SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80151dfc72e, Address of the instruction which caused the bugcheck
Arg3: ffffd000238525d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-R1MKTM3
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 62
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80151dfc72e
BUGCHECK_P3: ffffd000238525d0
BUGCHECK_P4: 0
CONTEXT: ffffd000238525d0 -- (.cxr 0xffffd000238525d0)
rax=000000000000000f rbx=0000000000000000 rcx=00000000000006c6
rdx=0000000023bf31da rsi=ffffd000238535f0 rdi=0000000000000008
rip=fffff80151dfc72e rsp=ffffd00023853000 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000021 r10=000000000000fffe
r11=ff00c001346f5a80 r12=ffffc0012ff5f008 r13=ffffc0012b6c7000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!CmpKcbCacheLookup+0x1be:
fffff801`51dfc72e 418b43f4 mov eax,dword ptr [r11-0Ch] ds:002b:ff00c001`346f5a74=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: consent.exe
STACK_TEXT:
ffffd000`23853000 fffff801`51dfd992 : ffffd000`238535f0 ffffd000`23853250 00000000`00000000 00000000`00000001 : nt!CmpKcbCacheLookup+0x1be
ffffd000`238530d0 fffff801`51e01030 : 00000000`ffffffff ffffd000`23853440 00000000`036bd440 ffffe001`349b8b10 : nt!CmpBuildHashStackAndLookupCache+0x822
ffffd000`23853330 fffff801`51df9c39 : 00000000`00000001 00000000`00000001 ffffc001`338bd6a4 ffffd000`23853760 : nt!CmpParseKey+0x320
ffffd000`23853660 fffff801`51df7a63 : 00000000`0000028c ffffd000`23853858 ffffe001`00000040 ffffe001`2d238b30 : nt!ObpLookupObjectName+0x6b9
ffffd000`238537e0 fffff801`51df71c4 : 00000000`00000001 000000f2`b41be088 000000f2`b41be020 00000000`00020019 : nt!ObOpenObjectByName+0x1e3
ffffd000`23853910 fffff801`51df560b : ffff9ac0`8db66b55 00000000`0000017e 00000000`00000000 00000000`00000019 : nt!CmOpenKey+0x2a4
ffffd000`23853ac0 fffff801`51b6a1b3 : 00000000`00000001 00000000`00000001 00000000`00000001 00000000`00000536 : nt!NtOpenKeyEx+0xf
ffffd000`23853b00 00007ffa`45fc1cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000f2`b41bdfc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`45fc1cca
SYMBOL_NAME: nt!CmpKcbCacheLookup+1be
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .cxr 0xffffd000238525d0 ; kb
BUCKET_ID_FUNC_OFFSET: 1be
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!CmpKcbCacheLookup
OS_VERSION: 8.1.9600.17415
BUILDLAB_STR: winblue_r4
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {3a0e16be-b09b-5333-66f2-cbaf2c0f7436}
Followup: MachineOwner
---------