SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801274c690e, Address of the instruction which caused the bugcheck
Arg3: ffffc501262df930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5204
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff801274c690e
BUGCHECK_P3: ffffc501262df930
BUGCHECK_P4: 0
CONTEXT: ffffc501262df930 -- (.cxr 0xffffc501262df930)
rax=0000000000000000 rbx=00196471ce891370 rcx=0000000000000000
rdx=0000000000000002 rsi=ffffc50126280180 rdi=00196471ce891388
rip=fffff801274c690e rsp=ffffc281e65f07c0 rbp=0000000000000000
r8=000000000004001f r9=000000000000001f r10=0000fffff8012736
r11=ffffb4fb50c00000 r12=0000000000000000 r13=0000000000000000
r14=ffffae8ece891080 r15=ffffae8ece891388
iopl=0 nv up ei pl nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207
nt!KiRundownMutants+0xe6:
fffff801`274c690e 807b3100 cmp byte ptr [rbx+31h],0 ds:002b:00196471`ce8913a1=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
BAD_STACK_POINTER: ffffc501262deff8
STACK_TEXT:
ffffc281`e65f07c0 fffff801`27a246f3 : ffffae8e`ce891080 ffffae8e`c9b31090 00000000`00000001 00000000`00000000 : nt!KiRundownMutants+0xe6
ffffc281`e65f0960 fffff801`27a22843 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffae8e`ccf107e0 : nt!PspExitThread+0x2db
ffffc281`e65f0a70 fffff801`27a227ca : 00000000`00000000 00000000`00000000 ffffae8e`ce891080 00000000`00000318 : nt!PspTerminateThreadByPointer+0x53
ffffc281`e65f0ab0 fffff801`275d4258 : 00000000`00000000 ffffae8e`ce891080 ffffc281`e65f0b80 ffffae8e`ccf107e0 : nt!NtTerminateThread+0x4a
ffffc281`e65f0b00 00007ffc`2bafcad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008f`248ffac8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2bafcad4
SYMBOL_NAME: nt!KiRundownMutants+e6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .cxr 0xffffc501262df930 ; kb
BUCKET_ID_FUNC_OFFSET: e6
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KiRundownMutants
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {47ef8bd0-66f8-e00c-2f59-1f631a8fdb27}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffff97, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8071ca10a12, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 33648
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffffffff97
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8071ca10a12
BUGCHECK_P4: 2
READ_ADDRESS: fffff8071c9713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8071c8283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffff97
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
TRAP_FRAME: fffffb8af45fe5c0 -- (.trap 0xfffffb8af45fe5c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb80a2d510048
rdx=fffffb8af45fe6f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071ca10a12 rsp=fffffb8af45fe750 rbp=0000000000000000
r8=ffffb80a2d42c000 r9=000000000000001c r10=0000000003803020
r11=0000000003803020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmQueryValueKey+0x152:
fffff807`1ca10a12 8b5d97 mov ebx,dword ptr [rbp-69h] ss:0018:ffffffff`ffffff97=????????
Resetting default scope
STACK_TEXT:
fffffb8a`f45fe318 fffff807`1c5ed55a : 00000000`00000050 ffffffff`ffffff97 00000000`00000000 fffffb8a`f45fe5c0 : nt!KeBugCheckEx
fffffb8a`f45fe320 fffff807`1c45889f : 000000ce`2956ee01 00000000`00000000 00000000`00000000 ffffffff`ffffff97 : nt!MiSystemFault+0x1c60fa
fffffb8a`f45fe420 fffff807`1c5d0a5e : 00000000`00000000 00000000`00000000 fffffb8a`f45fe920 00000000`00000000 : nt!MmAccessFault+0x34f
fffffb8a`f45fe5c0 fffff807`1ca10a12 : 00000000`00000000 000001d2`fc8d4024 ffffb80a`3c6a10e0 ffffb80a`00000000 : nt!KiPageFault+0x35e
fffffb8a`f45fe750 fffff807`1ca111be : 00000000`0000025c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmQueryValueKey+0x152
fffffb8a`f45fe850 fffff807`1c5d4258 : 00000000`004e18c3 00000000`00000000 00000000`0000002b 00000000`00000003 : nt!NtQueryValueKey+0x4ee
fffffb8a`f45fea90 00007ff8`905fc354 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ce`2956ee98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`905fc354
SYMBOL_NAME: nt!CmQueryValueKey+152
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.1082
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 152
FAILURE_BUCKET_ID: AV_R_INVALID_nt!CmQueryValueKey
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8d4c5c01-a14c-b322-d4eb-f6a12193f162}
Followup: MachineOwner
---------