SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000006, Exception code that caused the bugcheck
Arg2: FFFFF80208AD5F12, Address of the instruction which caused the bugcheck
Arg3: FFFFF285DDCFA570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, Zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key: Analysis. CPU. MSec
Value: 3968
Key: Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007E on DESKTOP-5A9OB4L
Key: Analysis. DebugData
Value: CreateObject
Key: Analysis. DebugModel
Value: CreateObject
Key: Analysis. Elapsed. MSec
Value: 18107
Key: Analysis. Memory. CommitPeak. MB
Value: 76
Key: Analysis. System
Value: CreateObject
Key: WER. OS. Branch
Value: VB_RELEASE
Key: WER. OS. Timestamp
Value: 2019-12-06T14:06:00Z
Key: WER. OS. Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3B
BUGCHECK_P1: C0000006
BUGCHECK_P2: FFFFF80208AD5F12
BUGCHECK_P3: FFFFF285DDCFA570
BUGCHECK_P4: 0
CONTEXT: FFFFF285DDCFA570 -- (.Cxr 0xfffff285ddcfa570)
Rax=0000000000000000 rbx=FFFFF285DDCFAfd0 rcx=0000000000000007
Rdx=00000000038EEDE8 rsi=0000000000000020 rdi=FFFFD085A6F43000
Rip=FFFFF80208AD5F12 rsp=FFFFF285DDCFAf78 rbp=FFFFD085A6F43000
R8=000000000000001C R9=FFFFE08F74933040 R10=0000016C876DFDE8
R11=0000000000000DE8 R12=0000000091666CCE R13=FFFFF285DDCFB230
R14=0000000000000020 R15=0000016C87745024
İopl=0 NV up ei PL nz na po NC
CS=0010 SS=0018 DS=002B es=002B fs=0053 GS=002B efl=00050206
Nt! HvpGetCellPaged+0xa2:
Fffff802'08AD5F12 418B02 mov eax, dword PTR [r10] DS:002b:0000016C'876dfde8=?
Resetting default scope
BLACKBOXBSD: 1 (!Blackboxbsd)
BLACKBOXNTFS: 1 (!Blackboxntfs)
BLACKBOXPNP: 1 (!Blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
Fffff285'ddcfaf78 fffff802'08A2612F: 00000000'36D990A1 fffff285'ddcfb2D0 0000016C'8783900C 00000000'C0000034: Nt! HvpGetCellPaged+0xa2
Fffff285'ddcfaf80 fffff802'089edab5: 00000001'ffffffff 00000000'91666CCE 00000000'36D990A1 00000000'00000000: Nt! CmpDoCompareKeyName+0x2F
Fffff285'ddcfafd0 fffff802'089F9F99: Ffffd085'B0387E10 00000000'00000004 fffff285'ddcfb1D0 fffff285'ddcfb250: Nt! CmpWalkOneLevel+0x6F5
Fffff285'ddcfb0D0 fffff802'089F1E63: Ffffd085'0000001C fffff285'ddcfB420 fffff285'ddcfb3D8 ffffe08F'7957A8A0: Nt! CmpDoParseKey+0x849
Fffff285'ddcfB370 fffff802'089F554E: Fffff802'089F1B01 00000000'00000000 ffffe08F'7957A8A0 00000000'00020001: Nt! CmpParseKey+0x2C3
Fffff285'ddcfB510 fffff802'089F0FAA: Ffffe08F'7957A800 fffff285'ddcfB778 00000000'00000040 ffffe08F'6B6BF560: Nt! ObpLookupObjectName+0x3FE
Fffff285'ddcfb6e0 fffff802'089F0D8C: 00000000'00000000 00000000'00000000 00000000'00000000 ffffe08F'6B6BF560: Nt! ObOpenObjectByNameEx+0x1FA
Fffff285'ddcfB810 fffff802'089F08B1: 00000000'046ED740 fffff285'ddcfbB80 00000000'00000001 fffff802'0860198E: Nt! ObOpenObjectByName+0x5C
Fffff285'ddcfB860 fffff802'089EFE9F: 00000000'0055E538 00000000'00000000 00000000'00000000 00000000'046EE1D8: Nt! CmOpenKey+0x2C1
Fffff285'ddcfbac0 fffff802'087EF478: 00000000'00000000 fffff285'ddcfbB80 fffff285'ddcfbB18 00000000'00000000: Nt! NtOpenKeyEx+0xf
Fffff285'ddcfbB00 00007FFF'4EB4D184: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: Nt! KiSystemServiceCopyEnd+0x28
00000000'046ED5F8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : 0x00007fff`4eb4d184
SYMBOL_NAME: Nt! HvpGetCellPaged+a2
MODULE_NAME: NT
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND:. Cxr 0xfffff285ddcfa570; KB
BUCKET_ID_FUNC_OFFSET: A2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: VB_RELEASE
OSPLATFORM_TYPE: X64
OSNAME: Windows 10
FAILURE_ID_HASH: {68F3DB38-AE8E-4BAE-C37A-85819946495F}
Followup: MachineOwner
---------