*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
the pagefile offset. Parameter 3 contains the page CRC value.
Parameter 4 contains the expected CRC value.
Arg2: 000000000000eabd
Arg3: 000000000000e8bd
Arg4: 00000000d44880d4
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7078
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 33070
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3f
BUGCHECK_P2: eabd
BUGCHECK_P3: e8bd
BUGCHECK_P4: d44880d4
ADDITIONAL_DEBUG_TEXT: Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
PAGE_HASH_ERRORS_DETECTED: 1
TRAP_FRAME: ffff8b80b7e76060 -- (.trap 0xffff8b80b7e76060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8043d8804a0 rbx=0000000000000000 rcx=ffff99816a853000
rdx=ffff99816a853000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043d8804f0 rsp=ffff8b80b7e761f8 rbp=000002088486fe28
r8=000002088486fc00 r9=000000000000027e r10=ffff99816a853ea0
r11=000002088486fe7e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff804`3d8804f0 418b08 mov ecx,dword ptr [r8] ds:00000208`8486fc00=????????
Resetting default scope
STACK_TEXT:
ffff8b80`b7e75bd8 fffff804`3db575ad : 00000000`0000001a 00000000`0000003f 00000000`0000eabd 00000000`0000e8bd : nt!KeBugCheckEx
ffff8b80`b7e75be0 fffff804`3d919b21 : ffffaa06`787ca860 ffffffff`ffffffff 00000000`00000000 fffff601`04424378 : nt!MiValidatePagefilePageHash+0x331
ffff8b80`b7e75cc0 fffff804`3d917835 : ffff8b80`00010000 ffff8b80`b7e75e00 ffff8b80`b7e75e50 fffff804`00000000 : nt!MiWaitForInPageComplete+0x351
ffff8b80`b7e75db0 fffff804`3d8ea648 : 00000000`c0033333 00000000`00000000 00000208`8486fc00 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffff8b80`b7e75ec0 fffff804`3da0275e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468
ffff8b80`b7e76060 fffff804`3d8804f0 : ffff9981`6a853000 ffffaa06`77656050 fffff804`3d8b5fa0 ffff9981`6a853000 : nt!KiPageFault+0x35e
ffff8b80`b7e761f8 fffff804`3d8b5fa0 : ffff9981`6a853000 ffff9981`6a853000 00000000`00000002 00000208`8486fc00 : nt!RtlDecompressBufferXpressLz+0x50
ffff8b80`b7e76210 fffff804`3d847328 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`0016a844 : nt!RtlDecompressBufferEx+0x60
ffff8b80`b7e76260 fffff804`3d8471b5 : 00000000`00000004 fffff804`3d846d1e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffff8b80`b7e76320 fffff804`3d846a84 : 00000000`00000001 00000000`0001fc00 ffffaa06`77656000 ffffaa06`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff8b80`b7e76370 fffff804`3d89285c : fffff804`ffffffff ffffaa06`79ddb000 ffff8b80`b7e76450 ffffaa06`74654c10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff8b80`b7e76410 fffff804`3d8926a9 : ffff9981`69f09730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff8b80`b7e764c0 fffff804`3d892561 : ffffaa06`77656000 ffffaa06`74654c10 ffffaa06`79ddb000 ffffaa06`776579c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff8b80`b7e76540 fffff804`3d80d468 : ffffaa06`757e0080 ffffaa06`77656000 00000000`00000000 ffffaa06`7bac0440 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff8b80`b7e76570 fffff804`3d893a37 : fffff804`3d892540 ffff8b80`b7e76610 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8b80`b7e765e0 fffff804`3d84db74 : ffff8b80`b7e766e0 00000000`31526d73 00000000`000003ff fffff804`3e3239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff8b80`b7e766b0 fffff804`3d84d5a8 : 00000000`0000000c 00000000`000003ff ffff8b80`b7e76760 fffff804`3e3239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff8b80`b7e76700 fffff804`3d892c97 : 00000000`0000000c 00000000`00000001 ffffaa06`74654c10 ffffaa06`7bac0440 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff8b80`b7e76790 fffff804`3d8a854b : ffffaa06`00000001 ffffaa06`7bac0500 00000000`00000000 ffffaa06`77656000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff8b80`b7e76800 fffff804`3d917438 : 0000007f`00000100 00000000`00000000 ffff8b80`b7e76a58 fffff804`3d917bb0 : nt!SmPageRead+0x33
