*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8025b22e07e, Address of the instruction which caused the bugcheck
Arg3: ffffd30166472920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8077
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12656
Key : Analysis.Init.CPU.mSec
Value: 1108
Key : Analysis.Init.Elapsed.mSec
Value: 6245
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8025b22e07e
BUGCHECK_P3: ffffd30166472920
BUGCHECK_P4: 0
CONTEXT: ffffd30166472920 -- (.cxr 0xffffd30166472920)
rax=0000000000000000 rbx=ffffe38470adf760 rcx=ffffe38470adf760
rdx=8400000000000000 rsi=0000000000000001 rdi=ffffab0b0d10f580
rip=fffff8025b22e07e rsp=ffffe38470adf700 rbp=ffffe38470adf799
r8=ffffab0b0d10f520 r9=0000000000000000 r10=0000000000000000
r11=ffffe38470adf860 r12=0000000000000000 r13=ffffffffffffffff
r14=0000000000000000 r15=ffffab0b0c39b080
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff802`5b22e07e 48890a mov qword ptr [rdx],rcx ds:002b:84000000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: voicemeeterpro.exe
STACK_TEXT:
ffffe384`70adf700 fffff802`5b262fe2 : 00000000`00000000 ffffab0b`0d10f580 00000000`00000001 fffff802`5b2622c0 : nt!KxWaitForLockOwnerShip+0xe
ffffe384`70adf730 fffff802`5b261f4c : 00000000`00000001 fffff802`5b2ef62a ffffab0b`0d10f520 ffffe384`70adf8f0 : nt!ExpAcquireResourceExclusiveLite+0x5c2
ffffe384`70adf800 ffffa238`a68166e1 : fffff802`5b261f10 ffffa238`a67b7fd8 00000000`00000000 ffffe384`70adf8b0 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3c
ffffe384`70adf840 ffffa238`a686f7a5 : 00000000`0085000f 00000000`00000000 00000000`0085000f ffffe384`70adf8f0 : win32kbase!GreAcquireHmgrSemaphore+0x41
ffffe384`70adf880 ffffa238`a67ccc71 : 00000000`0012001f 00000000`0085000f 00000000`00000000 ffffe384`70adfa00 : win32kbase!hbmSelectBitmapInternal+0xb5
ffffe384`70adf920 ffffa238`a68224ad : ffffe384`00000000 ffffa238`a67b9054 00000000`00000000 00000aad`00000000 : win32kbase!hbmSelectBitmap+0x11
ffffe384`70adf960 ffffa238`a680ce73 : 00000000`00000000 00000000`00000000 ffffe384`70adfa00 00000000`00000001 : win32kbase!XDCOBJ::bCleanDC+0xdd
ffffe384`70adf9a0 ffffa238`a680cd2d : 00000000`00000001 00000000`1c010afb ffffe384`70adfa69 00000000`1c010afb : win32kbase!bDeleteDCOBJ+0x103
ffffe384`70adf9e0 ffffa238`a680c556 : 00000000`00000afb 00000000`09050854 00000000`00000000 ffffa250`c08e0120 : win32kbase!bDeleteDCInternalEx+0x4d
ffffe384`70adfa20 ffffa238`a645df25 : 00000000`00000000 00000000`ffffffff 00000267`00000000 00000000`00000020 : win32kbase!NtGdiDeleteObjectApp+0x536
ffffe384`70adfad0 fffff802`5b4075b8 : 00000000`00000212 ffffe384`70adfb80 00000000`00000000 ffffa238`a6459ddc : win32k!NtGdiDeleteObjectApp+0x15
ffffe384`70adfb00 00000000`77311cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0145e7a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77311cfc
SYMBOL_NAME: win32kbase!GreAcquireHmgrSemaphore+41
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1140
STACK_COMMAND: .cxr 0xffffd30166472920 ; kb
BUCKET_ID_FUNC_OFFSET: 41
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kbase!GreAcquireHmgrSemaphore
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ce44f46d-2eba-67d3-9ade-9a779da8905d}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8040b90bbbe, Address of the instruction which caused the bugcheck
Arg3: ffff8f80029bf920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6874
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16040
Key : Analysis.Init.CPU.mSec
Value: 1327
Key : Analysis.Init.Elapsed.mSec
