SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80763a9e3d2, Address of the instruction which caused the bugcheck
Arg3: ffffb80aba1fd570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6218
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13629
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80763a9e3d2
BUGCHECK_P3: ffffb80aba1fd570
BUGCHECK_P4: 0
CONTEXT: ffffb80aba1fd570 -- (.cxr 0xffffb80aba1fd570)
rax=0000000000000000 rbx=ffffb80aba1fdfd0 rcx=0000000000000007
rdx=00000000030ab918 rsi=000000000000036d rdi=ffff800315eea000
rip=fffff80763a9e3d2 rsp=ffffb80aba1fdf78 rbp=ffff800315eea000
r8=000000000000001c r9=ffffcd83664070c0 r10=0000020c5efcc918
r11=0000000000000918 r12=00000000ce4cf905 r13=ffffb80aba1fe230
r14=000000000000036d r15=0000020c5eee3024
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff807`63a9e3d2 418b02 mov eax,dword ptr [r10] ds:002b:0000020c`5efcc918=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffb80a`ba1fdf78 fffff807`63a1bbef : 00000000`7f147a21 ffffb80a`ba1fe2f0 00000000`00000000 ffff8003`2ebc2dc0 : nt!HvpGetCellPaged+0xa2
ffffb80a`ba1fdf80 fffff807`63a21a25 : 00000001`ffffffff 00000000`ce4cf905 ffffb80a`ba1fe9e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffb80a`ba1fdfd0 fffff807`63a24b69 : ffff8003`2ebc2dc0 00000000`00000006 ffffb80a`ba1fe1d0 ffffb80a`ba1fe250 : nt!CmpWalkOneLevel+0x6f5
ffffb80a`ba1fe0d0 fffff807`63a23453 : 00000000`0000001c ffffb80a`ba1fe420 ffffb80a`ba1fe3d8 ffffcd83`68daaa20 : nt!CmpDoParseKey+0x849
ffffb80a`ba1fe370 fffff807`63a2751e : fffff807`63a23101 00000000`00000000 ffffcd83`68daaa20 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffb80a`ba1fe510 fffff807`639eb19a : ffffcd83`68daaa00 ffffb80a`ba1fe778 00000000`00000040 ffffcd83`5c0f3380 : nt!ObpLookupObjectName+0x3fe
ffffb80a`ba1fe6e0 fffff807`639eaf7c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcd83`5c0f3380 : nt!ObOpenObjectByNameEx+0x1fa
ffffb80a`ba1fe810 fffff807`639eaaa1 : 00000085`f787e8c8 ffffb80a`ba1feb80 00000000`00000001 fffff807`6366119e : nt!ObOpenObjectByName+0x5c
ffffb80a`ba1fe860 fffff807`639ea7cf : 0000020f`cbc97086 0000020f`cbc97000 00000000`00000000 00000000`00000004 : nt!CmOpenKey+0x2c1
ffffb80a`ba1feac0 fffff807`638071b8 : 0000020f`cbc6b300 00000000`00000000 ffffb80a`ba1feb80 0000020f`cd0020e0 : nt!NtOpenKeyEx+0xf
ffffb80a`ba1feb00 00007ffc`4fcee3a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000085`f787e7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`4fcee3a4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .cxr 0xffffb80aba1fd570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff8013389e3d2, Address of the instruction which caused the bugcheck
Arg3: ffffb5893a2f3570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26183
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff8013389e3d2
BUGCHECK_P3: ffffb5893a2f3570
BUGCHECK_P4: 0
CONTEXT: ffffb5893a2f3570 -- (.cxr 0xffffb5893a2f3570)
rax=0000000000000000 rbx=ffffb5893a2f3fd0 rcx=0000000000000007
rdx=00000000030ab918 rsi=000000000000036d rdi=ffffc8807a2e5000
rip=fffff8013389e3d2 rsp=ffffb5893a2f3f78 rbp=ffffc8807a2e5000
r8=000000000000001c r9=ffff8008fa1eb540 r10=0000021ab070c918
r11=0000000000000918 r12=00000000ce4cf905 r13=ffffb5893a2f4230
r14=000000000000036d r15=0000021ab0623024
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff801`3389e3d2 418b02 mov eax,dword ptr [r10] ds:002b:0000021a`b070c918=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffffb589`3a2f3f78 fffff801`3381bbef : 00000000`7f147a21 ffffb589`3a2f42f0 00000000`00000287 ffffb589`3a2f4089 : nt!HvpGetCellPaged+0xa2
ffffb589`3a2f3f80 fffff801`33821a25 : 00000001`ffffffff 00000000`ce4cf905 ffffb589`3a2f49e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffb589`3a2f3fd0 fffff801`33824b69 : ffffc880`9101a3c0 00000000`00000006 ffffb589`3a2f41d0 ffffb589`3a2f4250 : nt!CmpWalkOneLevel+0x6f5
ffffb589`3a2f40d0 fffff801`33823453 : 00000000`0000001c ffffb589`3a2f4420 ffffb589`3a2f43d8 ffff8008`ff9e57b0 : nt!CmpDoParseKey+0x849
