Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1728.18235\120920-7140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`08a00000 PsLoadedModuleList = 0xfffff803`0962a2b0
Debug session time: Wed Dec 9 20:56:49.922 2020 (UTC + 3:00)
System Uptime: 0 days 0:46:07.576
Loading Kernel Symbols
...............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`08d9d840 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff8a86`f20c6610=000000000000003b
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80308c848a7, Address of the instruction which caused the bugcheck
Arg3: ffff8a86f20c6f20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3312
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19997
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80308c848a7
BUGCHECK_P3: ffff8a86f20c6f20
BUGCHECK_P4: 0
CONTEXT: ffff8a86f20c6f20 -- (.cxr 0xffff8a86f20c6f20)
rax=0000000000000000 rbx=fffe8c08d90c9bb0 rcx=fffe8c08d90c9be0
rdx=000000007457624f rsi=fffe8c08d90c9be0 rdi=ffffffffffffffff
rip=fffff80308c848a7 rsp=ffff8a86f20c7920 rbp=ffff8a86f20c7a80
r8=0000000000000078 r9=ffff8a86f20c7748 r10=0000000000000000
r11=ffff8a86f20c7770 r12=000000babf7aeec0 r13=00000000bf7af100
r14=0000000000000601 r15=7fffffffffffffff
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!ObfDereferenceObjectWithTag+0x27:
fffff803`08c848a7 f0480fc13b lock xadd qword ptr [rbx],rdi ds:002b:fffe8c08`d90c9bb0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
STACK_TEXT:
ffff8a86`f20c7920 fffff803`08fe1a9c : 00000000`00000000 000000ba`bf7aed00 ffff8a86`f20c7901 000000ba`bf7ae900 : nt!ObfDereferenceObjectWithTag+0x27
ffff8a86`f20c7960 fffff803`08fe19e0 : ffff8c08`d677d080 000000ba`bf7aedf8 00000000`00000000 000000ba`bf7aeec0 : nt!ObWaitForSingleObject+0xac
ffff8a86`f20c79c0 fffff803`08daf175 : 00000259`00000000 ffff8c08`00000001 ffff8a86`f20c7a18 ffffffff`ffb673e0 : nt!NtWaitForSingleObject+0x60
ffff8a86`f20c7a00 00007ffc`0b50ae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ba`bf7aedc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0b50ae54
SYMBOL_NAME: nt!ObfDereferenceObjectWithTag+27
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1
STACK_COMMAND: .cxr 0xffff8a86f20c6f20 ; kb
BUCKET_ID_FUNC_OFFSET: 27
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObfDereferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7ebf58a2-0210-7815-d6f6-0e4124026922}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1728.25960\121020-6734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`56800000 PsLoadedModuleList = 0xfffff803`5742a2b0
Debug session time: Thu Dec 10 23:21:46.802 2020 (UTC + 3:00)
System Uptime: 0 days 7:09:20.451
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`56bf5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8a0b`3155df00=000000000000003b
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80356e2b7ab, Address of the instruction which caused the bugcheck
Arg3: ffff8a0b3155e800, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5499
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 55658
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80356e2b7ab
BUGCHECK_P3: ffff8a0b3155e800
BUGCHECK_P4: 0
CONTEXT: ffff8a0b3155e800 -- (.cxr 0xffff8a0b3155e800)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc60e78325080
rdx=ffff8d0092520ec0 rsi=ffdf8d00926fcdf0 rdi=ffff8d0092520ec0
rip=fffff80356e2b7ab rsp=ffff8a0b3155f200 rbp=ffff8a0b3155f320
r8=ffff8a0b3155f210 r9=0000000000000000 r10=7ffffffffffffffc
r11=ffff8a0b3155f1e0 r12=0000000000000001 r13=ffffc60e78325080
r14=ffff8a0b3155f720 r15=0000000000000007
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!ObpCreateHandle+0x3fb:
fffff803`56e2b7ab 488b4608 mov rax,qword ptr [rsi+8] ds:002b:ffdf8d00`926fcdf8=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
STACK_TEXT:
ffff8a0b`3155f200 fffff803`56de0f69 : ffff8a0b`3155f720 ffffc60e`78325080 00000000`00000000 00000000`00000000 : nt!ObpCreateHandle+0x3fb
ffff8a0b`3155f3f0 fffff803`56de1557 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByPointer+0x1b9
ffff8a0b`3155f670 fffff803`56de0343 : ffffadf4`2aa9f373 0000004f`001fffff 0000004f`51d8c620 00000000`00000000 : nt!PsOpenThread+0x213
ffff8a0b`3155f9c0 fffff803`56c071b5 : ffffc60e`78320000 ffffc60e`78325080 00000205`86447890 ffffffff`feced300 : nt!NtOpenThread+0x23
ffff8a0b`3155fa00 00000205`8636d974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004f`51d8c098 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000205`8636d974
SYMBOL_NAME: nt!ObpCreateHandle+3fb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .cxr 0xffff8a0b3155e800 ; kb
BUCKET_ID_FUNC_OFFSET: 3fb
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpCreateHandle
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dcd9630c-1938-35ea-221a-7b842c7aa859}
Followup: MachineOwner
---------