Value: 9875
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8040b90bbbe
BUGCHECK_P3: ffff8f80029bf920
BUGCHECK_P4: 0
CONTEXT: ffff8f80029bf920 -- (.cxr 0xffff8f80029bf920)
rax=0000000000000000 rbx=ffffb401496216d8 rcx=ffffb401496216d8
rdx=0008000000000000 rsi=0000000000000000 rdi=fffff8040c24e268
rip=fffff8040b90bbbe rsp=ffffb40149621640 rbp=ffffb40149621709
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=fffffa500034d800 r13=fffff8040c250c00
r14=8000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff804`0b90bbbe 48890a mov qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffb401`49621640 fffff804`0b90bb9f : ffffc106`00000000 00000000`00000000 00000000`0012ba9b 00000000`00000003 : nt!KxWaitForLockOwnerShip+0xe
ffffb401`49621670 fffff804`0b90cfc9 : ffffa000`69b00000 ffffa000`69b00000 ffffc106`54af4038 00000000`001185c0 : nt!KeAcquireInStackQueuedSpinLock+0x7f
ffffb401`496216a0 fffff804`0b950539 : 00000000`00000001 00000000`20000000 00000000`20000000 ffffd18f`6ba54208 : nt!MiReleaseSystemCacheView+0xad
ffffb401`49621770 fffff804`0bcf82bf : ffffa000`69b40000 ffffd18f`6cfc4540 ffffc106`00000000 fffff804`0b8d5701 : nt!MmUnmapViewInSystemCache+0x609
ffffb401`49621890 fffff804`0b909b16 : 00000000`00000000 ffffc106`5c49fc70 ffffc106`54bdbf88 00000000`00000000 : nt!CcUnmapVacb+0x63
ffffb401`496218d0 fffff804`0b911536 : 00000000`00000001 ffffd18f`6a29f700 00000000`00000000 ffffffff`ffffffff : nt!CcUnmapVacbArray+0x206
ffffb401`49621940 fffff804`0b9113a4 : 00000000`00000000 ffffb401`49621a00 ffffb401`49621a00 ffffc106`5c49fc70 : nt!CcUnmapAndPurge+0x36
ffffb401`49621980 fffff804`0b90f183 : ffffc106`5c49fc70 ffffb401`49621a50 ffffc106`54b02a60 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x138
ffffb401`496219d0 fffff804`0eeab260 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcUninitializeCacheMap+0x2f3
ffffb401`49621a90 fffff804`0ee9bf60 : ffffd18f`6a29f600 ffffd18f`6a29f660 00000000`00000000 ffffd18f`6a29f7c0 : Ntfs+0x11b260
ffffb401`49621ad0 fffff804`0eda7b95 : ffffd18f`6a29f660 ffffd18f`6a29f7c0 00000000`00000000 ffffd18f`6a29f7c0 : Ntfs+0x10bf60
ffffb401`49621b30 fffff804`0eda7869 : ffffd18f`6d38e050 00000000`00000008 ffffc106`56b61180 ffffd18f`6a29f660 : Ntfs+0x17b95
ffffb401`49621b70 fffff804`0ee9bc7a : ffffc106`59152d08 ffffc106`56b61180 ffffd18f`6d38e010 ffffd18f`6d38e528 : Ntfs+0x17869
ffffb401`49621c10 fffff804`0eed2ba7 : ffffc106`59152d08 00000000`c000003a ffffd18f`6d38e528 ffffd18f`6de391e0 : Ntfs+0x10bc7a
ffffb401`49621c90 fffff804`0eecc10b : ffffc106`5c6dfa20 ffffb401`49622080 ffffc106`5c6dfa20 00000000`00000000 : Ntfs+0x142ba7
ffffb401`49621f70 fffff804`0b8cd6c5 : ffffc106`56b61030 ffffc106`5c6dfa20 ffffb401`49622200 ffffc106`5c5faa90 : Ntfs+0x13c10b
ffffb401`496221f0 fffff804`08e16ccf : ffffc106`5c5fab00 ffffb401`496222e0 ffffb401`496222e9 fffff804`08e15b37 : nt!IofCallDriver+0x55
ffffb401`49622230 fffff804`08e4bbd4 : ffffb401`496222e0 ffffc106`5c5faae8 ffffc106`56b40d10 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffb401`496222a0 fffff804`0b8cd6c5 : ffffc106`5c5faa00 ffffc106`56a908f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffb401`49622350 fffff804`0b8cecb4 : 00000000`00000000 ffffc106`5c6dfa20 ffffc106`56b48150 fffff804`0b895a02 : nt!IofCallDriver+0x55
ffffb401`49622390 fffff804`0bcc3c3d : ffffb401`49622650 00000000`000000f0 00000000`00000000 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
ffffb401`496223e0 fffff804`0bcec3ae : ffffc106`56a908f0 00000000`00000000 ffffc106`5c6dba20 ffffc106`5c6dba01 : nt!IopParseDevice+0x117d
