Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Desktop\122220-8468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`24200000 PsLoadedModuleList = 0xfffff801`24e2a2b0
Debug session time: Tue Dec 22 12:45:00.194 2020 (UTC + 3:00)
System Uptime: 0 days 0:08:06.946
Loading Kernel Symbols
...............................................................
................................................................
................................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`245f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc484`6b085f40=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80122d86c76, Address of the instruction which caused the bugcheck
Arg3: ffffc4846b086840, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11246
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80122d86c76
BUGCHECK_P3: ffffc4846b086840
BUGCHECK_P4: 0
CONTEXT: ffffc4846b086840 -- (.cxr 0xffffc4846b086840)
rax=ffff930215452658 rbx=ffff9302213afb20 rcx=fffff80122d8b9f0
rdx=ffff930215452270 rsi=ffff930215452270 rdi=ffff930211280ba0
rip=fffff80122d86c76 rsp=ffffc4846b087240 rbp=0000000000000008
r8=0000000000000000 r9=fffff80122d9d440 r10=ffff930215452270
r11=0000000000000010 r12=0000000000000000 r13=ffff9302239dbd01
r14=ffff930215452658 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x236:
fffff801`22d86c76 0f1140b8 movups xmmword ptr [rax-48h],xmm0 ds:002b:ffff9302`15452610=????????????????????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffc484`6b087240 fffff801`22dbbbd4 : ffffc484`6b0872f0 ffff9302`239dbd28 ffff9302`11280ba0 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x236
ffffc484`6b0872b0 fffff801`24452f55 : 00000000`00000000 ffff9302`113aa860 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffc484`6b087360 fffff801`24454544 : 00000000`00000003 ffff9302`15452270 ffff9302`6d4e6f49 fffff801`24454173 : nt!IofCallDriver+0x55
ffffc484`6b0873a0 fffff801`247fec2d : ffffc484`6b087660 ffff9302`113aa860 ffff9302`239dbd68 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
ffffc484`6b0873f0 fffff801`2482751e : ffff9302`113aa860 00000000`000000a8 ffff9302`25510a90 ffff9302`25510a01 : nt!IopParseDevice+0x117d
ffffc484`6b087560 fffff801`247eb19a : ffff9302`25510a00 ffffc484`6b0877c8 ffff9302`00000040 ffff9302`0e6f9d20 : nt!ObpLookupObjectName+0x3fe
ffffc484`6b087730 fffff801`2486d14f : ffffc484`00000000 00000050`fee7eb88 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByNameEx+0x1fa
ffffc484`6b087860 fffff801`2486cd29 : 00000050`fee7eb48 ffff9302`1fc10080 00000050`fee7eb88 00000050`fee7eb50 : nt!IopCreateFile+0x40f
ffffc484`6b087900 fffff801`246071b5 : ffffc484`6b087a80 fffff801`2482dc95 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79
ffffc484`6b087990 00007fff`fabaca54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000050`fee7eac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`fabaca54
SYMBOL_NAME: FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+236
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .cxr 0xffffc4846b086840 ; kb
BUCKET_ID_FUNC_OFFSET: 236
FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a3f5f1a-1689-90d8-a9c5-009898eb5898}
Followup: MachineOwner
---------