ffffb589`3a2f4370 fffff801`3382751e : fffff801`33823101 00000000`00000000 ffff8008`ff9e57b0 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffb589`3a2f4510 fffff801`337eb19a : ffff8008`ff9e5700 ffffb589`3a2f4778 00000000`00000040 ffff8008`f00f44e0 : nt!ObpLookupObjectName+0x3fe
ffffb589`3a2f46e0 fffff801`337eaf7c : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8008`f00f44e0 : nt!ObOpenObjectByNameEx+0x1fa
ffffb589`3a2f4810 fffff801`337eaaa1 : 00000061`82e7e828 ffffb589`3a2f4b80 00000000`00000001 fffff801`3346119e : nt!ObOpenObjectByName+0x5c
ffffb589`3a2f4860 fffff801`337ea7cf : 00000000`00000000 00000000`00000000 00000061`82e7eb60 000001b6`1408bff8 : nt!CmOpenKey+0x2c1
ffffb589`3a2f4ac0 fffff801`336071b8 : 00000000`00000000 00000000`00000000 ffffb589`3a2f4b80 000001b6`1681be80 : nt!NtOpenKeyEx+0xf
ffffb589`3a2f4b00 00007ff9`b3e4e3a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000061`82e7e748 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b3e4e3a4
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .cxr 0xffffb5893a2f3570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80730c51112, Address of the instruction which caused the bugcheck
Arg3: fffffb8e5f18d570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5609
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21496
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80730c51112
BUGCHECK_P3: fffffb8e5f18d570
BUGCHECK_P4: 0
CONTEXT: fffffb8e5f18d570 -- (.cxr 0xfffffb8e5f18d570)
rax=0000000000000000 rbx=fffffb8e5f18dfd0 rcx=0000000000000007
rdx=00000000028a5c70 rsi=0000000000000153 rdi=ffffd58232be8000
rip=fffff80730c51112 rsp=fffffb8e5f18df78 rbp=ffffd58232be8000
r8=000000000000001c r9=ffffa0023a745080 r10=0000021390b26c70
r11=0000000000000c70 r12=00000000a88ef046 r13=fffffb8e5f18e230
r14=0000000000000153 r15=0000021391a80024
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff807`30c51112 418b02 mov eax,dword ptr [r10] ds:002b:00000213`90b26c70=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
fffffb8e`5f18df78 fffff807`30ce0a7f : 00000000`e9c5e935 fffffb8e`5f18e2f0 00000213`91a79ff4 00000000`c0000034 : nt!HvpGetCellPaged+0xa2
fffffb8e`5f18df80 fffff807`30ce68b5 : 00000001`ffffffff 00000000`a88ef046 00000000`e9c5e935 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
fffffb8e`5f18dfd0 fffff807`30ce99f9 : ffffd582`5c907d70 00000000`00000006 fffffb8e`5f18e1d0 fffffb8e`5f18e250 : nt!CmpWalkOneLevel+0x6f5
fffffb8e`5f18e0d0 fffff807`30ce82e3 : 00000000`0000001c fffffb8e`5f18e420 fffffb8e`5f18e3d8 ffffa002`3cf2e010 : nt!CmpDoParseKey+0x849
fffffb8e`5f18e370 fffff807`30cec3ae : fffff807`30ce8001 00000000`00000000 ffffa002`3cf2e010 00000000`6d4e6201 : nt!CmpParseKey+0x2c3
fffffb8e`5f18e510 fffff807`30cf566a : ffffa002`3cf2e000 fffffb8e`5f18e778 00000000`00000040 ffffa002`2acf5820 : nt!ObpLookupObjectName+0x3fe
fffffb8e`5f18e6e0 fffff807`30cf544c : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa002`2acf5820 : nt!ObOpenObjectByNameEx+0x1fa
fffffb8e`5f18e810 fffff807`30cf4f71 : 000000aa`debfe768 fffffb8e`5f18eb80 00000000`00000001 fffff807`3089cb8e : nt!ObOpenObjectByName+0x5c
fffffb8e`5f18e860 fffff807`30cf4c9f : 00000276`8399a046 00000000`00000000 00000000`0000001b 00000000`00000006 : nt!CmOpenKey+0x2c1
fffffb8e`5f18eac0 fffff807`30a06bb8 : 000000aa`debfe800 00000000`00000000 fffffb8e`5f18eb80 00000276`836c5180 : nt!NtOpenKeyEx+0xf
fffffb8e`5f18eb00 00007ffb`fed6e194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000aa`debfe688 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`fed6e194
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xfffffb8e5f18d570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffff93845aa02e10, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 0000000181a8a8c0, current process (virtual address for lock type 3, or PTE)
Arg4: fffff80628cb0000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 34539
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7a
BUGCHECK_P1: ffff93845aa02e10
BUGCHECK_P2: ffffffffc000000e
BUGCHECK_P3: 181a8a8c0
BUGCHECK_P4: fffff80628cb0000
ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.
