SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8037b3f5f80, Address of the instruction which caused the bugcheck
Arg3: ffffd308bc19ad30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9389
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 31632
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8037b3f5f80
BUGCHECK_P3: ffffd308bc19ad30
BUGCHECK_P4: 0
CONTEXT: ffffd308bc19ad30 -- (.cxr 0xffffd308bc19ad30)
rax=0000000000000030 rbx=ffffa58bf1ae22c0 rcx=ffffa58bf337ca30
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa58be8f066a0
rip=fffff8037b3f5f80 rsp=ffffd308bc19b730 rbp=ffffd308bc19b7e9
r8=ffffd308bc19b738 r9=000000000000003e r10=0000000000000000
r11=ffffa58bf04a5080 r12=ffffa58bf1ae2340 r13=ffffd308bc19b960
r14=ffffa58bf27b22f0 r15=00000000000002a0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
FLTMGR!FltpPerformPreCallbacksWorker+0x260:
fffff803`7b3f5f80 498b4240 mov rax,qword ptr [r10+40h] ds:002b:00000000`00000040=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: OverwolfBrowser.exe
STACK_TEXT:
ffffd308`bc19b730 fffff803`7b3f5b37 : ffffd308`bc19b900 00000000`00000002 ffffa58b`e8c8cd00 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x260
ffffd308`bc19b850 fffff803`7b3f4b46 : ffffd308`bc19d000 ffffd308`bc197000 ffffa58b`eebb3730 ffffd308`bc19b970 : FLTMGR!FltpPassThroughInternal+0xc7
ffffd308`bc19b8a0 fffff803`7b3f48bb : ffffffff`fffe7960 00000000`00000000 ffffa58b`f1092d58 00000000`00000000 : FLTMGR!FltpPassThrough+0x1d6
ffffd308`bc19b940 fffff803`7eed1f35 : ffffa58b`f337ca30 fffff803`7eed46e8 ffffa58b`e8ebb840 ffffa58b`e646ab00 : FLTMGR!FltpDispatch+0x8b
ffffd308`bc19b9a0 fffff803`7f2aa6ca : ffffa58b`f337ca30 ffffd406`0f435900 ffffa58b`e8c8cd40 ffffa58b`e8c8cd40 : nt!IofCallDriver+0x55
ffffd308`bc19b9e0 fffff803`7f2a4990 : ffffd406`0f435900 00000000`00000000 ffffa58b`e64f70c0 ffffd308`bc19baf0 : nt!IopDeleteFile+0x13a
ffffd308`bc19ba60 fffff803`7eedffc7 : 00000000`00000000 00000000`00000000 ffffd406`0f435900 ffffa58b`f337ca30 : nt!ObpRemoveObjectRoutine+0x80
ffffd308`bc19bac0 fffff803`7ee617be : 00000000`00000000 ffffa58b`f337ca30 ffffd406`0f435aa0 ffffa58b`f337ca30 : nt!ObfDereferenceObjectWithTag+0xc7
ffffd308`bc19bb00 fffff803`8203b2ee : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalPutDmaAdapter+0xe
ffffd308`bc19bb30 fffff803`8202bfd0 : ffffd406`0f435900 ffffd406`0f435940 00000000`00000000 ffffd406`0f435aa0 : Ntfs!NtfsDeleteInternalAttributeStream+0x12a
ffffd308`bc19bb70 fffff803`81f37b95 : ffffd406`0f435940 ffffd406`0f435aa0 00000000`00000000 ffffd406`0f435aa0 : Ntfs!NtfsRemoveScb+0x130
ffffd308`bc19bbd0 fffff803`8202bc9c : ffffa58b`f1092d58 00000000`00000008 ffffd406`0f435940 ffffd308`bc19c000 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffd308`bc19bc10 fffff803`82062c17 : ffffa58b`f1092d58 00000000`c000003a ffffd406`0f435e58 ffffd406`0acb1270 : Ntfs!NtfsTeardownStructures+0x9c
ffffd308`bc19bc90 fffff803`8205c17b : ffffa58b`e8d61ab0 ffffd308`bc19c080 ffffa58b`e8d61ab0 00000000`00000000 : Ntfs!NtfsCommonCreate+0x3557
ffffd308`bc19bf70 fffff803`7eed1f35 : ffffa58b`e8f1c030 ffffa58b`e8d61ab0 ffffd308`bc19c200 ffffa58b`f337d6b0 : Ntfs!NtfsFsdCreate+0x1db
ffffd308`bc19c1f0 fffff803`7b3f6ccf : ffffa58b`f337d600 ffffd308`bc19c2e0 ffffd308`bc19c2e9 fffff803`7b3f5b37 : nt!IofCallDriver+0x55