ffff8b80`b7e76850 fffff804`3d91770d : 00000000`00000002 ffff8b80`b7e768e0 ffff8b80`b7e76a58 ffffaa06`7bac03f0 : nt!MiIssueHardFaultIo+0x10c
ffff8b80`b7e768a0 fffff804`3d8ea648 : 00000000`c0033333 00000000`00000001 00007ffc`60ce5260 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffff8b80`b7e76960 fffff804`3da0275e : ffffaa06`757e0080 00000000`00000000 00000000`00000000 ffffaa06`00000000 : nt!MmAccessFault+0x468
ffff8b80`b7e76b00 00007ffc`60cb931d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
0000003c`e3cff200 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`60cb931d
SYMBOL_NAME: PAGE_HASH_ERRORS_INPAGE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_HASH_ERRORS_0x1a_3f
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_SERVICE_FAILED (5a)
Arguments:
Arg1: 0000000000000001
Arg2: ffffc20f2f28db10
Arg3: ffff868e55533220
Arg4: ffffffffc000000e
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: baseName ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 30207
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 5a
BUGCHECK_P1: 1
BUGCHECK_P2: ffffc20f2f28db10
BUGCHECK_P3: ffff868e55533220
BUGCHECK_P4: ffffffffc000000e
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd78c`57606938 fffff800`7edec492 : 00000000`0000005a 00000000`00000001 ffffc20f`2f28db10 ffff868e`55533220 : nt!KeBugCheckEx
ffffd78c`57606940 fffff800`7f053eaf : ffffc20f`2bdf94a0 ffffc20f`2bdf94a0 ffffd78c`57606b80 00000000`00000000 : nt!IopLoadDriver+0xce5aa
ffffd78c`57606b10 fffff800`7f060ad6 : ffffffff`00000000 ffff868e`55609b00 00000000`00000000 fffff800`7a07a860 : nt!IopInitializeSystemDrivers+0x157
ffffd78c`57606bb0 fffff800`7ed946db : fffff800`7a07a860 fffff800`7f247048 fffff800`7ed946a0 fffff800`7a07a860 : nt!IoInitSystem+0x2e
ffffd78c`57606be0 fffff800`7e8a2ae5 : ffffc20f`29c6f400 fffff800`7ed946a0 fffff800`7a07a860 245c8948`0015ea97 : nt!Phase1Initialization+0x3b
ffffd78c`57606c10 fffff800`7e9fbbf8 : fffff800`7a3ed180 ffffc20f`29c6f400 fffff800`7e8a2a90 000000f0`838b4800 : nt!PspSystemThreadStartup+0x55
ffffd78c`57606c60 00000000`00000000 : ffffd78c`57607000 ffffd78c`57601000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!IopLoadDriver+ce5aa
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ce5aa
FAILURE_BUCKET_ID: 0x5A_c000000e_nt!IopLoadDriver
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9778c4da-880c-c900-5b14-c503b2b13611}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffd087cf911000, Pointer to the store context or data manager
Arg2: ffffb600741387d0, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9093
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 46593
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 154
BUGCHECK_P1: ffffd087cf911000
BUGCHECK_P2: ffffb600741387d0
BUGCHECK_P3: 2
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffffb60074139758 -- (.exr 0xffffb60074139758)
ExceptionAddress: fffff80127e804f0 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
ExceptionCode: c0000006 (In-page I/O error)
ExceptionFlags: 00000000
NumberParameters: 3
Parameter[0]: 0000000000000000
Parameter[1]: 000001c7ce965310
Parameter[2]: 00000000c000000e
Inpage operation failed at 000001c7ce965310, due to I/O error 00000000c000000e
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000001c7ce965310
CONTEXT: ffffb60074138f90 -- (.cxr 0xffffb60074138f90)
rax=fffff80127e804a0 rbx=ffffc081265c4000 rcx=ffffc081265c4000
rdx=ffffc081265c4000 rsi=0000000000000002 rdi=000001c7ce965310
rip=fffff80127e804f0 rsp=ffffb60074139998 rbp=000001c7ce965e5b
r8=000001c7ce965310 r9=0000000000000ba1 r10=ffffc081265c4ea0
r11=000001c7ce965eb1 r12=ffffb60074139c08 r13=ffffd087cbdde000
r14=ffffc081265c5000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlDecompressBufferXpressLz+0x50:
fffff801`27e804f0 418b08 mov ecx,dword ptr [r8] ds:002b:000001c7`ce965310=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/ hata durumu y z nden belle e yerle tirilmedi.
