Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa8704.49747\101520-10937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`06200000 PsLoadedModuleList = 0xfffff805`06e2a310
Debug session time: Thu Oct 15 21:37:26.934 2020 (UTC + 3:00)
System Uptime: 0 days 0:04:14.576
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`065f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbe83`cf3a2660=000000000000003b
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80506835932, Address of the instruction which caused the bugcheck
Arg3: ffffbe83cf3a2f60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4203
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19683
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80506835932
BUGCHECK_P3: ffffbe83cf3a2f60
BUGCHECK_P4: 0
CONTEXT: ffffbe83cf3a2f60 -- (.cxr 0xffffbe83cf3a2f60)
rax=0000000000000000 rbx=ffffbe83cf3a3a00 rcx=0000000000000007
rdx=0000000000332ff8 rsi=0000000000000000 rdi=ffffae0c84a57000
rip=fffff80506835932 rsp=ffffbe83cf3a3968 rbp=ffffbe83cf3a3a70
r8=000000000000001c r9=ffffd30304810080 r10=0000021642d43ff8
r11=0000000000000ff8 r12=0000000000000000 r13=ffffae0c84a57000
r14=ffffbe83cf3a3c60 r15=ffffae0c8a644410
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff805`06835932 418b02 mov eax,dword ptr [r10] ds:002b:00000216`42d43ff8=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffbe83`cf3a3968 fffff805`068ca268 : 00000000`00000060 00000000`00000001 ffffbe83`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
ffffbe83`cf3a3970 fffff805`068dbc62 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x238
ffffbe83`cf3a3ad0 fffff805`066058b8 : 00000000`02a3d080 00000000`00000002 00000000`00000000 00000000`02000000 : nt!NtQueryValueKey+0x5f2
ffffbe83`cf3a3dd0 00007ff9`738ec0a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`02a3cff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`738ec0a4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .cxr 0xffffbe83cf3a2f60 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa8704.988\100920-13281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`13000000 PsLoadedModuleList = 0xfffff800`13c2a310
Debug session time: Fri Oct 9 15:09:04.914 2020 (UTC + 3:00)
System Uptime: 1 days 18:53:12.698
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
...................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`133f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc88f`c98df9e0=000000000000001a
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000006001, The subtype of the bugcheck.
Arg2: ffffffffc0000010
Arg3: 0000020080db3000
Arg4: ffffdb8ff7246390
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8410
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 6001
BUGCHECK_P2: ffffffffc0000010
BUGCHECK_P3: 20080db3000
BUGCHECK_P4: ffffdb8ff7246390
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
STACK_TEXT:
ffffc88f`c98df9d8 fffff800`134252d6 : 00000000`0000001a 00000000`00006001 ffffffff`c0000010 00000200`80db3000 : nt!KeBugCheckEx
ffffc88f`c98df9e0 fffff800`132792cd : 00000000`00040000 fffff800`00000000 ffffdb8f`eb5048d8 00000000`00000000 : nt!MmStoreProbeAndLockPages+0x1f44fe
ffffc88f`c98dfaf0 fffff800`132794dc : 00000000`00040000 ffffc88f`c98dfb60 ffffc88f`c98dfb60 ffffdb8f`eb504918 : nt!SmKmProbeAndLockAddress+0x5d
ffffc88f`c98dfb20 fffff800`132793b1 : 00000000`00040000 00000000`00000004 00000200`80da0000 00000000`00020000 : nt!SmKmStoreHelperCommandProcess+0xac
ffffc88f`c98dfb90 fffff800`13266dd5 : ffffdb8f`eb50d080 00000000`00000080 fffff800`13279350 000f8067`b4bbbdff : nt!SmKmStoreHelperWorker+0x61
ffffc88f`c98dfc10 fffff800`133fb4f8 : ffffcb00`5c1ea180 ffffdb8f`eb50d080 fffff800`13266d80 ffffc88f`c98dfc80 : nt!PspSystemThreadStartup+0x55
ffffc88f`c98dfc60 00000000`00000000 : ffffc88f`c98e0000 ffffc88f`c98da000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MmStoreProbeAndLockPages+1f44fe
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1f44fe
FAILURE_BUCKET_ID: 0x1a_6001_nt!MmStoreProbeAndLockPages
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3e15d39b-3f7d-fc20-9139-c8a8ddc08425}
Followup: MachineOwner
---------