Win10 21H2 Frequent blue screen

Copper Contributor


Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\Users\aaron02.lv\Desktop\Minidump\010523-11484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`06c00000 PsLoadedModuleList = 0xfffff806`0782a250
Debug session time: Thu Jan 5 09:24:44.646 2023 (UTC + 8:00)
System Uptime: 0 days 0:01:33.393
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`06ff88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb28d`f483cde0=000000000000003b
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80606e60180, Address of the instruction which caused the BugCheck
Arg3: ffffb28df483d6e0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9468

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 125408

Key : Analysis.IO.Other.Mb
Value: 30

Key : Analysis.IO.Read.Mb
Value: 1

Key : Analysis.IO.Write.Mb
Value: 39

Key : Analysis.Init.CPU.mSec
Value: 2156

Key : Analysis.Init.Elapsed.mSec
Value: 1061993

Key : Analysis.Memory.CommitPeak.Mb
Value: 98

Key : Bugcheck.Code.DumpHeader
Value: 0x3b

Key : Bugcheck.Code.Register
Value: 0x3b

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 010523-11484-01.dmp

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80606e60180

BUGCHECK_P3: ffffb28df483d6e0

BUGCHECK_P4: 0

CONTEXT: ffffb28df483d6e0 -- (.cxr 0xffffb28df483d6e0)
rax=ffffa083eed11080 rbx=0fffcc0d53ca8870 rcx=0fffcc0d53ca8870
rdx=fffff80607581d38 rsi=fffff80607581d38 rdi=0fffcc0d53ca8800
rip=fffff80606e60180 rsp=ffffb28df483e0e0 rbp=ffffb28df483eb80
r8=0000000000000006 r9=7fffa083ec5dd4f8 r10=7ffffffffffffffc
r11=ffffb28df483e100 r12=0000000000000000 r13=0000000000000000
r14=0000021b5b921970 r15=ffffa083ec5dd0c0
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297
nt!SeSecurityAttributePresent+0x30:
fffff806`06e60180 488b7930 mov rdi,qword ptr [rcx+30h] ds:002b:0fffcc0d`53ca88a0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WmiPrvSE.exe

STACK_TEXT:
ffffb28d`f483e0e0 fffff806`07222e7b : 0000021b`5b921970 0000021b`5b921970 ffffa083`ec5dd578 00000000`00000000 : nt!SeSecurityAttributePresent+0x30
ffffb28d`f483e120 fffff806`071fd0e7 : 00000000`00000000 00000000`00028000 00000000`00000040 00000000`00000000 : nt!ExpGetProcessInformation+0x20b
ffffb28d`f483e780 fffff806`071fc297 : 0000021b`5b90cf30 00000000`00002801 00000000`00000000 00000000`00000b52 : nt!ExpQuerySystemInformation+0xd07
ffffb28d`f483eac0 fffff806`0700a2b8 : ffffa083`eed10000 ffffa083`eeff5580 ffffb28d`f483eb80 ffffa083`00000000 : nt!NtQuerySystemInformation+0x37
ffffb28d`f483eb00 00007ffa`5cdad604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fc`447fce78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5cdad604


SYMBOL_NAME: nt!SeSecurityAttributePresent+30

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1889

STACK_COMMAND: .cxr 0xffffb28df483d6e0 ; kb

BUCKET_ID_FUNC_OFFSET: 30

FAILURE_BUCKET_ID: AV_nt!SeSecurityAttributePresent

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {7e7b84b7-f955-9324-40d2-33d6e3a087f4}

Followup: MachineOwner
---------

 

0 Replies