SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8005568d518, Address of the instruction which caused the bugcheck
Arg3: fffff58c32796390, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8005568d518
BUGCHECK_P3: fffff58c32796390
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!HvpGetCellPaged+68
fffff800`5568d518 488b4808 mov rcx,qword ptr [rax+8]
CONTEXT: fffff58c32796390 -- (.cxr 0xfffff58c32796390)
rax=00000000ffffffff rbx=fffff58c32796de0 rcx=0000000000000000
rdx=0000000000200074 rsi=000000000000bffe rdi=ffffd005bc3a0000
rip=fffff8005568d518 rsp=fffff58c32796d88 rbp=ffffd005bc3a0000
r8=ffffd005bc3a0120 r9=0000000000000001 r10=0000000000000074
r11=0000000000000074 r12=0000000000007fff r13=000000000000fffe
r14=0000022f8c2b756c r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!HvpGetCellPaged+0x68:
fffff800`5568d518 488b4808 mov rcx,qword ptr [rax+8] ds:002b:00000001`00000007=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 4
CPU_MHZ: e70
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Registry
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-04-2019 21:21:52.0612
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80055628caf to fffff8005568d518
STACK_TEXT:
fffff58c`32796d88 fffff800`55628caf : 0000022f`8c2e7564 fffff58c`32797110 00000000`00007fff fffff58c`32796eac : nt!HvpGetCellPaged+0x68
fffff58c`32796d90 fffff800`557bcb88 : 00000000`ffffffff 0000022f`8c2d7568 00000000`00007fff 0000022f`8c2b756c : nt!CmpDoCompareKeyName+0x2f
fffff58c`32796de0 fffff800`5562745b : ffffd005`bc3a0000 00000000`09c11548 fffff58c`32797110 fffff58c`32796eac : nt!CmpFindSubKeyInLeafWithStatus+0x194ab8
fffff58c`32796e50 fffff800`555f1b93 : ffffd005`c260d800 fffff58c`327970c0 fffff58c`32797040 fffff58c`327970c0 : nt!CmpWalkOneLevel+0x5bb
fffff58c`32796f60 fffff800`555ef0e4 : fffff58c`0000001c fffff58c`327972a0 fffff58c`32797268 00000000`00000000 : nt!CmpDoParseKey+0x513
fffff58c`327971f0 fffff800`555ecfcf : ffffbf0f`686f1a10 ffffd005`c022c601 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x274
fffff58c`32797410 fffff800`555eb431 : ffffbf0f`686f1a00 fffff58c`32797658 00000000`00000040 ffffbf0f`5e115c40 : nt!ObpLookupObjectName+0x78f
fffff58c`327975d0 fffff800`555f3f1c : 00000000`00000001 00000000`00000000 00000000`00000000 ffffbf0f`5e115c40 : nt!ObOpenObjectByNameEx+0x201
fffff58c`32797710 fffff800`555f3d9d : 00000028`c93fdb30 fffff58c`32797a80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
fffff58c`32797760 fffff800`555f5dbf : 00000000`00000000 00000028`c93fe180 00000000`00000000 00000000`00000b00 : nt!CmOpenKey+0x29d
fffff58c`327979c0 fffff800`551d2b15 : ffffbf0f`67671080 00000028`c93fdaa8 00000028`c93fe160 00000000`00000000 : nt!NtOpenKeyEx+0xf
fffff58c`32797a00 00007ffc`4f2de414 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000028`c93fda58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`4f2de414
THREAD_SHA1_HASH_MOD_FUNC: 6e69a65336ebb4bee37ec11de0822870739eddb2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2df7ae941a9af898944bbc71d84c95e52923a810
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!HvpGetCellPaged+68
fffff800`5568d518 488b4808 mov rcx,qword ptr [rax+8]
FAULT_INSTR_CODE: 8488b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!HvpGetCellPaged+68
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .cxr 0xfffff58c32796390 ; kb
BUCKET_ID_FUNC_OFFSET: 68
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!HvpGetCellPaged
BUCKET_ID: 0x3B_c0000005_nt!HvpGetCellPaged
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!HvpGetCellPaged
TARGET_TIME: 2019-11-05T18:02:37.000Z
OSBUILD: 18362
OSSERVICEPACK: 418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6e69
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!hvpgetcellpaged
FAILURE_ID_HASH: {32f4db97-5bc1-37be-caf3-746cdc554a0b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80407005e0e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80407005e0e
WORKER_ROUTINE:
+0
00000000`00000001 ?? ???
WORK_ITEM: fffff80407005e0e
CURRENT_IRQL: 2
CPU_COUNT: 4
CPU_MHZ: e70
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-04-2019 21:21:55.0112
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffe80b5465f600 -- (.trap 0xffffe80b5465f600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe80b5465f858
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80407005e0e rsp=ffffe80b5465f790 rbp=ffffe80b5465fa80
r8=0000000000000000 r9=0000000100000032 r10=fffff80405a63180
r11=ffffbe8dad564080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0xe:
fffff804`07005e0e 48890a mov qword ptr [rdx],rcx ds:00000000`00000001=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804071d30e9 to fffff804071c1220
STACK_TEXT:
ffffe80b`5465f4b8 fffff804`071d30e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe80b`5465f4c0 fffff804`071cf42b : 00000000`00000000 ffffbe8d`b6af0080 ffffbe8d`b66be080 fffff804`0703f4be : nt!KiBugCheckDispatch+0x69
ffffe80b`5465f600 fffff804`07005e0e : 00000000`00000000 fffff804`075f0dee ffff315d`d637962b fffff804`00000002 : nt!KiPageFault+0x46b
ffffe80b`5465f790 fffff804`0703ee7d : 00000000`00000000 ffffe80b`5465f8c0 ffffbe8d`ad5799f0 00000000`00000001 : nt!KxWaitForLockOwnerShip+0xe
ffffe80b`5465f7c0 fffff804`0703ecac : 00000000`00000000 ffffbe8d`b45fbb60 00000000`00000000 ffffbe8d`b49d8c60 : nt!KeAcquireInStackQueuedSpinLock+0x7d
ffffe80b`5465f7f0 fffff804`071d2b15 : ffffbe8d`00000000 ffffe80b`00000001 00000000`00000000 ffffe80b`5465fa80 : nt!NtWaitForWorkViaWorkerFactory+0x27c
ffffe80b`5465f990 00007ff9`97affa54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000096`6387f9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`97affa54
THREAD_SHA1_HASH_MOD_FUNC: a21ea209f3ae0ae2983504b0967b1608b69e7b7f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0a3db961d91de27562cec1b447abc4dce592d523
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!KiPageFault+46b
fffff804`071cf42b 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+46b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.418
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46b
FAILURE_BUCKET_ID: AV_nt!KiPageFault
BUCKET_ID: AV_nt!KiPageFault
PRIMARY_PROBLEM_CLASS: AV_nt!KiPageFault
TARGET_TIME: 2019-11-05T18:18:05.000Z
OSBUILD: 18362
OSSERVICEPACK: 418
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4315
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kipagefault
FAILURE_ID_HASH: {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}
Followup: MachineOwner
---------