DISK_HARDWARE_ERROR: There was error with disk hardware
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff9057acc3300 -- (.trap 0xfffff9057acc3300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80628caff00 rbx=0000000000000000 rcx=0000000000005a4d
rdx=fffff80628cb0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80622a7db45 rsp=fffff9057acc3498 rbp=fffff9057acc3588
r8=0000000000000000 r9=fffff9057acc34f0 r10=0000000000000000
r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlImageNtHeaderEx+0x35:
fffff806`22a7db45 66390a cmp word ptr [rdx],cx ds:fffff806`28cb0000=????
Resetting default scope
STACK_TEXT:
fffff905`7acc2f58 fffff806`22ab6e29 : 00000000`0000007a ffff9384`5aa02e10 ffffffff`c000000e 00000001`81a8a8c0 : nt!KeBugCheckEx
fffff905`7acc2f60 fffff806`22ab4b35 : fffff905`00001000 fffff905`7acc3000 fffff905`7acc30f0 fffff806`00000000 : nt!MiWaitForInPageComplete+0x7d9
fffff905`7acc3050 fffff806`22a0c9c8 : 00000000`c0033333 00000000`00000000 fffff806`28cb0000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffff905`7acc3160 fffff806`22c0395e : 00000000`00000000 00000000`00200040 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468
fffff905`7acc3300 fffff806`22a7db45 : fffff806`22b3aa93 fffff806`22b21da0 fffff806`22bcdf48 00000000`00000000 : nt!KiPageFault+0x35e
fffff905`7acc3498 fffff806`22b3aa93 : fffff806`22b21da0 fffff806`22bcdf48 00000000`00000000 00000000`00000000 : nt!RtlImageNtHeaderEx+0x35
fffff905`7acc34a0 fffff806`22b3aa1c : 00000000`00000000 00000000`00000000 fffff905`7acc38a0 00000000`00000000 : nt!RtlpImageDirectoryEntryToDataEx+0x5b
fffff905`7acc34f0 fffff806`22ef85ef : 00000000`00000800 00000000`00000000 fffff905`7acc38a0 00000000`00000004 : nt!RtlImageDirectoryEntryToData+0x1c
fffff905`7acc3540 fffff806`22b3a6d7 : fffff905`7acc3878 00000000`00000000 fffff905`7acc3878 fffff806`22b3bf12 : nt!LdrpSearchResourceSection_U+0xff
fffff905`7acc3690 fffff806`22ef89de : 00000000`00000003 00000000`00000004 00000000`00000002 00000000`00000000 : nt!LdrpLoadResourceFromAlternativeModule+0xa3
fffff905`7acc36e0 fffff806`22efc09a : 00640072`00000000 006b0073`00690064 00520044`005c0030 00000000`00200040 : nt!LdrpSearchResourceSection_U+0x4ee
fffff905`7acc3830 fffff806`28361169 : 00000000`00000000 ffffa90e`3336a6e8 00000000`00000000 00000000`00000000 : nt!RtlFindMessage+0x6a
fffff905`7acc38c0 fffff806`2835e084 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsMessageText+0x39
fffff905`7acc3900 fffff806`22a25975 : ffffa90e`350bb400 ffffa90e`350bb400 ffffa90e`2949b520 00000000`00000000 : Ntfs!NtfsTelemetryLogFileObjectInfo+0xd4
fffff905`7acc3b70 fffff806`22b17e25 : ffffa90e`350bb400 00000000`00000080 ffffa90e`29491040 00000000`00000001 : nt!ExpWorkerThread+0x105
fffff905`7acc3c10 fffff806`22bfcdd8 : ffffd281`2b080180 ffffa90e`350bb400 fffff806`22b17dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffff905`7acc3c60 00000000`00000000 : fffff905`7acc4000 fffff905`7acbe000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiWaitForInPageComplete+7d9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 7d9
FAILURE_BUCKET_ID: 0x7a_c000000e_nt!MiWaitForInPageComplete
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {329318b9-5fab-73eb-d104-f79603e1bdb3}
Followup: MachineOwner
---------
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffffd98a6e297da8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 000000010edc9860, current process (virtual address for lock type 3, or PTE)
Arg4: ffff983084bb5f60, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6561
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17327
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7a
BUGCHECK_P1: ffffd98a6e297da8
BUGCHECK_P2: ffffffffc000000e
BUGCHECK_P3: 10edc9860
BUGCHECK_P4: ffff983084bb5f60
ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.
