Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\HP\Desktop\111522-17312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`19200000 PsLoadedModuleList = 0xfffff805`19e2a2b0
Debug session time: Tue Nov 15 10:32:13.384 2022 (UTC + 3:00)
System Uptime: 1 days 15:46:40.096
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
...............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`195f92d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd48f`8e256230=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff805198a5918, Address of the instruction which caused the BugCheck
Arg3: ffffd48f8e256b30, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4718
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 108377
Key : Analysis.IO.Other.Mb
Value: 13
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 29
Key : Analysis.Init.CPU.mSec
Value: 842
Key : Analysis.Init.Elapsed.mSec
Value: 514594
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 111522-17312-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff805198a5918
BUGCHECK_P3: ffffd48f8e256b30
BUGCHECK_P4: 0
CONTEXT: ffffd48f8e256b30 -- (.cxr 0xffffd48f8e256b30)
rax=0000000000001f80 rbx=ffffd48f8e257598 rcx=00000000000003f0
rdx=000000000075005c rsi=000001b21f556224 rdi=ffff9789b965f000
rip=fffff805198a5918 rsp=ffffd48f8e257538 rbp=000001b21f5561fc
r8=ffff9789b90fa000 r9=0000000000000003 r10=000000000000005c
r11=000000000000005c r12=00000000ffffffff r13=0000000000100130
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!HvpGetCellPaged+0x68:
fffff805`198a5918 488b4808 mov rcx,qword ptr [rax+8] ds:002b:00000000`00001f88=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffd48f`8e257538 fffff805`19884c59 : 00000000`00000000 ffff9789`b965f000 ffffd48f`8e2575e0 fffff805`19a7bc8c : nt!HvpGetCellPaged+0x68
ffffd48f`8e257540 fffff805`1988494d : 00000000`00000000 00000000`ffffffff 00000001`00365220 ffffd48f`8e2575e0 : nt!CmpMarkValueDataDirty+0xd9
ffffd48f`8e257590 fffff805`197f4b78 : 01d8f8c4`611aa279 00000000`00000000 ffff9789`bcb4f7f0 00000000`00000001 : nt!CmpSetValueKeyExisting+0xcd
ffffd48f`8e257610 fffff805`197f43b8 : 000000f7`00000001 ffffd48f`8e2578a0 00000000`00000000 ffff9789`b8a58e01 : nt!CmSetValueKey+0x508
ffffd48f`8e2577b0 fffff805`1960caf5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtSetValueKey+0x648
ffffd48f`8e257990 00007fff`3424dcb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f7`2b27a208 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`3424dcb4
SYMBOL_NAME: nt!HvpGetCellPaged+68
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2251
STACK_COMMAND: .cxr 0xffffd48f8e256b30 ; kb
BUCKET_ID_FUNC_OFFSET: 68
FAILURE_BUCKET_ID: AV_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {90e145c3-c04a-f304-4254-781be6862dc9}
Followup: MachineOwner
---------