SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff8005e715e58, Address of the instruction which caused the bugcheck
Arg3: ffffdf8ecb6dd640, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-I8FA0KP
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 15
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff8005e715e58
BUGCHECK_P3: ffffdf8ecb6dd640
BUGCHECK_P4: 0
CONTEXT: ffffdf8ecb6dd640 -- (.cxr 0xffffdf8ecb6dd640)
rax=ffffdf8ecb6de058 rbx=ffffdf8ecb6df278 rcx=0000000000000000
rdx=ffffdf8ecb6df278 rsi=ffffdf8ecb6de880 rdi=0000000000000000
rip=fffff8005e715e58 rsp=ffffdf8ecb6de030 rbp=ffffdf8ecb6de640
r8=ffffdf8ecb6de880 r9=ffffdf8ecb6de6c0 r10=00007ffffffeffff
r11=ffffdf8ecb6de0c8 r12=ffffdf8ecb6df3f0 r13=ffffdf8ecb6df038
r14=ffffdf8ecb6de6c0 r15=fffff8005eb3de3c
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246
nt!KeCheckStackAndTargetAddress+0x48:
fffff800`5e715e58 cc int 3
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: CaptureLibService.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffdf8e`cb6de030 fffff800`5e79b3d5 : 00000000`00040282 ffffdf8e`cb6df3f0 fffff800`61b2f09c ffffdf8e`cb6de650 : nt!KeCheckStackAndTargetAddress+0x48
ffffdf8e`cb6de060 fffff800`5e7c8aef : ffffdf8e`cb6df3f0 ffffdf8e`cb6de640 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0x45
ffffdf8e`cb6de0d0 fffff800`5e6c2df5 : 00000000`00000000 00000000`00000000 ffffdf8e`cb6de640 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
ffffdf8e`cb6de100 fffff800`5e6c738e : ffffdf8e`cb6df038 ffffdf8e`cb6ded80 ffffdf8e`cb6df038 ffff9b07`5d3d3048 : nt!RtlDispatchException+0x4a5
ffffdf8e`cb6de850 fffff800`5e7d1c1d : ffffaed7`6bb5d000 ffffdf8e`cb6df0e0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffdf8e`cb6def00 fffff800`5e7cde05 : ffff9b07`76f1a1a0 00000000`00000000 ffff9b07`5d3d4d60 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffdf8e`cb6df0e0 00000000`00000000 : fffff800`61ad477f 00000000`00000000 ffff9b07`5d3d3000 ffff9b07`5d3d3028 : nt!KiPageFault+0x445
SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+48
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.295
STACK_COMMAND: .cxr 0xffffdf8ecb6dd640 ; kb
BUCKET_ID_FUNC_OFFSET: 48
FAILURE_BUCKET_ID: 0x3B_80000003_nt!KeCheckStackAndTargetAddress
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3c8e413e-71c2-0077-9ab0-f2dd61308472}
Followup: MachineOwner