SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80349835932, Address of the instruction which caused the bugcheck
Arg3: fffffc0256e52570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4950
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80349835932
BUGCHECK_P3: fffffc0256e52570
BUGCHECK_P4: 0
CONTEXT: fffffc0256e52570 -- (.cxr 0xfffffc0256e52570)
rax=0000000000000000 rbx=fffffc0256e52fd0 rcx=0000000000000007
rdx=000000000230b5e8 rsi=0000000000000382 rdi=ffffb5099c955000
rip=fffff80349835932 rsp=fffffc0256e52f78 rbp=ffffb5099c955000
r8=000000000000001c r9=ffffd98ff249c080 r10=000001e9eb89c5e8
r11=00000000000005e8 r12=00000000ce4cf905 r13=fffffc0256e53230
r14=0000000000000382 r15=000001e9eb7b0024
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!HvpGetCellPaged+0xa2:
fffff803`49835932 418b02 mov eax,dword ptr [r10] ds:002b:000001e9`eb89c5e8=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
fffffc02`56e52f78 fffff803`498c57bf : 00000000`7f147a21 fffffc02`56e532f0 ffffd98f`f249c080 ffffb509`9cf587c0 : nt!HvpGetCellPaged+0xa2
fffffc02`56e52f80 fffff803`498cb5e5 : 00000001`ffffffff 00000000`ce4cf905 00000000`00000000 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
fffffc02`56e52fd0 fffff803`498ce729 : ffffb509`b0be05e0 00000000`00000006 fffffc02`56e531d0 fffffc02`56e53250 : nt!CmpWalkOneLevel+0x6f5
fffffc02`56e530d0 fffff803`498cd013 : 00000000`0000001c fffffc02`56e53420 fffffc02`56e533d8 ffffd98f`f33284e0 : nt!CmpDoParseKey+0x849
fffffc02`56e53370 fffff803`498d10de : fffff803`498ccd01 00000000`00000000 ffffd98f`f33284e0 ffffd98f`f478c701 : nt!CmpParseKey+0x2c3
fffffc02`56e53510 fffff803`498da39a : ffffd98f`f3328400 fffffc02`56e53778 00000000`00000040 ffffd98f`db4dc820 : nt!ObpLookupObjectName+0x3fe
fffffc02`56e536e0 fffff803`498da17c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd98f`db4dc820 : nt!ObOpenObjectByNameEx+0x1fa
fffffc02`56e53810 fffff803`498d9ca1 : 0000006f`66e7e438 fffffc02`56e53b80 00000000`00000001 fffff803`494617be : nt!ObOpenObjectByName+0x5c
fffffc02`56e53860 fffff803`498d99cf : 00000000`00000000 fffff803`4989928c ffffd98f`f249c080 0000021f`f3d60000 : nt!CmOpenKey+0x2c1
fffffc02`56e53ac0 fffff803`496058b8 : 0000021f`00000000 00000000`00000001 fffffc02`56e53b80 0000021f`f4c17ce0 : nt!NtOpenKeyEx+0xf
fffffc02`56e53b00 00007fff`a87ae1b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006f`66e7e358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a87ae1b4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xfffffc0256e52570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80627435932, Address of the instruction which caused the bugcheck
Arg3: ffffca05c190f570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5510
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80627435932
BUGCHECK_P3: ffffca05c190f570
BUGCHECK_P4: 0
CONTEXT: ffffca05c190f570 -- (.cxr 0xffffca05c190f570)
rax=0000000000000000 rbx=ffffca05c190ffd0 rcx=0000000000000007
rdx=0000000001b0e418 rsi=0000000000000382 rdi=ffffb7870f152000
rip=fffff80627435932 rsp=ffffca05c190ff78 rbp=ffffb7870f152000
r8=000000000000001c r9=ffffcb0b4e2b4080 r10=0000022279f2f418
r11=0000000000000418 r12=00000000ce4cf905 r13=ffffca05c1910230
r14=0000000000000382 r15=0000022279e42024
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!HvpGetCellPaged+0xa2:
fffff806`27435932 418b02 mov eax,dword ptr [r10] ds:002b:00000222`79f2f418=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffca05`c190ff78 fffff806`274c57bf : 00000000`7f147a21 ffffca05`c19102f0 00000000`00000000 ffffb787`2772fb50 : nt!HvpGetCellPaged+0xa2
ffffca05`c190ff80 fffff806`274cb5e5 : 00000001`ffffffff 00000000`ce4cf905 ffffca05`c19109e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffca05`c190ffd0 fffff806`274ce729 : ffffb787`2772fb50 00000000`00000006 ffffca05`c19101d0 ffffca05`c1910250 : nt!CmpWalkOneLevel+0x6f5
ffffca05`c19100d0 fffff806`274cd013 : 00000000`0000001c ffffca05`c1910420 ffffca05`c19103d8 ffffcb0b`59f11a90 : nt!CmpDoParseKey+0x849
ffffca05`c1910370 fffff806`274d10de : fffff806`274ccd01 00000000`00000000 ffffcb0b`59f11a90 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffca05`c1910510 fffff806`274da39a : ffffcb0b`59f11a00 ffffca05`c1910778 00000000`00000040 ffffcb0b`3d0fbbc0 : nt!ObpLookupObjectName+0x3fe
ffffca05`c19106e0 fffff806`274da17c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcb0b`3d0fbbc0 : nt!ObOpenObjectByNameEx+0x1fa
ffffca05`c1910810 fffff806`274d9ca1 : 00000016`f497e7d8 ffffca05`c1910b80 00000000`00000001 fffff806`270617be : nt!ObOpenObjectByName+0x5c
ffffca05`c1910860 fffff806`274d99cf : 00000000`00000000 fffff806`2710f47e ffffcb0b`4e2b4080 ffffca05`c1910a88 : nt!CmOpenKey+0x2c1
ffffca05`c1910ac0 fffff806`272058b8 : 00000016`00000000 00000000`00000001 ffffca05`c1910b80 00000155`845431a0 : nt!NtOpenKeyEx+0xf
