Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\Downloads\110520-22562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`11a00000 PsLoadedModuleList = 0xfffff806`1262a310
Debug session time: Thu Nov 5 13:26:20.245 2020 (UTC + 3:00)
System Uptime: 0 days 0:33:56.866
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`11df45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffee03`ab7c5770=000000000000003b
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80611cc059f, Address of the instruction which caused the bugcheck
Arg3: ffffee03ab7c6070, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10710
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80611cc059f
BUGCHECK_P3: ffffee03ab7c6070
BUGCHECK_P4: 0
CONTEXT: ffffee03ab7c6070 -- (.cxr 0xffffee03ab7c6070)
rax=0000000000000000 rbx=ffffc98bfdf17f00 rcx=ffffa18150d58180
rdx=0000000000000000 rsi=0000000000000000 rdi=fffbc98bfdecd370
rip=fffff80611cc059f rsp=ffffee03ab7c6a70 rbp=ffffee03ab7c6ae8
r8=ffffde06ec7fd001 r9=fffff80611a00000 r10=0000000000000000
r11=ffffde06d49c79c0 r12=0000000000000000 r13=0000000000000002
r14=ffffffffffffffff r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!NtReleaseWorkerFactoryWorker+0x1af:
fffff806`11cc059f 4c897f18 mov qword ptr [rdi+18h],r15 ds:002b:fffbc98b`fdecd388=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffee03`ab7c6a70 fffff806`11e05fb8 : ffffc98b`f2daa080 0000003b`27b7d720 ffffc98b`fdf07d10 00000000`00002101 : nt!NtReleaseWorkerFactoryWorker+0x1af
ffffee03`ab7c6b00 00007ffa`281ceb64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003b`27b7d5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`281ceb64
SYMBOL_NAME: nt!NtReleaseWorkerFactoryWorker+1af
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffee03ab7c6070 ; kb
BUCKET_ID_FUNC_OFFSET: 1af
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!NtReleaseWorkerFactoryWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0631be0b-f72e-4604-46fe-0ac805842532}
Followup: MachineOwner
---------