*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000020, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: ffffb18fb8e73120, current process (virtual address for lock type 3, or PTE)
Arg4: 0000000000000000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1561
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9744
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 5183
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.DumpHeader
Value: 0x7a
Key : Bugcheck.Code.Register
Value: 0x7a
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051923-10828-01.dmp
BUGCHECK_CODE: 7a
BUGCHECK_P1: 20
BUGCHECK_P2: ffffffffc000000e
BUGCHECK_P3: ffffb18fb8e73120
BUGCHECK_P4: 0
ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.
DISK_HARDWARE_ERROR: There was error with disk hardware
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff828e`8f6295e8 fffff805`35c84df4 : 00000000`0000007a 00000000`00000020 ffffffff`c000000e ffffb18f`b8e73120 : nt!KeBugCheckEx
ffff828e`8f6295f0 fffff805`35b2f0ab : 00000000`00000000 00000000`c000000e 00000000`00000000 00000000`00100000 : nt!MiWriteComplete+0x13e9d4
ffff828e`8f6296a0 fffff805`35addc60 : ffffb18f`b8e74080 ffffb18f`c2e30558 00000000`00000000 00000000`00000000 : nt!IopCompletePageWrite+0x4b
ffff828e`8f6296d0 fffff805`35a1cce7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1b0
ffff828e`8f629780 fffff805`35a1beef : 00000000`00000000 00000000`00000008 ffff828e`8f629970 00000000`00000000 : nt!KiSwapThread+0x827
ffff828e`8f629830 fffff805`35add0fe : 00000000`00000000 fffff805`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff828e`8f6298d0 fffff805`35bbe75e : ffffb18f`00000004 fffff805`00000012 fffff805`36450c00 fffff805`31bff180 : nt!KeWaitForMultipleObjects+0x2be
ffff828e`8f6299e0 fffff805`35b265f5 : ffffb18f`b8e74080 ffffb18f`b8e74080 00000000`00000080 fffff805`35bbe5c0 : nt!MiModifiedPageWriter+0x19e
ffff828e`8f629c10 fffff805`35c048d8 : fffff805`31bff180 ffffb18f`b8e74080 fffff805`35b265a0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff828e`8f629c60 00000000`00000000 : ffff828e`8f62a000 ffff828e`8f624000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiWriteComplete+13e9d4
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 13e9d4
FAILURE_BUCKET_ID: 0x7a_c000000e_nt!MiWriteComplete
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fcc12098-ee04-35bd-5cea-593a2c6ec31d}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffd384c3b08080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2078
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6379
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 2210
Key : Analysis.Memory.CommitPeak.Mb
Value: 144
Key : Bugcheck.Code.DumpHeader
Value: 0xef
Key : Bugcheck.Code.Register
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: c584e080
Key : CriticalProcessDied.Process
Value: csrss.exe
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051923-10156-01.dmp
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffd384c3b08080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: csrss.exe
CRITICAL_PROCESS: csrss.exe
EXCEPTION_RECORD: ffffd384c3b087c0 -- (.exr 0xffffd384c3b087c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0xc584e080 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
ffffa80a`23691d88 fffff806`5710d842 : 00000000`000000ef ffffd384`c3b08080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffa80a`23691d90 fffff806`5700cbb7 : 00000000`00000001 fffff806`56b13a19 00000000`00000002 fffff806`56aeb06b : nt!PspCatchCriticalBreak+0x10e
ffffa80a`23691e30 fffff806`56e99698 : ffffd384`00000000 00000000`00000000 ffffd384`c3b08080 ffffd384`c3b084b8 : nt!PspTerminateAllThreads+0x17291b
ffffa80a`23691ea0 fffff806`56e9926c : ffffd384`c3b08080 00000000`00000001 ffffffff`ffffffff fffff806`56c0fc78 : nt!PspTerminateProcess+0xe0