EXCEPTION_CODE_STR: c0000006
EXCEPTION_PARAMETER3: 00000000c000000e
EXCEPTION_STR: 0xc0000006
TRAP_FRAME: ffffb6007413a2a0 -- (.trap 0xffffb6007413a2a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc08125197180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012d47029c rsp=ffffb6007413a430 rbp=ffffb6007413a530
r8=0000000000000011 r9=000000000000002f r10=0000fffff80127e7
r11=ffffb07989e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
CLASSPNP!ClassDispatchPnp+0x6e8c:
fffff801`2d47029c ff ???
Resetting default scope
STACK_TEXT:
ffffb600`7413a430 fffff801`2d4283e3 : fffff801`28326ea0 fffff801`283239e0 ffffd087`d1e79700 4aca104a`78c34fc8 : CLASSPNP!ClassDispatchPnp+0x6e8c
ffffb600`7413a5b0 fffff801`27ecd805 : ffffb600`7413a628 ffffac11`4fa0feb1 ffffe106`db37fdb0 00000000`00000300 : CLASSPNP!ClassGlobalDispatch+0x23
ffffb600`7413a5e0 fffff801`27e99f6e : ffffb600`00000000 00000000`00000000 00000000`00000000 fffff801`27c0c440 : nt!IofCallDriver+0x55
ffffb600`7413a620 fffff801`2827bd21 : 00000000`00000000 00000000`00000280 ffffb600`7413a6d8 fffff801`27c0af28 : nt!IoSynchronousCallDriver+0x4e
ffffb600`7413a680 fffff801`2c5aecb6 : ffffb600`00000010 ffffb600`7413a6d0 00000000`00000001 ffffd087`c83c8a20 : nt!IoForwardIrpSynchronously+0x41
ffffb600`7413a6b0 fffff801`2c5ac2d9 : ffffd087`d1e79700 00000000`00000000 ffffb600`7413a850 fffff801`27ecd9e1 : partmgr!PmSurpriseRemoval+0x26
ffffb600`7413a6e0 fffff801`2c593cff : ffffd087`c83c88d0 00000000`00000000 ffffb600`7413a850 ffffd087`c8285050 : partmgr!PmPnp+0xf9
ffffb600`7413a730 fffff801`27ecd805 : 00000000`00000000 fffff801`27e03773 00000000`00000003 00000000`69706e04 : partmgr!PmGlobalDispatch+0x1f
ffffb600`7413a760 fffff801`281d4b48 : 00000000`00000000 ffffd087`c83c88d0 ffffb600`7413a850 ffffd087`c81a8c20 : nt!IofCallDriver+0x55
ffffb600`7413a7a0 fffff801`28339b31 : ffffd087`c8285050 ffffd087`c8285050 ffffd087`c81a8c20 00000000`00000017 : nt!IopSynchronousCall+0xf8
ffffb600`7413a810 fffff801`2833b944 : ffffe107`0c41ed80 00000000`00000000 00000000`0000030a 00000000`00000308 : nt!IopRemoveDevice+0x105
ffffb600`7413a8c0 fffff801`28339734 : ffffd087`c81a8c20 00000000`00000000 00000000`00000000 fffff801`2833967b : nt!PnpSurpriseRemoveLockedDeviceNode+0xb0
ffffb600`7413a920 fffff801`2833942f : ffffd087`c81a8c20 ffffb600`7413a9a0 00000000`00000000 fffff801`28339168 : nt!PnpDeleteLockedDeviceNode+0x88
ffffb600`7413a960 fffff801`28337b7a : ffffd087`c8285050 00000045`00000002 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7
ffffb600`7413a9e0 fffff801`28327c53 : ffffb600`7413ab20 ffffd087`c81a8c00 ffffb600`7413ab00 ffffe106`00000001 : nt!PnpProcessQueryRemoveAndEject+0x1da
ffffb600`7413aac0 fffff801`28208b1e : ffffe107`0c41ed80 ffffe106`f0229d20 ffffd087`c608d500 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xeb
ffffb600`7413aaf0 fffff801`27f035f5 : ffffd087`d583d040 ffffd087`d583d040 ffffd087`c608d520 ffffd087`d30e85e0 : nt!PnpDeviceEventWorker+0x2ce