ffffb401`49622550 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpLookupObjectName+0x3fe
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.631
STACK_COMMAND: .cxr 0xffff8f80029bf920 ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KxWaitForLockOwnerShip
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {30b07425-154d-9599-35b8-aa3fc841c8aa}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8044e70bbbe, Address of the instruction which caused the bugcheck
Arg3: ffffdd8178499920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6328
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11784
Key : Analysis.Init.CPU.mSec
Value: 1030
Key : Analysis.Init.Elapsed.mSec
Value: 5603
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8044e70bbbe
BUGCHECK_P3: ffffdd8178499920
BUGCHECK_P4: 0
CONTEXT: ffffdd8178499920 -- (.cxr 0xffffdd8178499920)
rax=000000000000011d rbx=ffff8584bbdb7e28 rcx=ffff8584bbdb7e28
rdx=8400000000000000 rsi=ffffc08004c7aab0 rdi=ffffc380000030e8
rip=fffff8044e70bbbe rsp=ffff8584bbdb7dc0 rbp=ffff8584bbdb7ea9
r8=ffffc38000007000 r9=0000000000000039 r10=0000000000197e30
r11=ffff8584bbdb7dc0 r12=0000000000000001 r13=0000000000197e39
r14=ffffc38000003108 r15=000000000000772d
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff804`4e70bbbe 48890a mov qword ptr [rdx],rcx ds:002b:84000000`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffff8584`bbdb7dc0 fffff804`4e747499 : 00000000`00000000 00000000`00000000 ffff8584`bbdb7ea9 ffffc080`04c7aab0 : nt!KxWaitForLockOwnerShip+0xe
ffff8584`bbdb7df0 fffff804`4e749b72 : 00000000`00197e39 fffff804`4f050c00 00000000`00000001 ffffc787`00000039 : nt!MiInsertPageInFreeOrZeroedList+0x839
ffff8584`bbdb7f10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeletePteRun+0x11c2
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.631
STACK_COMMAND: .cxr 0xffffdd8178499920 ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KxWaitForLockOwnerShip
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {30b07425-154d-9599-35b8-aa3fc841c8aa}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8064cc2e07e, Address of the instruction which caused the bugcheck
Arg3: ffffca01e4f6b920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 12243
Key : Analysis.Init.CPU.mSec
Value: 952
Key : Analysis.Init.Elapsed.mSec
Value: 7565
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8064cc2e07e
BUGCHECK_P3: ffffca01e4f6b920
BUGCHECK_P4: 0
CONTEXT: ffffca01e4f6b920 -- (.cxr 0xffffca01e4f6b920)
rax=0000000000000000 rbx=ffff9a0e66084200 rcx=ffff9a0e66084200
rdx=8400000000000000 rsi=ffffde0a8538c500 rdi=ffffde0a7cd70588
rip=fffff8064cc2e07e rsp=ffff9a0e66084170 rbp=ffffde0a84cde080
r8=0000000000000000 r9=ffff9a0e66084340 r10=0000000000000000
r11=ffff9a0e66084338 r12=0000000000000000 r13=ffffde0a8538c590
r14=0000000000000001 r15=ffffde0a7cd70528
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!KxWaitForLockOwnerShip+0xe:
fffff806`4cc2e07e 48890a mov qword ptr [rdx],rcx ds:002b:84000000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MsMpEng.exe
STACK_TEXT:
ffff9a0e`66084170 fffff806`4cc2e05f : 00000000`00780038 ffffb086`eda6ea60 ffffde0a`8538c590 00120081`00000000 : nt!KxWaitForLockOwnerShip+0xe
ffff9a0e`660841a0 fffff806`4cc61cc0 : ffffde0a`7cd70528 00000038`13ef95b6 00000000`0289cb9d 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7f
ffff9a0e`660841d0 fffff806`48bb3ec9 : 00000000`00000000 ffffde0a`8538c590 ffff9a0e`66084340 00000000`00000000 : nt!ExAcquireResourceExclusiveLite+0xb0