ffffd308`bc19c230 fffff803`7b42bbd4 : ffffd308`bc19c2e0 ffffa58b`f337d708 ffffa58b`e8c8cd40 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffd308`bc19c2a0 fffff803`7eed1f35 : ffffa58b`f337d600 ffffa58b`f337d748 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffd308`bc19c350 fffff803`7eed3524 : 00000000`00000000 ffffa58b`e8c8cd40 00000000`00000000 ffffa58b`e8d61ab0 : nt!IofCallDriver+0x55
ffffd308`bc19c390 fffff803`7f2a7bfc : ffffd308`bc19c650 ffffa58b`f337d748 ffffa58b`f337d6b0 ffffd308`00000001 : nt!IoCallDriverWithTracing+0x34
ffffd308`bc19c3e0 fffff803`7f2d10de : ffffa58b`e8c6cb00 00000000`00000000 ffffa58b`f1582630 ffffa58b`f1582601 : nt!IopParseDevice+0x6ac
ffffd308`bc19c550 fffff803`7f2da39a : ffffa58b`f1582600 ffffd308`bc19c7b8 ffffd308`00000040 ffffa58b`e64f70c0 : nt!ObpLookupObjectName+0x3fe
ffffd308`bc19c720 fffff803`7f21e04e : 0000007f`00000000 0000006c`d4bf8e00 00000000`00000000 0000006c`d4bf8dd0 : nt!ObOpenObjectByNameEx+0x1fa
ffffd308`bc19c850 fffff803`7f0058b8 : ffffa58b`f04a5080 ffffa58b`f0e2fa60 ffffa58b`f04a5080 00000268`934a2520 : nt!NtQueryFullAttributesFile+0x1ce
ffffd308`bc19cb00 00007ffd`a5c4e674 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006c`d4bf8d78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`a5c4e674
SYMBOL_NAME: FLTMGR!FltpPerformPreCallbacksWorker+260
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .cxr 0xffffd308bc19ad30 ; kb
BUCKET_ID_FUNC_OFFSET: 260
FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpPerformPreCallbacksWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8c1dd5a6-b42f-d6ff-4bb6-2f415b42874f}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000120, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8032ce07136, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5062
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18927
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 120
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8032ce07136
READ_ADDRESS: fffff8032d8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8032d80f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8032d80f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000120
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
TRAP_FRAME: ffff8e801dfb1800 -- (.trap 0xffff8e801dfb1800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8e801dfb1988 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8032ce07136 rsp=ffff8e801dfb1990 rbp=ffff8e801dfb1b80
r8=ffffffffffffffff r9=0000000000000000 r10=0000000000000000
r11=ffffc98ec0a56d00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!NtSetInformationWorkerFactory+0x346:
fffff803`2ce07136 8b8620010000 mov eax,dword ptr [rsi+120h] ds:00000000`00000120=????????
Resetting default scope
STACK_TEXT:
ffff8e80`1dfb16b8 fffff803`2d005e69 : 00000000`0000000a 00000000`00000120 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8e80`1dfb16c0 fffff803`2d002169 : ffffc98e`c480d5a0 ffffc98e`ca4ae590 ffff8e80`1dfb18d0 fffff803`2ce617be : nt!KiBugCheckDispatch+0x69
ffff8e80`1dfb1800 fffff803`2ce07136 : 00000000`00000000 ffff8e80`1dfb1b80 00000000`00000009 00000000`06eef47c : nt!KiPageFault+0x469
ffff8e80`1dfb1990 fffff803`2d0058b8 : ffffdd84`d94b5000 ffffdd84`d7aad040 ffff8e80`1dfb1b80 ffffdd84`00000000 : nt!NtSetInformationWorkerFactory+0x346
ffff8e80`1dfb1b00 00007ff9`ef5af194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`06eef448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`ef5af194
SYMBOL_NAME: nt!NtSetInformationWorkerFactory+346
