Microsoft (R) Windows Debugger Version 10.0.20348.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\minidump\090421-11687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff804`5c600000 PsLoadedModuleList = 0xfffff804`5ca48210
Debug session time: Sat Sep 4 21:19:30.408 2021 (UTC + 8:00)
System Uptime: 0 days 0:07:56.215
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8045cbd9c8c, Address of the instruction which caused the bugcheck
Arg3: ffff8001b1b8ef30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on PC-202108252353
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3653
Key : Analysis.Init.CPU.mSec
Value: 4937
Key : Analysis.Init.Elapsed.mSec
Value: 67128
Key : Analysis.Memory.CommitPeak.Mb
Value: 111
Key : Analysis.System
Value: CreateObject
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
Key : Dump.Attributes.RequiredDumpfileSize
Value: 0x4c5ef1f4
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8045cbd9c8c
BUGCHECK_P3: ffff8001b1b8ef30
BUGCHECK_P4: 0
CONTEXT: ffff8001b1b8ef30 -- (.cxr 0xffff8001b1b8ef30)
rax=00000000000011bc rbx=0000000000000000 rcx=0000000005eae398
rdx=0000000000000005 rsi=0000000005eae318 rdi=ffff8001b1b8f9a8
rip=fffff8045cbd9c8c rsp=ffff8001b1b8f920 rbp=ffff8001b1b8fa80
r8=0000000000000000 r9=0000000000000000 r10=0000000011000000
r11=0000000000000000 r12=0000000011000000 r13=00000000000011bc
r14=0000000000000000 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!NtCreateSection+0x3c:
fffff804`5cbd9c8c 44895c2440 mov dword ptr [rsp+40h],r11d ss:0018:ffff8001`b1b8f960=05eae398
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: QQPCRTP.exe
STACK_TEXT:
ffff8001`b1b8f920 fffff804`5c7d304e : ffffd586`484c7080 fffff804`5c930f10 00000000`00000000 ffff8001`b1b8fa80 : nt!NtCreateSection+0x3c
ffff8001`b1b8f990 00007ffc`ca77ca04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
00000000`05eae2f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`ca77ca04
SYMBOL_NAME: nt!NtCreateSection+3c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .cxr 0xffff8001b1b8ef30 ; kb
BUCKET_ID_FUNC_OFFSET: 3c
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!NtCreateSection
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {85b90594-6ef6-7bd9-76fd-7c626cf5f7d4}
Followup: MachineOwner
---------
6: kd>
Implicit thread is now ffffd586`484c7080
6: kd>
Implicit thread is now ffffd586`484c7080
6: kd>
Implicit thread is now ffffd586`484c7080
6: kd>
Implicit thread is now ffffd586`484c7080
6: kd>
Implicit thread is now ffffd586`484c7080
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\minidump\090421-11687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff804`5c600000 PsLoadedModuleList = 0xfffff804`5ca48210
Debug session time: Sat Sep 4 21:19:30.408 2021 (UTC + 8:00)
System Uptime: 0 days 0:07:56.215
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8045cbd9c8c, Address of the instruction which caused the bugcheck
Arg3: ffff8001b1b8ef30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on PC-202108252353
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3653
Key : Analysis.Init.CPU.mSec
Value: 4937
Key : Analysis.Init.Elapsed.mSec
Value: 67128
Key : Analysis.Memory.CommitPeak.Mb
Value: 111
Key : Analysis.System
Value: CreateObject
Key : Dump.Attributes.InsufficientDumpfileSize
Value: 1
Key : Dump.Attributes.RequiredDumpfileSize
Value: 0x4c5ef1f4
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0xc
Insufficient Dumpfile Size
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8045cbd9c8c
BUGCHECK_P3: ffff8001b1b8ef30
BUGCHECK_P4: 0
CONTEXT: ffff8001b1b8ef30 -- (.cxr 0xffff8001b1b8ef30)
rax=00000000000011bc rbx=0000000000000000 rcx=0000000005eae398
rdx=0000000000000005 rsi=0000000005eae318 rdi=ffff8001b1b8f9a8
rip=fffff8045cbd9c8c rsp=ffff8001b1b8f920 rbp=ffff8001b1b8fa80
r8=0000000000000000 r9=0000000000000000 r10=0000000011000000
r11=0000000000000000 r12=0000000011000000 r13=00000000000011bc
r14=0000000000000000 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!NtCreateSection+0x3c:
fffff804`5cbd9c8c 44895c2440 mov dword ptr [rsp+40h],r11d ss:0018:ffff8001`b1b8f960=05eae398
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: QQPCRTP.exe
STACK_TEXT:
ffff8001`b1b8f920 fffff804`5c7d304e : ffffd586`484c7080 fffff804`5c930f10 00000000`00000000 ffff8001`b1b8fa80 : nt!NtCreateSection+0x3c
ffff8001`b1b8f990 00007ffc`ca77ca04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2b9
00000000`05eae2f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`ca77ca04
SYMBOL_NAME: nt!NtCreateSection+3c
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .cxr 0xffff8001b1b8ef30 ; kb
BUCKET_ID_FUNC_OFFSET: 3c
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!NtCreateSection
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {85b90594-6ef6-7bd9-76fd-7c626cf5f7d4}
Followup: MachineOwner
---------
6: kd>
Implicit thread is now ffffd586`484c7080
6: kd>
Implicit thread is now ffffd586`484c7080
6: kd>
Implicit thread is now ffffd586`484c7080
6: kd>
Implicit thread is now ffffd586`484c7080
6: kd>
Implicit thread is now ffffd586`484c7080