Followup: MachineOwner
---------