ffffb600`7413ab70 fffff801`27ea2ae5 : ffffd087`d583d040 00000000`00000080 ffffd087`c60aa040 79010400`00000001 : nt!ExpWorkerThread+0x105
ffffb600`7413ac10 fffff801`27ffbbf8 : ffffc081`25447180 ffffd087`d583d040 fffff801`27ea2a90 0001eb01`7a2350e0 : nt!PspSystemThreadStartup+0x55
ffffb600`7413ac60 00000000`00000000 : ffffb600`7413b000 ffffb600`74135000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
STACK_COMMAND: .trap 0xffffb6007413a2a0 ; kb
SYMBOL_NAME: partmgr!PmSurpriseRemoval+26
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
IMAGE_VERSION: 10.0.19041.1030
BUCKET_ID_FUNC_OFFSET: 26
FAILURE_BUCKET_ID: 0x154_c0000006_c000000e_partmgr!PmSurpriseRemoval
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c74b6c8b-7b95-0433-ac99-4d7718353379}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80604051112, Address of the instruction which caused the bugcheck
Arg3: ffffdb0872043570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 31856
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80604051112
BUGCHECK_P3: ffffdb0872043570
BUGCHECK_P4: 0
CONTEXT: ffffdb0872043570 -- (.cxr 0xffffdb0872043570)
rax=0000000000000000 rbx=ffffdb0872043fd0 rcx=0000000000000007
rdx=00000000019a6818 rsi=000000000000010d rdi=ffffc78c64aa4000
rip=fffff80604051112 rsp=ffffdb0872043f78 rbp=ffffc78c64aa4000
r8=000000000000001c r9=ffffa38f88ef6080 r10=00000226c7327818
r11=0000000000000818 r12=0000000081edda76 r13=ffffdb0872044230
r14=000000000000010d r15=00000226c7370024
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff806`04051112 418b02 mov eax,dword ptr [r10] ds:002b:00000226`c7327818=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffdb08`72043f78 fffff806`040e0a7f : 00000000`ec2ba625 ffffdb08`720442e0 00000226`c76f8ac4 00000000`c0000034 : nt!HvpGetCellPaged+0xa2
ffffdb08`72043f80 fffff806`040e68b5 : 00000001`ffffffff 00000000`81edda76 00000000`ec2ba625 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffdb08`72043fd0 fffff806`040e99f9 : ffffc78c`6fdf59f0 00000000`00000005 ffffdb08`720441d0 ffffdb08`72044250 : nt!CmpWalkOneLevel+0x6f5
ffffdb08`720440d0 fffff806`040e82e3 : ffffa38f`0000001c ffffdb08`72044420 ffffdb08`720443d8 ffffa38f`8d4ec560 : nt!CmpDoParseKey+0x849
ffffdb08`72044370 fffff806`040ec3ae : fffff806`040e8001 00000000`00000000 ffffa38f`8d4ec560 00000000`6d4e6201 : nt!CmpParseKey+0x2c3
ffffdb08`72044510 fffff806`040f566a : ffffa38f`8d4ec500 ffffdb08`72044778 ffffa38f`00000040 ffffa38f`7eef10c0 : nt!ObpLookupObjectName+0x3fe
ffffdb08`720446e0 fffff806`040f544c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa38f`7eef10c0 : nt!ObOpenObjectByNameEx+0x1fa
ffffdb08`72044810 fffff806`040f4f71 : 000000a7`7edfcac0 ffffdb08`72044b80 00000000`00000001 fffff806`03c9ccce : nt!ObOpenObjectByName+0x5c
ffffdb08`72044860 fffff806`040f4c9f : 000000a7`7edfe89c 000000a7`7edfd258 00000208`4182de20 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffdb08`72044ac0 fffff806`03e05fb8 : ffffa38f`88ef0000 ffffa38f`8d9d8ce0 ffffdb08`72044b80 ffffa38f`00000238 : nt!NtOpenKeyEx+0xf
