SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8002d0b7c80, Address of the instruction which caused the bugcheck
Arg3: ffff95005fd22820, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.30
BIOS_DATE: 07/31/2019
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: A320M-HDV R4.0
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8002d0b7c80
BUGCHECK_P3: ffff95005fd22820
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!CcSetDirtyInMask+c0
fffff800`2d0b7c80 488b7828 mov rdi,qword ptr [rax+28h]
CONTEXT: ffff95005fd22820 -- (.cxr 0xffff95005fd22820)
rax=0000000000000400 rbx=ffff998320076010 rcx=ffff99832a62435f
rdx=0000000000000000 rsi=ffff998325b79700 rdi=0000000000000000
rip=fffff8002d0b7c80 rsp=ffff95005fd23210 rbp=ffff95005fd232a9
r8=0000000000000400 r9=ffff99832705a080 r10=0000000000000000
r11=ffff95005fd23308 r12=0000000000000269 r13=0000000000000000
r14=0000000000000000 r15=0000000000000269
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!CcSetDirtyInMask+0xc0:
fffff800`2d0b7c80 488b7828 mov rdi,qword ptr [rax+28h] ds:002b:00000000`00000428=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 4
CPU_MHZ: dac
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-17-2020 15:58:51.0429
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8002d0b6ba9 to fffff8002d0b7c80
STACK_TEXT:
ffff9500`5fd23210 fffff800`2d0b6ba9 : ffff9983`25b79700 ffff9500`5fd23368 ffff9500`5fd23378 ffff9983`2705a080 : nt!CcSetDirtyInMask+0xc0
ffff9500`5fd23310 fffff800`2d0b88e5 : ffff9983`25b79700 00000181`d3d77f90 ffff9500`5fd234f0 00000000`00000000 : nt!CcMapAndCopyInToCache+0x699
ffff9500`5fd23490 fffff800`321f9136 : ffffa988`8aece740 00000000`00000000 ffffa988`8aece7a8 ffffa988`00000400 : nt!CcCopyWriteEx+0x105
ffff9500`5fd23510 fffff800`316e5f77 : 00000000`00000000 00000000`000002c0 ffff9983`2a624350 00000000`00000000 : Ntfs!NtfsCopyWriteA+0x456
ffff9500`5fd23820 fffff800`316e2fa3 : ffff9500`5fd23910 00000000`00000000 00000000`00000000 ffff9983`2740b9a0 : FLTMGR!FltpPerformFastIoCall+0x197
ffff9500`5fd23880 fffff800`3171c5d5 : ffff9500`5fd23a40 00000000`00000001 00000000`00000000 ffff9983`2a624350 : FLTMGR!FltpPassThroughFastIo+0xd3
ffff9500`5fd238e0 fffff800`2d6c9668 : ffff9983`2a624350 00000043`cb5ff290 00000043`cb5ff290 00000043`00000000 : FLTMGR!FltpFastIoWrite+0x165
ffff9500`5fd23990 fffff800`2d1d3c18 : ffff9983`2705a080 00000000`00000000 00000000`00000000 00000043`cb5ff2d0 : nt!NtWriteFile+0x458
ffff9500`5fd23a90 00007ffa`34ddc174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000043`cb5ff218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`34ddc174
THREAD_SHA1_HASH_MOD_FUNC: 31d9779c2628df12428b0126d15ac9597ea9f2fe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a2b9bafed966edece7076564d4cae577d6efb943
THREAD_SHA1_HASH_MOD: a6fd795968d059f20d35d8d53c8d3392eb23a53f
FOLLOWUP_IP:
nt!CcSetDirtyInMask+c0
fffff800`2d0b7c80 488b7828 mov rdi,qword ptr [rax+28h]
FAULT_INSTR_CODE: 28788b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!CcSetDirtyInMask+c0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ff75719
IMAGE_VERSION: 10.0.18362.900
STACK_COMMAND: .cxr 0xffff95005fd22820 ; kb
BUCKET_ID_FUNC_OFFSET: c0
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CcSetDirtyInMask
BUCKET_ID: 0x3B_c0000005_nt!CcSetDirtyInMask
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!CcSetDirtyInMask
TARGET_TIME: 2020-06-17T12:39:02.000Z
OSBUILD: 18362
OSSERVICEPACK: 900
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2012-07-07 00:22:33
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3872
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!ccsetdirtyinmask
FAILURE_ID_HASH: {c03fe27c-fd3c-e6d9-7edc-9cd901d83819}
Followup: MachineOwner
---------