ffffca05`c1910b00 00007ffd`2c6ee1b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000016`f497e6f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`2c6ee1b4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xffffca05c190f570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffac05b452c240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4282
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffac05b452c240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: csrss.exe
CRITICAL_PROCESS: csrss.exe
EXCEPTION_RECORD: 0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000
ERROR_CODE: (NTSTATUS) 0xa6686080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffcc0a`37747d88 fffff801`2af081c2 : 00000000`000000ef ffffac05`b452c240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffcc0a`37747d90 fffff801`2ae3a90b : 00000000`00000001 fffff801`2a80d6fd 00000000`00000002 fffff801`2a80bc9b : nt!PspCatchCriticalBreak+0x10e
ffffcc0a`37747e30 fffff801`2abf4070 : ffffac05`00000000 00000000`00000000 ffffac05`b452c240 ffffac05`b452c678 : nt!PspTerminateAllThreads+0x151faf
ffffcc0a`37747ea0 fffff801`2abf3e6c : ffffac05`b452c240 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffcc0a`37747ee0 fffff801`2aa058b8 : ffffac05`b452c240 ffffac05`a6686080 ffffcc0a`37747fd0 fffff801`2ad16052 : nt!NtTerminateProcess+0x9c
ffffcc0a`37747f50 fffff801`2a9f7d00 : fffff801`2aa4e633 ffffcc0a`37748a58 ffffcc0a`37748a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffffcc0a`377480e8 fffff801`2aa4e633 : ffffcc0a`37748a58 ffffcc0a`37748a58 ffffffff`ffffffff 00007fff`066cc298 : nt!KiServiceLinkage
ffffcc0a`377480f0 fffff801`2aa05fac : 00000000`00001000 ffffcc0a`37748b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x1caad3
ffffcc0a`37748920 fffff801`2aa02143 : 00000000`0009fc4e 00000000`00000001 00000000`00000000 ffffcc0a`37748b80 : nt!KiExceptionDispatch+0x12c
ffffcc0a`37748b00 00007fff`0901b26e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
00000094`19dc0f70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0901b26e
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_a6686080_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e75a79c-53af-c7ed-b33b-cc54c8cac1fb}
Followup: MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffaf0aed911140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4233
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5549
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffaf0aed911140
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: csrss.exe
CRITICAL_PROCESS: csrss.exe
EXCEPTION_RECORD: ffffaf0aed911880 -- (.exr 0xffffaf0aed911880)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0xefc130c0 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
fffff588`1d03dd88 fffff805`17d081c2 : 00000000`000000ef ffffaf0a`ed911140 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff588`1d03dd90 fffff805`17c3a90b : 00000000`00000001 fffff805`1760d6fd 00000000`00000002 fffff805`1760bc9b : nt!PspCatchCriticalBreak+0x10e
fffff588`1d03de30 fffff805`179f4070 : ffffaf0a`00000000 00000000`00000000 ffffaf0a`ed911140 ffffaf0a`ed911578 : nt!PspTerminateAllThreads+0x151faf
fffff588`1d03dea0 fffff805`179f3e6c : ffffaf0a`ed911140 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff588`1d03dee0 fffff805`178058b8 : ffffaf0a`ed911140 ffffaf0a`efc130c0 fffff588`1d03dfd0 fffff805`17b16052 : nt!NtTerminateProcess+0x9c
fffff588`1d03df50 fffff805`177f7d00 : fffff805`1784e633 fffff588`1d03ea58 fffff588`1d03ea58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
fffff588`1d03e0e8 fffff805`1784e633 : fffff588`1d03ea58 fffff588`1d03ea58 ffffffff`ffffffff 00007ffb`64dec298 : nt!KiServiceLinkage
fffff588`1d03e0f0 fffff805`17805fac : ffffaf0a`ed911880 fffff805`176f0ee6 00000000`00001000 fffff588`1d03eb00 : nt!KiDispatchException+0x1caad3
fffff588`1d03e920 fffff805`17802143 : 00000000`00000000 fffff588`1d03eb80 00000045`f60c3230 ffffaf0a`ed8b3710 : nt!KiExceptionDispatch+0x12c
fffff588`1d03eb00 00007ffb`677121d4 : 00007ffb`676f0000 00007ffb`6778fc4e 00007ffb`6778fc4e 00000000`00000000 : nt!KiPageFault+0x443
00000045`f60c1270 00007ffb`676f0000 : 00007ffb`6778fc4e 00007ffb`6778fc4e 00000000`00000000 00000045`f60c13b0 : 0x00007ffb`677121d4
00000045`f60c1278 00007ffb`6778fc4e : 00007ffb`6778fc4e 00000000`00000000 00000045`f60c13b0 00000000`00000000 : 0x00007ffb`676f0000
00000045`f60c1280 00007ffb`6778fc4e : 00000000`00000000 00000045`f60c13b0 00000000`00000000 00000045`f60c1308 : 0x00007ffb`6778fc4e
00000045`f60c1288 00000000`00000000 : 00000045`f60c13b0 00000000`00000000 00000045`f60c1308 00000045`f60c1348 : 0x00007ffb`6778fc4e
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_efc130c0_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b51ce1c0-797d-ef80-8482-a63ad027a89f}
Followup: MachineOwner
---------