ffffa80a`23691ee0 fffff806`56c0fc9d : ffffd384`c3b08080 ffffd384`c584e080 ffffa80a`23691fd0 fffff806`56f2e042 : nt!NtTerminateProcess+0x9c
ffffa80a`23691f50 fffff806`56c00880 : fffff806`56c60d4d ffffa80a`23692a58 ffffa80a`23692a58 ffffffff`ffffffff : nt!KiSystemServiceExitPico+0x3f2
ffffa80a`236920e8 fffff806`56c60d4d : ffffa80a`23692a58 ffffa80a`23692a58 ffffffff`ffffffff 00007ffd`f3d83000 : nt!KiServiceLinkage
ffffa80a`236920f0 fffff806`56c0fe6c : ffffd384`c3b087c0 fffff806`56a70b16 00000000`00000c00 ffffa80a`23692b00 : nt!KiDispatchException+0x17963d
ffffa80a`23692920 fffff806`56c0b8bd : 00000000`00000000 00000000`00000000 ffffa80a`23692b80 ffffd384`c584e080 : nt!KiExceptionDispatch+0x12c
ffffa80a`23692b00 00007ffd`f66e2c62 : 00000000`00000000 0000008e`00000000 0000008e`4ac812c0 0000008e`4ac812c8 : nt!KiPageFault+0x43d
0000008e`4ac812a0 00000000`00000000 : 0000008e`00000000 0000008e`4ac812c0 0000008e`4ac812c8 00007ffd`f3d83000 : 0x00007ffd`f66e2c62
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_c584e080_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {49c7cb20-87c3-b26e-139f-2050ff04684e}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000020, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: ffffdf0fa26a2120, current process (virtual address for lock type 3, or PTE)
Arg4: 0000000000000000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13884
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 124
Key : Analysis.Init.Elapsed.mSec
Value: 5278
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.DumpHeader
Value: 0x7a
Key : Bugcheck.Code.Register
Value: 0x7a
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051923-10421-01.dmp
BUGCHECK_CODE: 7a
BUGCHECK_P1: 20
BUGCHECK_P2: ffffffffc000000e
BUGCHECK_P3: ffffdf0fa26a2120
BUGCHECK_P4: 0
ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.
DISK_HARDWARE_ERROR: There was error with disk hardware
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffef0b`324ae698 fffff801`2ee84df4 : 00000000`0000007a 00000000`00000020 ffffffff`c000000e ffffdf0f`a26a2120 : nt!KeBugCheckEx
ffffef0b`324ae6a0 fffff801`2ed2f0ab : 00000000`00000000 00000000`c000000e 00000000`00000000 fffff801`00001000 : nt!MiWriteComplete+0x13e9d4
ffffef0b`324ae750 fffff801`2ecddc60 : ffffdf0f`a26a8080 ffffdf0f`a761f088 fffff801`31ce3b00 fffff801`2bd25c18 : nt!IopCompletePageWrite+0x4b
ffffef0b`324ae780 fffff801`2ec19a73 : ffffdf0f`a26a8080 00000000`00000000 00000000`00000000 00000000`c0000016 : nt!KiDeliverApc+0x1b0
ffffef0b`324ae830 fffff801`2ecebd01 : ffffcd81`56ba5180 fffff801`327ab4d0 ffffcd81`56ba5101 00000000`00000000 : nt!KiExitDispatcher+0x2d3
ffffef0b`324ae8a0 fffff801`2ec92abb : ffffef0b`324ae900 00000000`00020003 00000000`00400201 ffffdf0f`00000001 : nt!KeInsertQueueApc+0x151
ffffef0b`324ae940 fffff801`2ec92577 : ffffdf0f`a761f010 fffff801`328a4d01 ffffdf0f`9b6d2181 ffffdf0f`a761f010 : nt!IopfCompleteRequest+0x52b
ffffef0b`324aea20 fffff801`31ae3421 : ffffdf0f`9b605a40 ffffef0b`324aeb59 ffffdf0f`9b6058f0 ffffef0b`324aec60 : nt!IofCompleteRequest+0x17
ffffef0b`324aea50 fffff801`2ec11385 : ffffef0b`324aeb59 ffffdf0f`9b6d2180 00000000`00000002 fffff801`2f09a1ca : volmgr!VmReadWrite+0x2411
ffffef0b`324aea90 fffff801`326d4ece : ffffdf0f`9b6d2180 ffffef0b`324aeb59 ffffdf0f`9b6d21b8 00000000`00000000 : nt!IofCallDriver+0x55
ffffef0b`324aead0 fffff801`326d4b1c : ffffef0b`324aec91 fffff801`328a4fa4 000002cc`d9714618 ffffdf0f`a761f010 : fvevol!FveFilterRundownReadWrite+0x33e
ffffef0b`324aebc0 fffff801`2ec11385 : 00000000`00000004 00007ffd`7380dac4 00000000`00000033 00000000`00000246 : fvevol!FveFilterRundownWrite+0x4c
ffffef0b`324aec60 fffff801`328a3d07 : ffffadf5`eb687c6d 00000000`00000000 ffffdf0f`ab91e740 ffffdf0f`a761f320 : nt!IofCallDriver+0x55
