Jan 04 2023 06:37 PM
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Users\aaron02.lv\Desktop\Minidump\010523-11484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`06c00000 PsLoadedModuleList = 0xfffff806`0782a250
Debug session time: Thu Jan 5 09:24:44.646 2023 (UTC + 8:00)
System Uptime: 0 days 0:01:33.393
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`06ff88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb28d`f483cde0=000000000000003b
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80606e60180, Address of the instruction which caused the BugCheck
Arg3: ffffb28df483d6e0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 125408
Key : Analysis.IO.Other.Mb
Value: 30
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 39
Key : Analysis.Init.CPU.mSec
Value: 2156
Key : Analysis.Init.Elapsed.mSec
Value: 1061993
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 010523-11484-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80606e60180
BUGCHECK_P3: ffffb28df483d6e0
BUGCHECK_P4: 0
CONTEXT: ffffb28df483d6e0 -- (.cxr 0xffffb28df483d6e0)
rax=ffffa083eed11080 rbx=0fffcc0d53ca8870 rcx=0fffcc0d53ca8870
rdx=fffff80607581d38 rsi=fffff80607581d38 rdi=0fffcc0d53ca8800
rip=fffff80606e60180 rsp=ffffb28df483e0e0 rbp=ffffb28df483eb80
r8=0000000000000006 r9=7fffa083ec5dd4f8 r10=7ffffffffffffffc
r11=ffffb28df483e100 r12=0000000000000000 r13=0000000000000000
r14=0000021b5b921970 r15=ffffa083ec5dd0c0
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297
nt!SeSecurityAttributePresent+0x30:
fffff806`06e60180 488b7930 mov rdi,qword ptr [rcx+30h] ds:002b:0fffcc0d`53ca88a0=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WmiPrvSE.exe
STACK_TEXT:
ffffb28d`f483e0e0 fffff806`07222e7b : 0000021b`5b921970 0000021b`5b921970 ffffa083`ec5dd578 00000000`00000000 : nt!SeSecurityAttributePresent+0x30
ffffb28d`f483e120 fffff806`071fd0e7 : 00000000`00000000 00000000`00028000 00000000`00000040 00000000`00000000 : nt!ExpGetProcessInformation+0x20b
ffffb28d`f483e780 fffff806`071fc297 : 0000021b`5b90cf30 00000000`00002801 00000000`00000000 00000000`00000b52 : nt!ExpQuerySystemInformation+0xd07
ffffb28d`f483eac0 fffff806`0700a2b8 : ffffa083`eed10000 ffffa083`eeff5580 ffffb28d`f483eb80 ffffa083`00000000 : nt!NtQuerySystemInformation+0x37
ffffb28d`f483eb00 00007ffa`5cdad604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fc`447fce78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5cdad604
SYMBOL_NAME: nt!SeSecurityAttributePresent+30
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1889
STACK_COMMAND: .cxr 0xffffb28df483d6e0 ; kb
BUCKET_ID_FUNC_OFFSET: 30
FAILURE_BUCKET_ID: AV_nt!SeSecurityAttributePresent
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e7b84b7-f955-9324-40d2-33d6e3a087f4}
Followup: MachineOwner
---------