DISK_HARDWARE_ERROR: There was error with disk hardware
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffffee0fb6745a80 -- (.trap 0xffffee0fb6745a80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb40fd1afee60 rbx=0000000000000000 rcx=ffff98530061b050
rdx=ffff985300830930 rsi=0000000000000000 rdi=0000000000000000
rip=ffff983084bb5f60 rsp=ffffee0fb6745c18 rbp=ffffee0fb6745ce9
r8=ffffee0fb6745b50 r9=0000000000000000 r10=ffff983084bb5f60
r11=ffffee0fb6745ae0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
win32kbase!CancelCapturedMipOverride:
ffff9830`84bb5f60 4883ec28 sub rsp,28h
Resetting default scope
STACK_TEXT:
ffffee0f`b67456d8 fffff805`362b6e29 : 00000000`0000007a ffffd98a`6e297da8 ffffffff`c000000e 00000001`0edc9860 : nt!KeBugCheckEx
ffffee0f`b67456e0 fffff805`362b4b35 : ffffee0f`00008000 ffffee0f`b6745800 ffffee0f`b6745870 fffff805`00000000 : nt!MiWaitForInPageComplete+0x7d9
ffffee0f`b67457d0 fffff805`3620c9c8 : 00000000`c0033333 00000000`00000000 ffff9830`84bb5f60 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffee0f`b67458e0 fffff805`3640395e : 00000000`00000000 ffffb40f`d1aa6070 00000000`00000004 fffff805`36250cb9 : nt!MmAccessFault+0x468
ffffee0f`b6745a80 ffff9830`84bb5f60 : ffff9830`84e84dba 00000000`00000000 00000000`0000002e ffff9853`06a304f0 : nt!KiPageFault+0x35e
ffffee0f`b6745c18 ffff9830`84e84dba : 00000000`00000000 00000000`0000002e ffff9853`06a304f0 00000000`00000000 : win32kbase!CancelCapturedMipOverride
ffffee0f`b6745c20 ffff9830`84dbb061 : ffff9853`0061b050 00000000`00000000 ffffffff`00000000 ffffee0f`b6745e88 : win32kfull!xxxDoHotKeyStuff+0xc9d2a
ffffee0f`b6745d50 ffff9830`84a69100 : ffffffff`ffffffff ffff9853`0061b050 ffff9853`04ebb620 ffffee0f`b6745dd0 : win32kfull!EditionDoHotKeys+0x21
ffffee0f`b6745d80 ffff9830`84a68b78 : ffffffff`ffffffff ffffee0f`b6745ec9 00000000`0000002e ffff9853`0061b050 : win32kbase!ApiSetEditionDoHotKeys+0xac
ffffee0f`b6745de0 ffff9830`84a68982 : ffffee0f`b67460e0 ffffee0f`b6745fc9 00000000`00000000 ffffee0f`b67460e0 : win32kbase!xxxUpdateGlobalsAndSendKeyEvent+0x1b8
ffffee0f`b6745f10 ffff9830`84bb8e8a : ffffee0f`b6740100 ffffee0f`b67460d0 00000000`021ec2f5 00000000`00000000 : win32kbase!xxxKeyEventEx+0x1e2
ffffee0f`b6746010 ffff9830`84bb8b07 : ffff9853`00606a30 00000000`00000000 ffffee0f`b6746190 ffffb40f`d25290c8 : win32kbase!xxxProcessKeyEvent+0x2da
ffffee0f`b6746090 ffff9830`84baa508 : 00000000`00000000 ffffb40f`d1aa6f70 ffff9853`00606a30 ffff73ff`d4a00000 : win32kbase!ProcessKeyboardInputWorker+0x837
ffffee0f`b67461f0 ffff9830`84baa389 : ffff9830`84c5b6d0 ffffee0f`b6746301 00000000`00000000 ffffb40f`d2434620 : win32kbase!CKeyboardProcessor::ProcessInputNoLock+0xdc
ffffee0f`b6746220 ffff9830`84bb2d3d : ffff9853`006069e0 ffffb40f`d2529070 00000000`0000000c 00000000`00000000 : win32kbase!CKeyboardProcessor::ProcessInput+0x491