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 346
FAILURE_BUCKET_ID: AV_nt!NtSetInformationWorkerFactory
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8c6e4844-42d2-1e47-f981-814a5ebf743a}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80133fd433f, Address of the instruction which caused the bugcheck
Arg3: ffff8d87ffa602c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6265
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 91993
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80133fd433f
BUGCHECK_P3: ffff8d87ffa602c0
BUGCHECK_P4: 0
CONTEXT: ffff8d87ffa602c0 -- (.cxr 0xffff8d87ffa602c0)
rax=0000000000001000 rbx=ffffa485c8ef93a0 rcx=ffffa485c8ef93a0
rdx=ffff8d87ffa60ff0 rsi=ffff8d87ffa60ff0 rdi=ffffa485c726e000
rip=fffff80133fd433f rsp=ffff8d87ffa60cc0 rbp=ffff8d87ffa60dc0
r8=0000000000000a00 r9=0000000000000000 r10=0000000000000000
r11=ffff8d87ffa60c80 r12=0000000000000080 r13=ffff8d87ffa60f90
r14=0000000009dc014b r15=ffff8d87ffa60f94
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nvlddmkm+0xad433f:
fffff801`33fd433f 49894618 mov qword ptr [r14+18h],rax ds:002b:00000000`09dc0163=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: StartMenuExperienceHost.exe
STACK_TEXT:
ffff8d87`ffa60cc0 ffffa485`c8ef93a0 : ffff8d87`ffa60dc0 ffff8d87`ffa60ff0 00000000`00000008 ffff8d87`ffa60c00 : nvlddmkm+0xad433f
ffff8d87`ffa60cc8 ffff8d87`ffa60dc0 : ffff8d87`ffa60ff0 00000000`00000008 ffff8d87`ffa60c00 00000000`00000008 : 0xffffa485`c8ef93a0
ffff8d87`ffa60cd0 ffff8d87`ffa60ff0 : 00000000`00000008 ffff8d87`ffa60c00 00000000`00000008 ffffd172`11ba7505 : 0xffff8d87`ffa60dc0
ffff8d87`ffa60cd8 00000000`00000008 : ffff8d87`ffa60c00 00000000`00000008 ffffd172`11ba7505 ffffa485`d0adf008 : 0xffff8d87`ffa60ff0
ffff8d87`ffa60ce0 ffff8d87`ffa60c00 : 00000000`00000008 ffffd172`11ba7505 ffffa485`d0adf008 ffffa485`d0adf000 : 0x8
ffff8d87`ffa60ce8 00000000`00000008 : ffffd172`11ba7505 ffffa485`d0adf008 ffffa485`d0adf000 fffff801`335cd48c : 0xffff8d87`ffa60c00
ffff8d87`ffa60cf0 ffffd172`11ba7505 : ffffa485`d0adf008 ffffa485`d0adf000 fffff801`335cd48c ffffa485`d0adf000 : 0x8
ffff8d87`ffa60cf8 ffffa485`d0adf008 : ffffa485`d0adf000 fffff801`335cd48c ffffa485`d0adf000 fffff801`202e91ff : 0xffffd172`11ba7505
ffff8d87`ffa60d00 ffffa485`d0adf000 : fffff801`335cd48c ffffa485`d0adf000 fffff801`202e91ff ffffa485`00000007 : 0xffffa485`d0adf008
ffff8d87`ffa60d08 fffff801`335cd48c : ffffa485`d0adf000 fffff801`202e91ff ffffa485`00000007 00000000`00000004 : 0xffffa485`d0adf000
ffff8d87`ffa60d10 ffffa485`d0adf000 : fffff801`202e91ff ffffa485`00000007 00000000`00000004 00000000`00000536 : nvlddmkm+0xcd48c
ffff8d87`ffa60d18 fffff801`202e91ff : ffffa485`00000007 00000000`00000004 00000000`00000536 00000000`00000004 : 0xffffa485`d0adf000
ffff8d87`ffa60d20 ffffa485`00000007 : 00000000`00000004 00000000`00000536 00000000`00000004 00000000`00000003 : 0xfffff801`202e91ff
ffff8d87`ffa60d28 00000000`00000004 : 00000000`00000536 00000000`00000004 00000000`00000003 00000000`00000140 : 0xffffa485`00000007
ffff8d87`ffa60d30 00000000`00000536 : 00000000`00000004 00000000`00000003 00000000`00000140 ffffa485`cb9f7000 : 0x4
ffff8d87`ffa60d38 00000000`00000004 : 00000000`00000003 00000000`00000140 ffffa485`cb9f7000 fffff801`22acfc99 : 0x536
ffff8d87`ffa60d40 00000000`00000003 : 00000000`00000140 ffffa485`cb9f7000 fffff801`22acfc99 ffffffff`ffffffff : 0x4
