SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80001252a6f, Address of the instruction which caused the bugcheck Arg3: fffffadf87564260, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero.
Debugging Details: ------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
FAULTING_IP: nt!ObpDeleteNameCheck+f1 fffff800`01252a6f f0480fba2900 lock bts qword ptr [rcx],0
CONTEXT: fffffadf87564260 -- (.cxr 0xfffffadf87564260) rax=fffffadf9c08c040 rbx=fffffa8003f244f0 rcx=2020655302080531 rdx=0000000000140000 rsi=2020655302080409 rdi=fffffa8003f24580 rip=fffff80001252a6f rsp=fffffadf87564a70 rbp=fffffa8003f24590 r8=fffffadf9c08c040 r9=0000000000000000 r10=fffffa800041e320 r11=fffffadf9c08c040 r12=fffffadf9ca22860 r13=fffffa8003f245b0 r14=0000000000000000 r15=fffffa8003f245b0 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 nt!ObpDeleteNameCheck+0xf1: fffff800`01252a6f f0480fba2900 lock bts qword ptr [rcx],0 ds:002b:20206553`02080531=???????????????? Resetting default scope
CUSTOMER_CRASH_COUNT: 0
DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: MonitoringHost.
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80001287e27 to fffff80001252a6f
STACK_TEXT: fffffadf`87564a70 fffff800`01287e27 : fffffa80`02e98900 fffffadf`997bc040 fffffadf`9ca22860 00000000`00000000 : nt!ObpDeleteNameCheck+0xf1 fffffadf`87564af0 fffff800`01287f2e : fffffa80`02e98900 00000000`00004a40 fffffa80`0041e320 00000000`00000000 : nt!ObpDecrementHandleCount+0x17d fffffadf`87564b50 fffff800`01284af4 : 00000000`00000000 00000000`00004a40 fffffadf`997bc040 fffffadf`9c08c040 : nt!ObpCloseHandleTableEntry+0x242 fffffadf`87564bf0 fffff800`0102e33d : fffffadf`9c08c040 fffffadf`87564cf0 00000000`0030b320 00000000`00000000 : nt!ObpCloseHandle+0xb0 fffffadf`87564c70 00000000`77ef0aea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x3 00000000`0182fe28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77ef0aea
FOLLOWUP_IP: nt!ObpDeleteNameCheck+f1 fffff800`01252a6f f0480fba2900 lock bts qword ptr [rcx],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObpDeleteNameCheck+f1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b7abd06
STACK_COMMAND: .cxr 0xfffffadf87564260 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObpDeleteNameCheck+f1
BUCKET_ID: X64_0x3B_nt!ObpDeleteNameCheck+f1
Followup: MachineOwner ---------
0: kd> .cxr 0xfffffadf87564260 rax=fffffadf9c08c040 rbx=fffffa8003f244f0 rcx=2020655302080531 rdx=0000000000140000 rsi=2020655302080409 rdi=fffffa8003f24580 rip=fffff80001252a6f rsp=fffffadf87564a70 rbp=fffffa8003f24590 r8=fffffadf9c08c040 r9=0000000000000000 r10=fffffa800041e320 r11=fffffadf9c08c040 r12=fffffadf9ca22860 r13=fffffa8003f245b0 r14=0000000000000000 r15=fffffa8003f245b0 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 nt!ObpDeleteNameCheck+0xf1: fffff800`01252a6f f0480fba2900 lock bts qword ptr [rcx],0 ds:002b:20206553`02080531=????????????????
|