ffffee0f`b6746360 ffff9830`84bac04a : ffff9830`84c10700 ffffee0f`b67464a0 ffff9853`006069e0 ffff9830`84c51970 : win32kbase!CKeyboardSensor::ProcessInput+0x5d
ffffee0f`b67463a0 ffff9830`84a64c1d : 00000000`00000040 ffff9830`84c10700 00000000`00000001 00000000`00000000 : win32kbase!CBaseInput::OnReadNotification+0x52a
ffffee0f`b67464e0 ffff9830`84a64d52 : ffffb40f`d2524080 ffff9853`0069c240 00000000`00000006 ffff33fb`daabcd52 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
ffffee0f`b6746620 ffff9830`84a586de : ffff9830`84c582a0 ffff9853`0069c240 ffff9830`84c51970 00000000`00000001 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffee0f`b6746650 ffff9830`84a58430 : 00000000`00000006 ffff9830`84c582a0 00000000`00000001 ffff9853`030f2300 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffffee0f`b6746680 ffff9830`84d99e7f : 00000000`0000000f 00000000`00000001 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffffee0f`b67467b0 ffff9830`84ac60c3 : ffffb40f`d2524080 ffffb40f`d2524080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffffee0f`b6746970 ffff9830`84d38d80 : ffffb40f`d2524080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffee0f`b6746aa0 ffff9830`8579474d : ffffb40f`d2524080 ffffb40f`d2524080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffee0f`b6746ad0 fffff805`364071b8 : ffffb40f`00000005 00000000`00000005 00000242`622041d0 00000000`000004a8 : win32k!NtUserCallNoParam+0x15
ffffee0f`b6746b00 00007ffa`75e710e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b3`19cbfd38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`75e710e4
SYMBOL_NAME: win32kfull!xxxDoHotKeyStuff+c9d2a
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.662
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c9d2a
FAILURE_BUCKET_ID: 0x7a_c000000e_win32kfull!xxxDoHotKeyStuff
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {aa029fec-9ea3-bc99-2cd2-7ccae0765f65}
Followup: MachineOwner
---------
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffff95847840dbb0, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 0000000002e1e860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff8021cb928b0, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 60458
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7a
BUGCHECK_P1: ffff95847840dbb0
BUGCHECK_P2: ffffffffc000000e
BUGCHECK_P3: 2e1e860
BUGCHECK_P4: fffff8021cb928b0
ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.
DISK_HARDWARE_ERROR: There was error with disk hardware
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffb06797fc740 -- (.trap 0xfffffb06797fc740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8021cb928b0 rbx=0000000000000000 rcx=ffff958494a061c8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021cb928b0 rsp=fffffb06797fc8d8 rbp=fffffb06797fc9e0
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8021cb9
r11=ffff96ffc8a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
Vid!VidTracepEtwCallback:
fffff802`1cb928b0 4d ???