ffff8d87`ffa60d48 00000000`00000140 : ffffa485`cb9f7000 fffff801`22acfc99 ffffffff`ffffffff fffff801`22ad5d19 : 0x3
ffff8d87`ffa60d50 ffffa485`cb9f7000 : fffff801`22acfc99 ffffffff`ffffffff fffff801`22ad5d19 ffff8d87`ffa60e60 : 0x140
ffff8d87`ffa60d58 fffff801`22acfc99 : ffffffff`ffffffff fffff801`22ad5d19 ffff8d87`ffa60e60 00000000`00000140 : 0xffffa485`cb9f7000
ffff8d87`ffa60d60 ffff8d87`ffa61000 : 00000000`00000001 ffff8d87`ffa61400 ffffa485`c726e000 ffff8d87`ffa61120 : nt!RtlpHpLfhSlotAllocate+0x179
ffff8d87`ffa60eb0 00000000`00000001 : ffff8d87`ffa61400 ffffa485`c726e000 ffff8d87`ffa61120 00000000`00000000 : 0xffff8d87`ffa61000
ffff8d87`ffa60eb8 ffff8d87`ffa61400 : ffffa485`c726e000 ffff8d87`ffa61120 00000000`00000000 ffffa485`c8ef93a0 : 0x1
ffff8d87`ffa60ec0 ffffa485`c726e000 : ffff8d87`ffa61120 00000000`00000000 ffffa485`c8ef93a0 00000000`00000000 : 0xffff8d87`ffa61400
ffff8d87`ffa60ec8 ffff8d87`ffa61120 : 00000000`00000000 ffffa485`c8ef93a0 00000000`00000000 00000000`00000000 : 0xffffa485`c726e000
ffff8d87`ffa60ed0 00000000`00000000 : ffffa485`c8ef93a0 00000000`00000000 00000000`00000000 ffff8d87`ffa61000 : 0xffff8d87`ffa61120
SYMBOL_NAME: nvlddmkm+ad433f
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffff8d87ffa602c0 ; kb
BUCKET_ID_FUNC_OFFSET: ad433f
FAILURE_BUCKET_ID: 0x3B_c0000005_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {63c41bff-3ea4-15a0-a72c-26a548d17abe}
Followup: MachineOwner
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff800f8d811080, The address of the thread.
Arg2: ffffaa8711dcabc0, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 46025
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 192
BUGCHECK_P1: ffff800f8d811080
BUGCHECK_P2: ffffaa8711dcabc0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
STACK_TEXT:
fffffb0f`34c52f58 fffff801`37cdfa52 : 00000000`00000192 ffff800f`8d811080 ffffaa87`11dcabc0 00000000`00000000 : nt!KeBugCheckEx
fffffb0f`34c52f60 fffff801`380cfd52 : ffffaa87`14aef7f5 fffff801`00000000 ffff800f`00000000 ffffaa87`14aa8ec0 : nt!ExAcquirePushLockSharedEx+0x142
fffffb0f`34c52fb0 fffff801`380cdd77 : ffffaa87`117c5520 ffffaa87`14aa7d80 fffffb0f`34c531d0 fffff801`00000008 : nt!CmpPerformSingleKcbCacheLookup+0xe2
fffffb0f`34c53040 fffff801`380ce1ba : 00000000`00000002 fffffb0f`34c53100 fffffb0f`00000008 00000000`00000000 : nt!CmpPerformCompleteKcbCacheLookup+0x77
fffffb0f`34c530d0 fffff801`380cd013 : ffffaa87`0000001c fffffb0f`34c53420 fffffb0f`34c533d8 ffff800f`89e11730 : nt!CmpDoParseKey+0x2da
fffffb0f`34c53370 fffff801`380d10de : fffff801`380ccd01 00000000`00000000 ffff800f`89e11730 fffffb0f`34c53601 : nt!CmpParseKey+0x2c3
fffffb0f`34c53510 fffff801`380da39a : ffff800f`89e11700 fffffb0f`34c53778 00000000`00000040 ffff800f`810fef00 : nt!ObpLookupObjectName+0x3fe
fffffb0f`34c536e0 fffff801`380da17c : 00000000`00000000 00000000`00000000 00000000`00000000 ffff800f`810fef00 : nt!ObOpenObjectByNameEx+0x1fa
fffffb0f`34c53810 fffff801`380d9ca1 : 00000000`0c47e608 fffffb0f`34c53b80 00000000`00000001 fffff801`37c617be : nt!ObOpenObjectByName+0x5c
fffffb0f`34c53860 fffff801`380d99cf : 00000000`01260000 00000000`75a56290 00000000`775e4630 00000000`0c57f08c : nt!CmOpenKey+0x2c1
fffffb0f`34c53ac0 fffff801`37e058b8 : ffff800f`8d811000 00000000`00000000 fffffb0f`34c53b80 ffff800f`918098d0 : nt!NtOpenKeyEx+0xf
fffffb0f`34c53b00 00007ff8`6b5ae1b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0c47e5a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6b5ae1b4