ffffef0b`324aeca0 fffff801`328a5035 : 00000000`00000002 ffffdf0f`9b6d4198 ffffdf0f`9b6d3b50 ffffdf0f`a761f010 : iorate!IoRateIssueAndRecordIo+0x7f
ffffef0b`324aece0 fffff801`328a51ef : ffffdf0f`9b6d4180 0000001c`72420000 00000000`00000000 00000000`00000000 : iorate!IoRateProcessIrpWrapper+0x69
ffffef0b`324aed70 fffff801`2ec11385 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : iorate!IoRateDispatchReadWrite+0x5f
ffffef0b`324aedb0 fffff801`32791033 : ffffdf0f`9b685500 fffff801`327a1a98 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffef0b`324aedf0 fffff801`2ec11385 : ffffdf0f`9b6d4180 fffff801`327eacf8 00000000`00000000 ffffdf0f`a761f320 : volume!VolumePassThrough+0x23
ffffef0b`324aee20 fffff801`327a115d : ffffdf0f`a761f010 ffffdf0f`9b6d4180 ffffdf0f`9b6d4198 00000000`00000000 : nt!IofCallDriver+0x55
ffffef0b`324aee60 fffff801`327a1023 : 00000000`00000000 00000000`00000000 ffffef0b`2da3e300 00000000`00000000 : volsnap!VolsnapWriteFilter+0x11d
ffffef0b`324aeee0 fffff801`2ec11385 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : volsnap!VolSnapWrite+0x13
ffffef0b`324aef10 fffff801`3202375c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffef0b`324aef50 fffff801`2ee0030e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsStorageDriverCallout+0x1c
ffffef0b`324aef80 fffff801`2ee002cc : ffffef0b`324aefd0 ffffdf0f`a26a8080 ffffef0b`324af000 fffff801`2ecad7dd : nt!KxSwitchKernelStackCallout+0x2e
ffffef0b`2da3e310 fffff801`2ecad7dd : ffffef0b`324aefd0 ffffdf0f`a26a8080 ffffef0b`2da3e300 00001f80`00000000 : nt!KiSwitchKernelStackContinue
ffffef0b`2da3e330 fffff801`2ecad5d2 : fffff801`32023740 ffffef0b`2da3e520 00000000`00000002 00000000`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d
ffffef0b`2da3e3d0 fffff801`2ecad433 : ffffef0b`2da3e6a0 00000000`00000000 ffffdf0f`00000000 00000000`00001000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2
ffffef0b`2da3e440 fffff801`2ecad3ed : fffff801`32023740 ffffef0b`2da3e520 ffffdf0f`a761f368 fffff801`3200511e : nt!KeExpandKernelStackAndCalloutInternal+0x33
ffffef0b`2da3e4b0 fffff801`320102dd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffef0b`2da3e4f0 fffff801`320327bb : ffffdf0f`a761f368 00000000`00000000 ffffef0b`2da3e5e0 ffffef0b`2da3e5c8 : Ntfs!NtfsCallStorageDriver+0xa9
ffffef0b`2da3e560 fffff801`3201b148 : ffffdf0f`00000004 ffffdf0f`a761f368 00000000`028c3000 00000000`00000000 : Ntfs!NtfsPagingFileIo+0x2fb
ffffef0b`2da3e670 fffff801`2ec11385 : ffffdf0f`ab81b920 ffffdf0f`a761f010 ffffdf0f`a761f010 ffffdf0f`9b5a7d60 : Ntfs!NtfsFsdWrite+0x1f8
ffffef0b`2da3e740 fffff801`2bd2710f : 00000000`00000005 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffef0b`2da3e780 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
SYMBOL_NAME: volmgr!VmReadWrite+2411
MODULE_NAME: volmgr
IMAGE_NAME: volmgr.sys
IMAGE_VERSION: 10.0.19041.1940
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 2411
FAILURE_BUCKET_ID: 0x7a_c000000e_volmgr!VmReadWrite
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {926fffaa-ca3b-a1ec-ad21-fa8bab592dfc}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff8008f651d080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2203
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4209
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 46
Key : Analysis.Init.Elapsed.mSec
Value: 6179
Key : Analysis.Memory.CommitPeak.Mb
Value: 135
Key : Bugcheck.Code.DumpHeader
Value: 0xef
Key : Bugcheck.Code.Register
Value: 0xef
Key : CriticalProcessDied.ExceptionCode
Value: f8f2b4c0
Key : CriticalProcessDied.Process
Value: services.exe
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051923-10718-01.dmp
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff8008f651d080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: services.exe
CRITICAL_PROCESS: services.exe