Resetting default scope
STACK_TEXT:
fffffb06`797fc398 fffff802`10b19e69 : 00000000`0000007a ffff9584`7840dbb0 ffffffff`c000000e 00000000`02e1e860 : nt!KeBugCheckEx
fffffb06`797fc3a0 fffff802`10b176f5 : fffffb06`00008000 fffffb06`797fc500 fffffb06`797fc530 fffff802`00000000 : nt!MiWaitForInPageComplete+0x7d9
fffffb06`797fc490 fffff802`10aea508 : 00000000`c0033333 00000000`00000000 fffff802`1cb928b0 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffffb06`797fc5a0 fffff802`10c0335e : 00000000`00000001 00000000`00000fff 00000000`00000000 ffffa701`1caa1180 : nt!MmAccessFault+0x468
fffffb06`797fc740 fffff802`1cb928b0 : fffff802`10e35280 ffff9584`77a00100 00000000`00000000 00000000`000001c0 : nt!KiPageFault+0x35e
fffffb06`797fc8d8 fffff802`10e35280 : ffff9584`77a00100 00000000`00000000 00000000`000001c0 00000000`000007ad : Vid!VidTracepEtwCallback
fffffb06`797fc8e0 fffff802`10e37220 : 00000000`00000000 fffffb06`797fca99 ffff9584`94a06190 ffffe68e`f2e66020 : nt!EtwpSendDataBlock+0x13c
fffffb06`797fca30 fffff802`10e36de2 : fffff780`00000380 fffff780`00000380 ffffe68e`f2e66020 ffffe68e`f2642000 : nt!EtwpClearSessionAndUnreferenceEntry+0x26c
fffffb06`797fcb00 fffff802`10e3ae03 : fffffb06`797fcbc0 ffffe68e`f24a1640 00000000`00000000 00000000`00000004 : nt!EtwpDisableTraceProviders+0x4a
fffffb06`797fcb50 fffff802`1102b4bf : ffffe68e`f24a1640 00000000`00000000 ffffffff`fffffffd ffffe68e`fd670180 : nt!EtwpStopLoggerInstance+0x4b
fffffb06`797fcb90 fffff802`10aa29a5 : ffffffff`fffffffd ffffe68e`f2590080 00000000`00000080 fffff802`10eb5dc0 : nt!EtwpLogger+0x1756ff
fffffb06`797fcc10 fffff802`10bfc868 : ffffa701`1cb5c180 ffffe68e`f2590080 fffff802`10aa2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffb06`797fcc60 00000000`00000000 : fffffb06`797fd000 fffffb06`797f7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
CHKIMG_EXTENSION: !chkimg -lo 50 -db !Vid
3272 errors : !Vid (fffff8021cb92000-fffff8021cb92fff)
fffff8021cb92000 *00 *00 *00 *cc *d6 *84 *02 *41 *b9 *cc *d6 *84 *02 *4c *8d *45 .......A.....L.E
fffff8021cb92010 *78 *48 *8b 4d 38 e8 22 cf ea ff 89 85 88 00 00 *00 xH.M8.".........
fffff8021cb92020 *48 *c7 *c0 00 *00 *00 *00 *48 *83 *c4 *20 *5d *c3 *48 *89 *54 H......H.. ].H.T
fffff8021cb92030 *24 *10 *55 *48 *83 *ec *20 *48 *8b *ea *48 *8d *05 *0f *7d *01 $.UH.. H..H...}.
fffff8021cb92040 *00 *48 *89 *45 58 0f 57 c0 0f 11 45 60 c7 85 8c 00 .H.EX.W...E`....
fffff8021cb92050 *00 *00 *cd *d6 *84 *02 *41 *b9 *cd *d6 *84 *02 *4c *8d *45 *78 ......A.....L.Ex
fffff8021cb92060 *48 *8b *4d *38 *e8 *d3 *ce *ea *ff *89 *85 *88 *00 *00 *00 48 H.M8...........H
fffff8021cb92070 *8d *05 *da *7c *01 *00 *48 *89 *45 *58 *48 *8d *4d *60 *ff *15 ...|..H.EXH.M`..
fffff8021cb92080 *64 *72 *01 *00 *48 *c7 *c0 *00 *00 *00 *00 *48 *83 *c4 *20 *5d dr..H......H.. ]
fffff8021cb92090 *c3 *48 *89 *54 *24 *10 *53 *55 *48 *83 *ec *28 *48 *8b *ea 48 .H.T$.SUH..(H..H
fffff8021cb920a0 8b *5d *48 *48 *8d *53 *68 *48 *8d *4d *48 *e8 *4c *7c *27 *ff .]HH.ShH.MH.L|'.
fffff8021cb920b0 48 *8d *8b *68 *01 *00 *00 *e8 *dc *bc *ea *ff *33 *d2 *33 *c9 H..h........3.3.
fffff8021cb920c0 *e8 *ee *0d *fd *ff *90 *90 *90 *48 *8d *4a *70 *e9 *3f *4b *9e ........H.Jp.?K.