SYMBOL_NAME: nt!ExAcquirePushLockSharedEx+142
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 142
FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockSharedEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {292e4563-5d10-0ceb-86fc-152da5e999ce}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8060f13d33f, Address of the instruction which caused the bugcheck
Arg3: fffff48fcbade470, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13536
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8060f13d33f
BUGCHECK_P3: fffff48fcbade470
BUGCHECK_P4: 0
CONTEXT: fffff48fcbade470 -- (.cxr 0xfffff48fcbade470)
rax=fffff48fcbadf720 rbx=ffffc20e04b422b0 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000002 rdi=fffff48fcbadf4e8
rip=fffff8060f13d33f rsp=fffff48fcbadee70 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffffc20e04f67bb0 r12=0000000000000702 r13=0000000000000000
r14=fffff48fcbadf4c0 r15=fffff48fcbadf4e8
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050216
Ntfs!NtfsCleanupIrpContext+0x2df:
fffff806`0f13d33f 488b4970 mov rcx,qword ptr [rcx+70h] ds:002b:00000000`00000070=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
fffff48f`cbadee70 fffff806`0f13cf24 : 00000000`00000000 00000000`00000001 fffff48f`cbadf4c0 fffff806`0f13c090 : Ntfs!NtfsCleanupIrpContext+0x2df
fffff48f`cbadeed0 fffff806`0f26b723 : 00000000`00000000 ffffc20e`04b422b0 00000000`00000200 00000000`00000000 : Ntfs!NtfsExtendedCompleteRequestInternal+0x134
fffff48f`cbadef30 fffff806`0f26a4ba : 00000000`00000000 ffff9b88`1ca2c468 ffff9b88`1ca2c101 00000000`00000000 : Ntfs!NtfsCompleteCleanupRequest+0x53
fffff48f`cbadef70 fffff806`0f25af4d : 00000000`00000000 00000000`00000000 00000000`00000000 fffff48f`cbadf490 : Ntfs!NtfsCommonCleanup+0x61aa
fffff48f`cbadf420 fffff806`0c4d1f35 : ffffc20e`00da0010 fffff806`085e4b46 ffffc20e`04b422b0 ffffc20d`f9884ae0 : Ntfs!NtfsFsdCleanup+0x1bd
fffff48f`cbadf770 fffff806`085e6ccf : 00000000`00000000 fffff806`0c8d4b41 ffffc20d`00000000 ffffc20d`fe4d9080 : nt!IofCallDriver+0x55
fffff48f`cbadf7b0 fffff806`085e48d3 : fffff48f`cbadf840 00000000`00000000 00000000`00000000 ffffc20d`fee8a080 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff48f`cbadf820 fffff806`0c4d1f35 : ffffc20e`04f67bb0 fffff806`0c4d244d ffffc20e`04f67bb0 ffff088e`301e5aff : FLTMGR!FltpDispatch+0xa3
fffff48f`cbadf880 fffff806`0c8a740a : 00000000`00000000 ffffc20e`04f67bb0 00000000`00000000 00000000`00040040 : nt!IofCallDriver+0x55
fffff48f`cbadf8c0 fffff806`0c8d23ec : 00000000`00000000 00000000`00007ffe ffffffff`00000000 ffffc20d`f60fdd20 : nt!IopCloseFile+0x17a
fffff48f`cbadf950 fffff806`0c8d60bc : 00000000`00001188 fffff806`0c841227 00000000`00000000 00000000`00000000 : nt!ObCloseHandleTableEntry+0x24c
fffff48f`cbadfa90 fffff806`0c6058b8 : ffffc20d`fe4d9000 00007ffd`4550c610 fffff48f`cbadfb80 ffffffff`ffb3b401 : nt!NtClose+0xec
fffff48f`cbadfb00 00007ffd`6242bfa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000089`0ecff448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6242bfa4
SYMBOL_NAME: Ntfs!NtfsCleanupIrpContext+2df
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xfffff48fcbade470 ; kb
BUCKET_ID_FUNC_OFFSET: 2df
FAILURE_BUCKET_ID: 0x3B_c0000005_Ntfs!NtfsCleanupIrpContext
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60eaa459-510e-8de8-0423-d729386743f0}
Followup: MachineOwner
---------