Code: Select all
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8033ba250e0, Address of the instruction which caused the BugCheck
Arg3: ffffbd0922cae0c0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1585
Key : Analysis.Init.CPU.mSec
Value: 2499
Key : Analysis.Init.Elapsed.mSec
Value: 46352
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : Dump.Attributes.AsUlong
Value: c
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.RequiredDumpfileSize
Value: 0x5944aa2ef
FILE_IN_CAB: 092622-11015-01.dmp
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8033ba250e0
BUGCHECK_P3: ffffbd0922cae0c0
BUGCHECK_P4: 0
CONTEXT: ffffbd0922cae0c0 -- (.cxr 0xffffbd0922cae0c0)
rax=39ffad0996842888 rbx=39ffad0996842888 rcx=0000000000760000
rdx=0000000000760000 rsi=000000000000008a rdi=ffffad0996847880
rip=fffff8033ba250e0 rsp=ffffbd0922caeac0 rbp=ffffbd0922caeb38
r8=32308a3460d98bf9 r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000e78 r13=ffffad0996846000
r14=ffffad07f1e00280 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!RtlpHpVsChunkSplit+0x590:
fffff803`3ba250e0 8b4bf8 mov ecx,dword ptr [rbx-8] ds:002b:39ffad09`96842880=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: TOTALCMD64.EXE
STACK_TEXT:
ffffbd09`22caeac0 fffff803`3ba2497a : 0001008a`00000e78 ffffad09`96846fe0 ffffd501`00000e78 fffff803`00000000 : nt!RtlpHpVsChunkSplit+0x590
ffffbd09`22caeb80 fffff803`3ba27ef8 : 00000000`00000000 fffff803`00000880 ffffbd09`22caecc1 00000000`00000880 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffbd09`22caebe0 fffff803`3ba2763f : ffffd501`00000000 00000000`00000005 00000000`74536d4d ffffbd09`0000a885 : nt!ExAllocateHeapPool+0x888
ffffbd09`22caed20 fffff803`3bac9e66 : 00000000`80000000 00000000`00000800 00000000`74536d4d fffff803`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffbd09`22caed70 fffff803`3baf7763 : 00000000`00000000 ffffbd09`22caee30 00000000`00000100 ffffd501`00000000 : nt!MiAllocatePool+0x86
ffffbd09`22caedc0 fffff803`3bacb002 : ffffffff`ffffffff ffffffff`ffffffff ffffd501`74b44b10 fffff803`00000000 : nt!MiCreatePrototypePtes+0x53
ffffbd09`22caee70 fffff803`3ba574b4 : 00000000`00000001 00000000`00000040 00000000`00000000 ffffad07`00000100 : nt!MiAddViewsForSection+0x3c2
ffffbd09`22caef70 fffff803`3ba5897e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmMapViewInSystemCache+0xc4
ffffbd09`22caf0f0 fffff803`3bab0d5a : 00000000`00000000 fffff803`00000000 00000000`00000000 ffffd501`00000000 : nt!CcGetVacbMiss+0xce
ffffbd09`22caf180 fffff803`3badef48 : 00000000`00000000 00000000`00000000 ffffbd09`22caf290 ffffbd09`22caf274 : nt!CcGetVirtualAddress+0x33a
ffffbd09`22caf220 fffff803`3bade1da : ffffd501`21a96050 00000000`1a146040 ffffbd09`22caf418 00000000`00001704 : nt!CcMapAndCopyInToCache+0x2f8
ffffbd09`22caf3c0 fffff803`3e61f4ed : 00000000`00000000 ffffbd09`22caf6c0 ffffd501`128f0048 00000000`00000000 : nt!CcCopyWriteEx+0xea
ffffbd09`22caf440 fffff803`3e61b103 : ffffd501`128f0048 ffffd501`24ed7ba0 ffffbd09`22caf700 00000000`00000000 : Ntfs!NtfsCommonWrite+0x3f7d
ffffbd09`22caf690 fffff803`3ba2a6b5 : ffffd501`1e8150a0 ffffd501`24ed7ba0 ffffd501`24ed7ba0 ffffd501`0f67cd20 : Ntfs!NtfsFsdWrite+0x1d3
ffffbd09`22caf760 fffff803`383e70cf : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffbd09`22caf7a0 fffff803`383e4a03 : ffffbd09`22caf830 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltIsCallbackDataDirty+0x42f
ffffbd09`22caf810 fffff803`3ba2a6b5 : ffffd501`24ed7ba0 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltDecodeParameters+0x683
ffffbd09`22caf870 fffff803`3be14848 : 00000000`00000001 ffffd501`74b134e0 00000000`00000001 ffffd501`24ed7f88 : nt!IofCallDriver+0x55
ffffbd09`22caf8b0 fffff803`3bded7ef : ffffd501`00000000 ffffbd09`22cafb40 00000000`00000000 ffffbd09`22cafb40 : nt!IopSynchronousServiceTail+0x1a8
ffffbd09`22caf950 fffff803`3bc0aab8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x66f
ffffbd09`22cafa50 00007fff`80b6d284 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`01dc7218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`80b6d284
SYMBOL_NAME: nt!RtlpHpVsChunkSplit+590
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2075
STACK_COMMAND: .cxr 0xffffbd0922cae0c0 ; kb
BUCKET_ID_FUNC_OFFSET: 590
FAILURE_BUCKET_ID: AV_nt!RtlpHpVsChunkSplit
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ca555611-f3f8-03bc-0392-475d779c0672}
Followup: MachineOwner