fffff8021cb920d0 *ff *90 *90 *90 *48 *89 *54 *24 *10 *55 *48 *83 *ec *20 *48 *8b ....H.T$.UH.. H.
fffff8021cb920e0 *ea *48 *8b *55 *60 *8b *42 *68 *83 *e8 *04 *f7 *d8 *1b *c0 *83 .H.U`.Bh........
fffff8021cb920f0 *c0 *07 89 *45 *7c *41 *b9 *4e *90 *44 *23 *4c *8d *45 *70 *48 ...E|A.N.D#L.EpH
fffff8021cb92100 *8b *4d *28 *e8 *d4 *bb *ea *ff *48 *c7 *c0 *00 *00 *00 *00 *48 .M(.....H......H
fffff8021cb92110 *83 *c4 *20 *5d *c3 *48 *89 *54 *24 *10 *55 *48 *83 *ec *20 *48 .. ].H.T$.UH.. H
fffff8021cb92120 *8b *ea *41 *b9 *dc *d6 *84 *02 *4c *8d *45 *70 *48 *8b *55 *68 ..A.....L.EpH.Uh
fffff8021cb92130 *48 *8b *4d *28 *e8 *a3 *bb *ea *ff *48 *c7 *c0 *00 *00 *00 *00 H.M(.....H......
fffff8021cb92140 48 *83 *c4 *20 *5d *c3 *90 *90 *90 *90 *90 *90 *90 *90 *90 *90 H.. ]...........
fffff8021cb92150 48 89 *54 *24 *10 *55 *48 *83 *ec *20 *48 *8b *ea *c7 85 *84 H.T$.UH.. H.....
fffff8021cb92160 *00 *00 *00 *dd *d6 *84 *02 *41 *b9 *dd *d6 84 02 4c 8d 45 .......A.....L.E
fffff8021cb92170 70 48 8b 4d 28 e8 c2 *cd *ea ff *89 *85 *80 *00 *00 *00 pH.M(...........
fffff8021cb92180 *48 *c7 *c0 *00 *00 *00 *00 *48 *83 *c4 *20 *5d *c3 *48 *89 *54 H......H.. ].H.T
fffff8021cb92190 *24 *10 *55 48 *83 *ec *20 *48 *8b *ea *48 *8d *05 *af *7b *01 $.UH.. H..H...{.
fffff8021cb921a0 *00 *48 *89 *45 *30 *0f *57 *c0 *0f *11 *45 *38 *c7 *85 *84 *00 .H.E0.W...E8....
fffff8021cb921b0 *00 *00 *4f *52 *39 *23 *41 *b9 *4f *52 *39 *23 *4c *8d *45 *70 ..OR9#A.OR9#L.Ep
fffff8021cb921c0 *48 *8b *4d *28 *e8 *73 *cd *ea *ff *89 *85 *80 *00 *00 *00 *48 H.M(.s.........H
fffff8021cb921d0 *8d *05 *7a *7b 01 00 *48 *89 *45 *30 *48 *8d *4d *38 *ff *15 ..z{..H.E0H.M8..
fffff8021cb921e0 *04 *71 *01 *00 *48 *c7 *c0 *00 *00 00 *00 *48 *83 *c4 *20 *5d .q..H......H.. ]
fffff8021cb921f0 *c3 *48 *89 *54 24 *10 *55 *48 *83 *ec 30 *48 *8b *ea *41 *b9 .H.T$.UH..0H..A.
fffff8021cb92200 *e3 *d6 *84 02 4c 8b 85 c8 00 00 00 48 8b 55 50 *48 ....L......H.UPH
fffff8021cb92210 *8b *8d *c0 *00 *00 *00 *e8 *c1 *ba *ea *ff *48 *c7 *c0 00 00 ...........H....
fffff8021cb92220 00 00 48 83 c4 30 5d c3 48 89 *54 *24 *10 *53 55 48 ..H..0].H.T$.SUH
fffff8021cb92230 83 ec 38 48 8b ea 48 8b 9d c8 *00 *00 *00 *c7 *43 *14 ..8H..H.......C.
fffff8021cb92240 00 *d7 *84 *02 *41 *b9 00 *d7 *84 *02 *4c *8b *c3 *48 *8b 8d ....A.....L..H..
fffff8021cb92250 c0 00 00 00 e8 e3 cc ea ff 89 43 *10 *48 *c7 *c0 *00 ..........C.H...