ffffdb08`72044b00 00007ffd`8568e184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a7`7edfc978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8568e184
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffdb0872043570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80072c51112, Address of the instruction which caused the bugcheck
Arg3: ffffd2052656a570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8531
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J7A11VA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 29979
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80072c51112
BUGCHECK_P3: ffffd2052656a570
BUGCHECK_P4: 0
CONTEXT: ffffd2052656a570 -- (.cxr 0xffffd2052656a570)
rax=0000000000000000 rbx=ffffd2052656afd0 rcx=0000000000000007
rdx=00000000045f9560 rsi=000000000000034e rdi=ffffbf8723a87000
rip=fffff80072c51112 rsp=ffffd2052656af78 rbp=ffffbf8723a87000
r8=000000000000001c r9=ffffaa873210c080 r10=0000017dc0a3a560
r11=0000000000000560 r12=00000000ce4cf905 r13=ffffd2052656b230
r14=000000000000034e r15=0000017dc095b024
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff800`72c51112 418b02 mov eax,dword ptr [r10] ds:002b:0000017d`c0a3a560=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffd205`2656af78 fffff800`72ce0a7f : 00000000`7f147a21 ffffd205`2656b2f0 00000000`00000000 ffffbf87`2ae5f7d0 : nt!HvpGetCellPaged+0xa2
ffffd205`2656af80 fffff800`72ce68b5 : 00000001`ffffffff 00000000`ce4cf905 ffffd205`2656b9e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffd205`2656afd0 fffff800`72ce99f9 : ffffbf87`2ae5f7d0 00000000`00000006 ffffd205`2656b1d0 ffffd205`2656b250 : nt!CmpWalkOneLevel+0x6f5
ffffd205`2656b0d0 fffff800`72ce82e3 : 00000000`0000001c ffffd205`2656b420 ffffd205`2656b3d8 ffffaa87`3057d270 : nt!CmpDoParseKey+0x849
ffffd205`2656b370 fffff800`72cec3ae : fffff800`72ce8001 00000000`00000000 ffffaa87`3057d270 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffd205`2656b510 fffff800`72cf566a : ffffaa87`3057d200 ffffd205`2656b778 00000000`00000040 ffffaa87`288f0bc0 : nt!ObpLookupObjectName+0x3fe
ffffd205`2656b6e0 fffff800`72cf544c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffaa87`288f0bc0 : nt!ObOpenObjectByNameEx+0x1fa
ffffd205`2656b810 fffff800`72cf4f71 : 000000d8`2ecfed98 ffffd205`2656bb80 00000000`00000001 fffff800`7289ccce : nt!ObOpenObjectByName+0x5c
ffffd205`2656b860 fffff800`72cf4c9f : 000001f2`5e6d78e0 000001f2`5e6d7900 000001f2`5c47f000 000001f2`5c48c7d0 : nt!CmOpenKey+0x2c1
ffffd205`2656bac0 fffff800`72a05fb8 : ffffaa87`3210c000 00000000`00000000 ffffd205`2656bb80 000001f2`5eb93060 : nt!NtOpenKeyEx+0xf
ffffd205`2656bb00 00007ffb`d10ae184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`2ecfecb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d10ae184
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .cxr 0xffffd2052656a570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------