*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80472251112, Address of the instruction which caused the bugcheck
Arg3: ffffcb07c5ba9470, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8452
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18186
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80472251112
BUGCHECK_P3: ffffcb07c5ba9470
BUGCHECK_P4: 0
CONTEXT: ffffcb07c5ba9470 -- (.cxr 0xffffcb07c5ba9470)
rax=0000000000000000 rbx=ffffcb07c5ba9ed0 rcx=0000000000000007
rdx=0000000002eb8430 rsi=00000000000001e5 rdi=ffffb686edaab000
rip=fffff80472251112 rsp=ffffcb07c5ba9e78 rbp=ffffb686edaab000
r8=000000000000001c r9=ffffcc0ee5111080 r10=000001fed10f9430
r11=0000000000000430 r12=00000000e83a8717 r13=ffffcb07c5baa130
r14=00000000000001e5 r15=000001fed1122024
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff804`72251112 418b02 mov eax,dword ptr [r10] ds:002b:000001fe`d10f9430=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffcb07`c5ba9e78 fffff804`722e0a7f : 00000000`8dadaaea ffffcb07`c5baa1a0 000001fe`d1c3900c 00000000`c0000034 : nt!HvpGetCellPaged+0xa2
ffffcb07`c5ba9e80 fffff804`722e68b5 : 00000001`ffffffff 00000000`e83a8717 00000000`8dadaaea 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffcb07`c5ba9ed0 fffff804`722e99f9 : ffffb686`f76032a0 00000000`00000001 ffffcb07`c5baa0d0 ffffcb07`c5baa150 : nt!CmpWalkOneLevel+0x6f5
ffffcb07`c5ba9fd0 fffff804`722e82e3 : 00000000`0000001c ffffcb07`c5baa320 ffffcb07`c5baa2d8 ffffcc0e`df2ee010 : nt!CmpDoParseKey+0x849
ffffcb07`c5baa270 fffff804`722ec3ae : fffff804`722e8001 00000000`00000000 ffffcc0e`df2ee010 fffff804`722d7801 : nt!CmpParseKey+0x2c3
ffffcb07`c5baa410 fffff804`722f566a : ffffcc0e`df2ee001 ffffcb07`c5baa678 00000000`00000040 ffffcc0e`dbccb0c0 : nt!ObpLookupObjectName+0x3fe
ffffcb07`c5baa5e0 fffff804`722f544c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcc0e`dbccb0c0 : nt!ObOpenObjectByNameEx+0x1fa
ffffcb07`c5baa710 fffff804`722f4f71 : 00000076`2b2fcb28 ffffcb07`c5baaa80 00000000`00000001 fffff804`71e9ccce : nt!ObOpenObjectByName+0x5c
ffffcb07`c5baa760 fffff804`722f4c9f : 0000019d`be79b598 00000000`00000000 00000076`2b2fd0b0 00000076`2b2fd6d0 : nt!CmOpenKey+0x2c1
ffffcb07`c5baa9c0 fffff804`72005fb5 : 00000000`00001000 0000019d`bfdf1820 ffffcb07`c5baaa80 ffffcc0e`e4d49de0 : nt!NtOpenKeyEx+0xf
ffffcb07`c5baaa00 00007ffa`ffdae184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000076`2b2fca48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`ffdae184
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffcb07c5ba9470 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------