SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80264270d10, Address of the instruction which caused the bugcheck
Arg3: ffff8481750598e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7736
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c000001d
BUGCHECK_P2: fffff80264270d10
BUGCHECK_P3: ffff8481750598e0
BUGCHECK_P4: 0
CONTEXT: ffff8481750598e0 -- (.cxr 0xffff8481750598e0)
rax=0000000000000006 rbx=ffff84817505a410 rcx=fffff80264c4f888
rdx=ffff84817505a410 rsi=ffffb40628200280 rdi=0000000000000000
rip=fffff80264270d10 rsp=ffff84817505a2e0 rbp=ffffd90487378080
r8=ffffb4063708cf98 r9=00000000000000ff r10=ffffb40628200290
r11=0000000000000000 r12=0000000080000001 r13=ffffb40628200000
r14=0000000000000000 r15=0000000000000700
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!RtlpHpReleaseQueuedLockExclusive+0xa0:
fffff802`64270d10 ff ???
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: CompatTelRunner.exe
STACK_TEXT:
ffff8481`7505a2e0 fffff802`642caf2f : 00000000`00000000 00000000`80000001 ffff8481`00000000 00000000`00000700 : nt!RtlpHpReleaseQueuedLockExclusive+0xa0
ffff8481`7505a340 fffff802`642ca64f : 00000000`00000000 00000000`00000008 ffffd904`74536d4d 00000000`00001000 : nt!ExAllocateHeapPool+0x8af
ffff8481`7505a480 fffff802`64350be6 : 00000000`80000000 00000000`000006f0 00000000`74536d4d 00000000`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffff8481`7505a4d0 fffff802`64312fc7 : 00000000`00000000 ffff8481`7505a590 00000000`000000de 00000000`00000000 : nt!MiAllocatePool+0x86
ffff8481`7505a520 fffff802`64351c32 : ffffffff`ffffffff ffffffff`ffffffff ffffd904`8434a750 00000000`00000000 : nt!MiCreatePrototypePtes+0x53
ffff8481`7505a5d0 fffff802`64701577 : ffffd904`00000001 00000000`000000de 00000000`00000000 ffff8481`000000de : nt!MiAddViewsForSection+0x3c2
ffff8481`7505a6d0 fffff802`6470105c : 00000000`00000001 00000000`00000000 ffff8481`7505a9a8 ffff8481`7505a9b8 : nt!MiMapViewOfDataSection+0x197
ffff8481`7505a800 fffff802`64702ac9 : 00000000`00000000 ffff8481`7505ab80 000000a3`2acfecd8 00000000`00000000 : nt!MiMapViewOfSection+0x34c
ffff8481`7505a950 fffff802`64406bb8 : ffffd904`87378080 000000a3`2acfec98 000000a3`2acfed28 00000000`00000000 : nt!NtMapViewOfSection+0x159
ffff8481`7505aa90 00007ffb`03c8c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a3`2acfec78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`03c8c2a4
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80264270d0e - nt!RtlpHpReleaseQueuedLockExclusive+9e
[ b9:b1 ]
1 error : !nt (fffff80264270d0e)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xffff8481750598e0 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffeb5eb1d9a351, Address of the instruction which caused the bugcheck
Arg3: ffff8208cf5fbd20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7086
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffeb5eb1d9a351
BUGCHECK_P3: ffff8208cf5fbd20
BUGCHECK_P4: 0
CONTEXT: ffff8208cf5fbd20 -- (.cxr 0xffff8208cf5fbd20)
rax=000000007ffdf1e0 rbx=ffffeb34c2979e20 rcx=fff7eb34c29af050
rdx=0000000000000000 rsi=ffffeb34c297a188 rdi=0000000000000200
rip=ffffeb5eb1d9a351 rsp=ffff8208cf5fc720 rbp=ffffeb34c2979e68
r8=0000000000000000 r9=0000000000000000 r10=ffffeb5eb1a60070
r11=ffff8208cf5fc790 r12=0000000000024491 r13=0000000000024491
r14=ffffeb34c2979e54 r15=ffffeb34c2979e50
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull!TimersProc+0x1e1:
ffffeb5e`b1d9a351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff7eb34`c29af1f0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffff8208`cf5fc720 ffffeb5e`b1d99e56 : 00000000`00000000 00000000`0037dbae 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1
ffff8208`cf5fc7b0 ffffeb5e`b1a8ae33 : ffffd88d`82661080 ffffd88d`82661080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffff8208`cf5fc970 ffffeb5e`b1d38d20 : ffffd88d`82661080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffff8208`cf5fcaa0 ffffeb5e`b216474d : ffffd88d`82661080 ffffd88d`82661080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffff8208`cf5fcad0 fffff801`16806bb8 : ffffd88d`00000005 00000000`00000005 000002a1`e0e04140 00000000`00000238 : win32k!NtUserCallNoParam+0x15
ffff8208`cf5fcb00 00007ffb`0db810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000eb`07cbfca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`0db810e4
SYMBOL_NAME: win32kfull!TimersProc+1e1
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffff8208cf5fbd20 ; kb
BUCKET_ID_FUNC_OFFSET: 1e1
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffc5d3ed19a351, Address of the instruction which caused the bugcheck
Arg3: ffffaf0857bf4d20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4655
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffc5d3ed19a351
BUGCHECK_P3: ffffaf0857bf4d20
BUGCHECK_P4: 0
CONTEXT: ffffaf0857bf4d20 -- (.cxr 0xffffaf0857bf4d20)
rax=000000000001f8a4 rbx=ffffc590c4017f60 rcx=fff7c590c40968b0
rdx=0000000000000000 rsi=ffffc590c28693c8 rdi=0000000000000200
rip=ffffc5d3ed19a351 rsp=ffffaf0857bf5720 rbp=ffffc590c4017fa8
r8=0000000000000000 r9=0000000000000000 r10=ffffc5d3ece60070
r11=ffffaf0857bf5790 r12=000000000000037b r13=000000000000037b
r14=ffffc590c4017f94 r15=ffffc590c4017f90
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
win32kfull!TimersProc+0x1e1:
ffffc5d3`ed19a351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff7c590`c4096a50=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffaf08`57bf5720 ffffc5d3`ed199e56 : 00000000`0000000f 00000000`001ea565 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x1e1
ffffaf08`57bf57b0 ffffc5d3`ece8ae33 : ffff8905`2c6c7080 ffff8905`2c6c7080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffffaf08`57bf5970 ffffc5d3`ed138d20 : ffff8905`2c6c7080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffaf08`57bf5aa0 ffffc5d3`ed92474d : ffff8905`2c6c7080 ffff8905`2c6c7080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffaf08`57bf5ad0 fffff800`75e06bb8 : ffff8905`00000005 00000000`00000005 00000240`25e04140 00000000`00000244 : win32k!NtUserCallNoParam+0x15
ffffaf08`57bf5b00 00007ff9`c58010e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007d`f9d3fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c58010e4
SYMBOL_NAME: win32kfull!TimersProc+1e1
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffffaf0857bf4d20 ; kb
BUCKET_ID_FUNC_OFFSET: 1e1
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8046acdb8c6, Address of the instruction which caused the bugcheck
Arg3: ffff810398516f70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3484
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4533
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8046acdb8c6
BUGCHECK_P3: ffff810398516f70
BUGCHECK_P4: 0
CONTEXT: ffff810398516f70 -- (.cxr 0xffff810398516f70)
rax=0000000000000000 rbx=ffffffffffffffff rcx=fff78c0a932367c0
rdx=00000000746c6644 rsi=fff78c0a932367c0 rdi=0000000000000000
rip=fffff8046acdb8c6 rsp=ffff810398517970 rbp=ffff810398517b80
r8=ffff8c0a962160a0 r9=ffffb6007ac79180 r10=ffff8c0a867dddc0
r11=ffff8c0a96151050 r12=00000046b3dff590 r13=00000236d0a80c40
r14=00000046b3dff4f8 r15=00000046b3dff500
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ObfDereferenceObjectWithTag+0x26:
fffff804`6acdb8c6 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:002b:fff78c0a`93236790=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
STACK_TEXT:
ffff8103`98517970 fffff804`6ac9cb8e : 00000000`00000000 00000000`00000001 ffff8103`98517aa8 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0x26
ffff8103`985179b0 fffff804`6b05ee49 : 00000000`00000000 00000000`00000000 00000000`00000000 00000046`b3dfeb30 : nt!HalPutDmaAdapter+0xe
ffff8103`985179e0 fffff804`6ae06bb8 : ffff8c0a`96f42080 00000046`b3dff4d8 ffff8103`98517aa8 00000236`d0a32b00 : nt!NtRemoveIoCompletion+0x149
ffff8103`98517a90 00007ffb`a95ebec4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000046`b3dff4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a95ebec4
SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+26
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffff810398516f70 ; kb
BUCKET_ID_FUNC_OFFSET: 26
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObfDereferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7ebf58a2-0210-7815-d6f6-0e4124026922}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffc9981619a351, Address of the instruction which caused the bugcheck
Arg3: ffffcd07fedfbd20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6062
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 23239
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffc9981619a351
BUGCHECK_P3: ffffcd07fedfbd20
BUGCHECK_P4: 0
CONTEXT: ffffcd07fedfbd20 -- (.cxr 0xffffcd07fedfbd20)
rax=000000007ffe4bb7 rbx=ffffc9b3442fece0 rcx=fff7c9b3443ae010
rdx=0000000000000000 rsi=ffffc9b3442fe508 rdi=0000000000000200
rip=ffffc9981619a351 rsp=ffffcd07fedfc720 rbp=ffffc9b3442fed28
r8=0000000000000000 r9=0000000000000000 r10=ffffc99815e60070
r11=ffffcd07fedfc790 r12=0000000000038975 r13=0000000000038975
r14=ffffc9b3442fed14 r15=ffffc9b3442fed10
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
win32kfull!TimersProc+0x1e1:
ffffc998`1619a351 488b91a0010000 mov rdx,qword ptr [rcx+1A0h] ds:002b:fff7c9b3`443ae1b0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffcd07`fedfc720 ffffc998`16199e56 : 00000000`00000010 00000000`000308fa 00000000`00000003 00000000`00000004 : win32kfull!TimersProc+0x1e1
ffffcd07`fedfc7b0 ffffc998`15e8ae33 : ffffb88d`56ec5080 ffffb88d`56ec5080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffffcd07`fedfc970 ffffc998`16138d20 : ffffb88d`56ec5080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffcd07`fedfcaa0 ffffc998`164a474d : ffffb88d`56ec5080 ffffb88d`56ec5080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffcd07`fedfcad0 fffff801`7f006bb8 : ffffb88d`00000005 00000000`00000005 000001f9`e6c04140 00000000`00000238 : win32k!NtUserCallNoParam+0x15
ffffcd07`fedfcb00 00007fff`746610e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000002e`659ffeb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`746610e4
SYMBOL_NAME: win32kfull!TimersProc+1e1
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffffcd07fedfbd20 ; kb
BUCKET_ID_FUNC_OFFSET: 1e1
FAILURE_BUCKET_ID: 0x3B_c0000005_win32kfull!TimersProc
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e19a4cac-ba4d-937b-93bc-07ff9528cd63}
Followup: MachineOwner
---------