*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8041a839aa8, Address of the instruction which caused the BugCheck
Arg3: ffffb80996f944b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5078
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 56576
Key : Analysis.IO.Other.Mb
Value: 12
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 16
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 8248
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 041823-9796-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8041a839aa8
BUGCHECK_P3: ffffb80996f944b0
BUGCHECK_P4: 0
CONTEXT: ffffb80996f944b0 -- (.cxr 0xffffb80996f944b0)
rax=79f575124502a008 rbx=ffffe082331e7820 rcx=7ffffffffffffffc
rdx=0000000000000000 rsi=0000000000000000 rdi=f9f575124502a008
rip=fffff8041a839aa8 rsp=ffffb80996f94ed0 rbp=ffffe082331eaab8
r8=0000000000000000 r9=ffffa7871c644470 r10=fffff8041a8399b0
r11=ffffa78713315be0 r12=ffffe0822d9a1f80 r13=ffffa7871c644470
r14=ffffe0822d304d40 r15=00000000000013b0
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!ExAcquirePushLockExclusiveEx+0xf8:
fffff804`1a839aa8 f0480fba2f00 lock bts qword ptr [rdi],0 ds:002b:f9f57512`4502a008=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
ffffb809`96f94ed0 fffff804`1e7dd626 : 00000000`00000000 ffffe082`00000002 ffffa787`1c644474 ffffa787`1c644470 : nt!ExAcquirePushLockExclusiveEx+0xf8
ffffb809`96f94f10 fffff804`1e7db682 : ffffa787`1c644470 ffffe082`331eaab8 ffffa787`1c644474 ffffa787`1c602760 : Ntfs!NtfsRemoveHashEntry+0x96
ffffb809`96f94f80 fffff804`1e7dd2d2 : ffffa787`1c644470 ffffe082`331eaab8 ffffa787`1c644474 00000000`00000000 : Ntfs!NtfsClearRecursiveLcb+0x9e
ffffb809`96f94fd0 fffff804`1e7dcee7 : ffffe082`331eaab8 ffffe082`2d288ca0 00000000`00000000 00000000`00000001 : Ntfs!NtfsRenameLcb+0x5a
ffffb809`96f95010 fffff804`1e7e07b8 : 00000000`00000040 ffffe082`331eaab8 ffffe082`331eaab8 ffffb809`00000000 : Ntfs!NtfsRenameLinkInDir+0x11f
ffffb809`96f95130 fffff804`1e80bf3a : ffffa787`1c644170 ffffa787`00000000 00000000`0000000a ffffe082`2d2d6d01 : Ntfs!NtfsSetRenameInfo+0xd18
ffffb809`96f955d0 fffff804`1e80b547 : ffffe082`331eaab8 ffffe082`338419b0 ffffe082`2d288c00 00000000`00000000 : Ntfs!NtfsCommonSetInformation+0x82a
ffffb809`96f956a0 fffff804`1a83c275 : ffffe082`2e442aa0 ffffe082`338419b0 ffffe082`331eaab8 ffffb809`96f96000 : Ntfs!NtfsFsdSetInformation+0x157
ffffb809`96f95760 fffff804`1db99f5b : ffffe082`2e442aa0 ffffe082`2d288ca0 00000000`00000000 ffffe082`33841d50 : nt!IofCallDriver+0x55
ffffb809`96f957a0 fffff804`1db97ba3 : ffffb809`96f95830 00000000`00000000 ffffe082`35444e00 00000000`00000028 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
ffffb809`96f95810 fffff804`1a83c275 : ffffe082`338419b0 ffffb809`96f95850 00000000`00000640 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffb809`96f95870 fffff804`1a8648a5 : 01d97205`75b50e4b 01d95e81`4117a100 01d9704d`9c911d17 fffff804`1a8646fd : nt!IofCallDriver+0x55
ffffb809`96f958b0 fffff804`1a86478b : 00000000`0000009e 00000000`00000000 ffffe082`338419b0 00000000`00000000 : nt!IoCallDriverWithTracing+0x35
ffffb809`96f95900 fffff804`1a867650 : 00000000`00000000 ffffb809`96f95b60 ffffe082`338419b0 00000000`42536f49 : nt!IopCallDriverReference+0x4b
ffffb809`96f95930 fffff804`1aa3e0e8 : 00000000`000005f4 00000000`0342e6f0 00000000`0342ee70 00000000`0000009e : nt!NtSetInformationFile+0xf90
ffffb809`96f95a70 00007ffe`c0a4f134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0342e5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c0a4f134
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+f8
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.1555
STACK_COMMAND: .cxr 0xffffb80996f944b0 ; kb
BUCKET_ID_FUNC_OFFSET: f8
FAILURE_BUCKET_ID: AV_nt!ExAcquirePushLockExclusiveEx
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a4c38749-1c8c-1a85-3a1f-e83a0d92b536}
Followup: MachineOwner
---------