SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff803088d9525, Address of the instruction which caused the bugcheck
Arg3: fffff88a217479b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.657 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: Hewlett-Packard
SYSTEM_PRODUCT_NAME: HP 350 G1
SYSTEM_SKU: G6V87EA#AB8
SYSTEM_VERSION: 0998100000400010000610101
BIOS_VENDOR: Insyde
BIOS_VERSION: F.16
BIOS_DATE: 08/04/2016
BASEBOARD_MANUFACTURER: Hewlett-Packard
BASEBOARD_PRODUCT: 21B8
BASEBOARD_VERSION: KBC Version 46.20
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff803088d9525
BUGCHECK_P3: fffff88a217479b0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+d5
fffff803`088d9525 f00fba3600 lock btr dword ptr [rsi],0
CONTEXT: fffff88a217479b0 -- (.cxr 0xfffff88a217479b0)
rax=0000000000000000 rbx=ffffa80a3a33c080 rcx=ffffa80a3a33c118
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa80a3a33c3a0
rip=fffff803088d9525 rsp=fffff88a217483a0 rbp=ffffa80a3a33c080
r8=fffff88a217483f8 r9=0000000000000000 r10=fffff803088d9450
r11=ffffbe7ab1400000 r12=ffff941e85b6fa60 r13=0000000000000003
r14=000000000cddba5e r15=0000000000000820
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0xd5:
fffff803`088d9525 f00fba3600 lock btr dword ptr [rsi],0 ds:002b:00000000`00000000=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 4
CPU_MHZ: 8f7
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 45
CPU_STEPPING: 1
CPU_MICROCODE: 6,45,1,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: KingdomCome.ex
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-BKJR0DQ
ANALYSIS_SESSION_TIME: 03-10-2020 22:48:51.0320
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from ffff944fe9867d57 to fffff803088d9525
STACK_TEXT:
fffff88a`217483a0 ffff944f`e9867d57 : ffff941e`85b6fa60 00000000`00000000 ffff941e`00000000 fffff803`0883697a : nt!ExEnterCriticalRegionAndAcquireFastMutexUnsafe+0xd5
fffff88a`217483f0 ffff944f`e9866c52 : ffff941e`85b6fa60 00000000`00010000 fffff803`08836960 ffff944f`e95e49ea : cdd!CddBitmap::RemoveFromCddBitmapList+0x27
fffff88a`21748420 ffff944f`e986f7ad : 00000000`00000820 ffff941e`85b6fa60 00000000`00000001 fffff88a`217484d0 : cdd!CddBitmapHw::Release+0x72
fffff88a`217484d0 ffff944f`e95e3641 : ffff941e`80911000 ffff941e`8e0b4b00 00000000`00000001 00000000`00000014 : cdd!DrvDeleteDeviceBitmapEx+0x7d
fffff88a`21748500 ffff944f`e95e326c : fffff88a`21740000 fffff88a`21748758 fffff88a`00000000 00000000`00000000 : win32kbase!SURFACE::bDeleteSurface+0x3c1
fffff88a`217486c0 ffff944f`e9670093 : 00000000`00000e29 fffff88a`21748740 00000000`00000002 fffff88a`21748740 : win32kbase!SURFREF::bDeleteSurface+0x14
fffff88a`217486f0 ffff944f`e9636ba1 : 00000000`48050e29 ffff941e`8e0b4b00 00000000`00000001 00000000`71043243 : win32kbase!vGarbageCollectSurfaces+0xa7
fffff88a`21748750 ffff944f`e963671e : 00000000`00000bec ffffa80a`34785080 ffff941e`8646f150 ffff944f`e96358e2 : win32kbase!NtGdiCloseProcess+0x149
fffff88a`217487b0 ffff944f`e92bd027 : ffff941e`89eac880 ffff944f`e926c7f1 ffff941e`89eac880 00000000`00000001 : win32kbase!GdiProcessCallout+0x6e
fffff88a`21748830 ffff944f`e95d2c85 : 00000000`00000000 fffff803`08c38988 ffffa80a`34d46920 ffffa80a`3c507b20 : win32kfull!W32pProcessCallout+0x107
fffff88a`21748870 ffff944f`e9e61040 : fffff803`08c38988 fffff803`0889c700 ffffa80a`35e77df0 ffffa80a`34d46920 : win32kbase!W32CalloutDispatch+0x385
fffff88a`21748a90 fffff803`08dca891 : 00000000`00000000 fffff88a`21748b30 00060030`00010002 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x10
fffff88a`21748ac0 fffff803`08e5eac5 : ffffa80a`35e77df0 fffff88a`21748c99 00000000`00000000 00000000`00000000 : nt!ExCallCallBack+0x3d
fffff88a`21748af0 fffff803`08ecdec3 : 00000000`0000029a 00000000`00000001 00000000`00000000 fffff88a`21748ec0 : nt!PspExitThread+0x5ad
fffff88a`21748c00 fffff803`0883e551 : ffffa80a`3ca6ee20 ffffa80a`37a601c0 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
fffff88a`21748c40 fffff803`089c5a90 : 00000000`00000001 fffff88a`21748d00 00000000`00000000 ffff941e`00000000 : nt!KiDeliverApc+0x481
fffff88a`21748d00 fffff803`089d2ebf : 0000002c`6dc4e000 ffff944f`e9e6247a 00000000`00000020 ffff944f`e9e6247a : nt!KiInitiateUserApc+0x70
fffff88a`21748e40 00007ffe`5e6c13c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000002c`7191cb48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5e6c13c4
THREAD_SHA1_HASH_MOD_FUNC: 51f02b82a9023a29619b039dbeb58aeea70d178b
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: f900aa8ed33070904109805ec4d5c65fc7423564
THREAD_SHA1_HASH_MOD: 8185a69d861cf8a4aeeb0993efef9d96dc299311
FOLLOWUP_IP:
cdd!CddBitmap::RemoveFromCddBitmapList+27
ffff944f`e9867d57 488d8388000000 lea rax,[rbx+88h]
FAULT_INSTR_CODE: 88838d48
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: cdd!CddBitmap::RemoveFromCddBitmapList+27
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.713
STACK_COMMAND: .cxr 0xfffff88a217479b0 ; kb
BUCKET_ID_FUNC_OFFSET: 27
FAILURE_BUCKET_ID: 0x3B_c0000005_cdd!CddBitmap::RemoveFromCddBitmapList
BUCKET_ID: 0x3B_c0000005_cdd!CddBitmap::RemoveFromCddBitmapList
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_cdd!CddBitmap::RemoveFromCddBitmapList
TARGET_TIME: 2020-03-10T19:35:54.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.657
ANALYSIS_SESSION_ELAPSED_TIME: f20
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_cdd!cddbitmap::removefromcddbitmaplist
FAILURE_ID_HASH: {be0d3f21-7992-c2f7-1933-482ab464111e}
Followup: MachineOwner
---------