ffff9a0e`66084260 fffff806`48be98fb : ffffde0a`87edca70 ffffde0a`86d092a0 00000000`00000008 ffffde0a`84ed9010 : FLTMGR!FltpGetStreamListCtrl+0x119
ffff9a0e`660842b0 fffff806`48bb70e4 : 00000000`00000000 ffffde0a`8538c590 00000000`00000008 fffff806`48bb5b37 : FLTMGR!FltpCacheCreateNames+0x5b
ffff9a0e`66084340 fffff806`48bebbd4 : ffff9a0e`660843f0 ffffde0a`8538c5e8 ffffde0a`7cc93d60 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x6a4
ffff9a0e`660843b0 fffff806`4cc52f55 : 00000000`00000000 ffffde0a`7cca28f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffff9a0e`66084460 fffff806`4cc54544 : 00000000`00000003 ffffde0a`84ed9010 ffffde0a`6d4e6f49 fffff806`4cc54173 : nt!IofCallDriver+0x55
ffff9a0e`660844a0 fffff806`4cffefad : ffff9a0e`66084760 00000000`000000f0 00000000`00000000 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
ffff9a0e`660844f0 fffff806`4d02797e : ffffde0a`7cca28f0 00000000`00000028 ffffde0a`86af4a20 ffffde0a`86af4a01 : nt!IopParseDevice+0x117d
ffff9a0e`66084660 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpLookupObjectName+0x3fe
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .cxr 0xffffca01e4f6b920 ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KxWaitForLockOwnerShip
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {30b07425-154d-9599-35b8-aa3fc841c8aa}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8071362e07e, Address of the instruction which caused the bugcheck
Arg3: ffffe281f5bbf920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 14731
Key : Analysis.Init.CPU.mSec
Value: 952
Key : Analysis.Init.Elapsed.mSec
Value: 5608
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8071362e07e
BUGCHECK_P3: ffffe281f5bbf920
BUGCHECK_P4: 0
CONTEXT: ffffe281f5bbf920 -- (.cxr 0xffffe281f5bbf920)
rax=0000000000000000 rbx=ffffc60ac9d7fe40 rcx=ffffc60ac9d7fe40
rdx=0008000000000000 rsi=0000000000000700 rdi=ffff9c8777262940
rip=fffff8071362e07e rsp=ffffc60ac9d7fdb0 rbp=ffff9c8777616080
r8=0000000000000000 r9=0000000000000009 r10=0000000000000000
r11=ffffc60ac9d7feb0 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=ffffc8889f38a801
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff807`1362e07e 48890a mov qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LocalBridge.ex
STACK_TEXT:
ffffc60a`c9d7fdb0 fffff807`1362e05f : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c87`77593468 : nt!KxWaitForLockOwnerShip+0xe
ffffc60a`c9d7fde0 fffff807`13661cc0 : ffff9c87`772628e0 fffff807`1366007d ffff9c87`6e369010 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7f
ffffc60a`c9d7fe10 fffff807`15793d40 : 00000000`00000000 00000000`00000702 00000000`00000009 ffffc888`9f38a760 : nt!ExAcquireResourceExclusiveLite+0xb0
ffffc60a`c9d7fea0 fffff807`15876189 : ffff9c87`746f84b8 ffffc888`9f38a760 00000000`00000000 ffffc888`00000001 : Ntfs!NtfsAcquireExclusiveFcb+0x90
ffffc60a`c9d7ff20 fffff807`158756a3 : ffff9c87`746f84b8 ffffc888`9f38a8c0 ffffc888`9f38a760 ffff9c87`6e36a180 : Ntfs!NtfsCommonClose+0xc9
ffffc60a`c9d80000 fffff807`13652f55 : ffffc60a`c9d80201 ffff9c87`75550010 ffffc60a`c9d81000 ffffc60a`00000002 : Ntfs!NtfsFsdClose+0x2d3
ffffc60a`c9d80140 fffff807`0f796ccf : 7fffffff`ffffffff 00000000`00000000 ffffc888`9f38a8c0 00000000`00000200 : nt!IofCallDriver+0x55
ffffc60a`c9d80180 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .cxr 0xffffe281f5bbf920 ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KxWaitForLockOwnerShip
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {30b07425-154d-9599-35b8-aa3fc841c8aa}
Followup: MachineOwner
---------