SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the BugCheck
Arg2: fffff8076f6cc252, Address of the instruction which caused the BugCheck
Arg3: ffffb40b2af46b20, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6129
Key : Analysis.Init.CPU.mSec
Value: 562
Key : Analysis.Init.Elapsed.mSec
Value: 7900
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122821-6328-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff8076f6cc252
BUGCHECK_P3: ffffb40b2af46b20
BUGCHECK_P4: 0
CONTEXT: ffffb40b2af46b20 -- (.cxr 0xffffb40b2af46b20)
rax=0000000000000000 rbx=ffffb40b2af475b0 rcx=0000000000000007
rdx=00000000002b7110 rsi=00000236eaa27f71 rdi=ffffcd8c01d03000
rip=fffff8076f6cc252 rsp=ffffb40b2af47528 rbp=ffffb40b2af47630
r8=000000000000001c r9=ffff9a83c3282040 r10=00000236eaa28110
r11=0000000000000110 r12=00000236eac75878 r13=ffffcd8c01d03000
r14=ffffb40b2af477d0 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff807`6f6cc252 418b02 mov eax,dword ptr [r10] ds:002b:00000236`eaa28110=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffb40b`2af47528 fffff807`6f5eb4e4 : 00000000`0000002c 00000000`00000053 ffffb40b`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
ffffb40b`2af47530 fffff807`6f6960ca : 00007fff`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x284
ffffb40b`2af47690 fffff807`6f408ab5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000024`f0cfccc8 : nt!NtQueryValueKey+0x5ba
ffffb40b`2af47990 00007fff`cfa6d054 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000024`f0cfcf48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`cfa6d054
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr 0xffffb40b2af46b20 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner