*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff802218a3ad2, Address of the instruction which caused the bugcheck
Arg3: ffffec8ed3d32cc0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on RTX
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25358
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff802218a3ad2
BUGCHECK_P3: ffffec8ed3d32cc0
BUGCHECK_P4: 0
CONTEXT: ffffec8ed3d32cc0 -- (.cxr 0xffffec8ed3d32cc0)
rax=0000000000000000 rbx=ffffec8ed3d336f0 rcx=0000000000000007
rdx=000000000077006f rsi=0000000000000000 rdi=ffffc8028e72f000
rip=fffff802218a3ad2 rsp=ffffec8ed3d336b8 rbp=0000000000000002
r8=000000000000001c r9=ffffb5818ef06080 r10=000000000000006f
r11=000000000000006f r12=ffffec8ed3d33920 r13=000000000000001c
r14=0000015bdeb798e4 r15=ffffc8028e72f000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff802`218a3ad2 418b02 mov eax,dword ptr [r10] ds:002b:00000000`0000006f=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffec8e`d3d336b8 fffff802`21835da4 : 0000015b`deb91086 00000000`00000000 00000000`00000000 fffff802`2124e6bd : nt!HvpGetCellPaged+0xa2
ffffec8e`d3d336c0 fffff802`218345a4 : ffffec8e`d3d337f9 0000015b`deb798dc ffffc802`98b4c5e0 ffffc802`00000000 : nt!CmpFindNameInListWithStatus+0xd4
ffffec8e`d3d33750 fffff802`21834d5e : 00000000`000028dc 00000000`00000000 00000000`00000000 ffffb581`8dc14c00 : nt!CmQueryValueKey+0x144
ffffec8e`d3d33850 fffff802`213d5358 : 00000000`00002730 00000000`032ee4b0 00000000`00000000 00000000`032edf60 : nt!NtQueryValueKey+0x4ee
ffffec8e`d3d33a90 00007fff`1297d074 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`032edbd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`1297d074
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1379
STACK_COMMAND: .cxr 0xffffec8ed3d32cc0 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!HvpGetCellPaged
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {32f4db97-5bc1-37be-caf3-746cdc554a0b}
Followup: MachineOwner
---------