EXCEPTION_RECORD: ffff8008f651d7c0 -- (.exr 0xffff8008f651d7c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0xf8f2b4c0 - <Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
STACK_TEXT:
ffffd303`c4e05d88 fffff803`09b0d842 : 00000000`000000ef ffff8008`f651d080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffd303`c4e05d90 fffff803`09a0cbb7 : 00000000`00000001 fffff803`09513a19 00000000`00000002 fffff803`094eb06b : nt!PspCatchCriticalBreak+0x10e
ffffd303`c4e05e30 fffff803`09899698 : ffff8008`00000000 00000000`00000000 ffff8008`f651d080 ffff8008`f651d4b8 : nt!PspTerminateAllThreads+0x17291b
ffffd303`c4e05ea0 fffff803`0989926c : ffff8008`f651d080 00000000`00000001 ffffffff`ffffffff fffff803`0960fc78 : nt!PspTerminateProcess+0xe0
ffffd303`c4e05ee0 fffff803`0960fc9d : ffff8008`f651d080 ffff8008`f8f2b4c0 ffffd303`c4e05fd0 fffff803`0992e042 : nt!NtTerminateProcess+0x9c
ffffd303`c4e05f50 fffff803`09600880 : fffff803`09660d4d ffffd303`c4e06a58 ffffd303`c4e06a58 ffffffff`ffffffff : nt!KiSystemServiceExitPico+0x3f2
ffffd303`c4e060e8 fffff803`09660d4d : ffffd303`c4e06a58 ffffd303`c4e06a58 ffffffff`ffffffff 00007ff6`d48c1000 : nt!KiServiceLinkage
ffffd303`c4e060f0 fffff803`0960fe6c : ffff8008`f651d7c0 fffff803`0954453e 00000000`00003200 ffffd303`c4e06b00 : nt!KiDispatchException+0x17963d
ffffd303`c4e06920 fffff803`0960b8bd : 0000000d`ef42d900 00000000`00000000 00000000`00000000 ffff8008`00000000 : nt!KiExceptionDispatch+0x12c
ffffd303`c4e06b00 00007ffd`33882c62 : 00000000`00000000 0000000d`00000000 0000000d`ef421480 0000000d`ef421488 : nt!KiPageFault+0x43d
0000000d`ef421460 00000000`00000000 : 0000000d`00000000 0000000d`ef421480 0000000d`ef421488 00007ff6`d48c1000 : 0x00007ffd`33882c62
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_f8f2b4c0_nt!PspCatchCriticalBreak
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4a19f15d-8306-9b6a-55a8-fdd2caa41f92}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the BugCheck
Arg2: fffff8046029f352, Address of the instruction which caused the BugCheck
Arg3: ffffcb0e20febc20, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ExceptionRecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: ContextRecord ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8070
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 7960
Key : Analysis.Memory.CommitPeak.Mb
Value: 135
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 051923-10171-02.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff8046029f352
BUGCHECK_P3: ffffcb0e20febc20
BUGCHECK_P4: 0
CONTEXT: ffffcb0e20febc20 -- (.cxr 0xffffcb0e20febc20)
rax=0000000000000000 rbx=ffffcb0e20fec6c0 rcx=0000000000000007
rdx=00000000000fcf38 rsi=0000000000000000 rdi=ffff8209c9f1f000
rip=fffff8046029f352 rsp=ffffcb0e20fec628 rbp=ffffcb0e20fec730
r8=000000000000001c r9=ffffce8d3c6e8080 r10=000002259bdedf38
r11=0000000000000f38 r12=0000000000000000 r13=ffff8209c9f1f000
r14=ffffcb0e20fec920 r15=ffff820a177be570
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff804`6029f352 418b02 mov eax,dword ptr [r10] ds:002b:00000225`9bdedf38=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 2
PROCESS_NAME: Registry
STACK_TEXT:
ffffcb0e`20fec628 fffff804`6027a638 : 00000000`00000060 00000000`00000001 ffffcb0e`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
ffffcb0e`20fec630 fffff804`60218b52 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x238
ffffcb0e`20fec790 fffff804`6000fc9d : 00000000`00000000 fffff804`601a89f7 ffffce8d`3c6e8080 00000000`00000000 : nt!NtQueryValueKey+0x5f2
ffffcb0e`20feca90 00007ffd`11e8d344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3f2
00000037`6a8ff1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`11e8d344
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr 0xffffcb0e20febc20 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_C0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------