fffff8021cb92260 *00 *00 *00 *48 *83 *c4 *38 *5d *5b *c3 *90 *90 *48 *89 *54 *24 ...H..8][...H.T$
fffff8021cb92270 *10 *53 *55 *48 *83 *ec *38 *48 *8b *ea *48 *8d *05 *cf *7a *01 .SUH..8H..H...z.
fffff8021cb92280 *00 *48 *89 *45 *58 *0f *57 *c0 *0f *11 *45 *60 *48 *8b *9d *c8 .H.EX.W...E`H...
fffff8021cb92290 *00 *00 *00 *c7 *43 *14 *01 *d7 *84 *02 *41 *b9 *01 *d7 *84 *02 ....C.....A.....
fffff8021cb922a0 *4c *8b *c3 *48 *8b 8d *c0 *00 *00 *00 *e8 *8d *cc *ea *ff *89 L..H............
fffff8021cb922b0 *43 *10 *48 *8d *05 *97 *7a *01 *00 *48 *89 *45 *58 *48 *8d *4d C.H...z..H.EXH.M
fffff8021cb922c0 *60 *ff *15 *21 *70 *01 *00 *48 *c7 *c0 00 00 00 *00 *48 *83 `..!p..H......H.
fffff8021cb922d0 *c4 *38 *5d *5b *c3 *48 *8b *4a *28 *48 *83 *c1 *10 *e9 *be *82 .8][.H.J(H......
fffff8021cb922e0 *9f *ff *48 *8b *4a *28 *48 *83 *c1 *68 *e9 *61 *32 *46 *ff *48 ..H.J(H..h.a2F.H
fffff8021cb922f0 *8b *4a *28 *48 *81 *c1 *d0 *00 *00 *00 *e9 *f1 *a5 *e8 *ff *40 .J(H...........@
fffff8021cb92300 *55 *48 *83 *ec *20 *48 *8b *ea *8b *45 *20 *83 *e0 *02 *85 *c0 UH.. H...E .....
fffff8021cb92310 *74 *0d *83 *65 *20 *fd *48 *8d *4d *30 *e8 *a1 *a4 *93 *ff *48 t..e .H.M0.....H
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE_4096
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_4096
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8d7aaa06-783f-2252-c9f3-768cf1e213bd}
Followup: memory_corruption
---------
0: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.2, DMIVersion 0, Size=2279]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = F51
BiosReleaseDate = 07/29/2020
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = B450M S2H
SystemFamily = B450 MB
SystemVersion = Default string
SystemSKU = Default string
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = B450M S2H
BaseBoardVersion = x.x
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80081051112, Address of the instruction which caused the bugcheck
Arg3: ffff8e8822b55570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6592
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-KTSBH2V
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25220
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000006
BUGCHECK_P2: fffff80081051112
BUGCHECK_P3: ffff8e8822b55570
BUGCHECK_P4: 0
CONTEXT: ffff8e8822b55570 -- (.cxr 0xffff8e8822b55570)
rax=0000000000000000 rbx=ffff8e8822b55fd0 rcx=0000000000000007
rdx=000000000299e470 rsi=000000000000036d rdi=ffffa883383b2000
rip=fffff80081051112 rsp=ffff8e8822b55f78 rbp=ffffa883383b2000
r8=000000000000001c r9=ffff960ad7fe03c0 r10=000001c8b401f470
r11=0000000000000470 r12=00000000ce4cf905 r13=ffff8e8822b56230
r14=000000000000036d r15=000001c8b3f36024
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff800`81051112 418b02 mov eax,dword ptr [r10] ds:002b:000001c8`b401f470=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
ffff8e88`22b55f78 fffff800`810e0a7f : 00000000`7f147a21 ffff8e88`22b562f0 00000000`00000000 ffffa883`4f729a30 : nt!HvpGetCellPaged+0xa2
ffff8e88`22b55f80 fffff800`810e68b5 : 00000001`ffffffff 00000000`ce4cf905 ffff8e88`22b569e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffff8e88`22b55fd0 fffff800`810e99f9 : ffffa883`4f729a30 00000000`00000006 ffff8e88`22b561d0 ffff8e88`22b56250 : nt!CmpWalkOneLevel+0x6f5
ffff8e88`22b560d0 fffff800`810e82e3 : 00000000`0000001c ffff8e88`22b56420 ffff8e88`22b563d8 ffff960a`daaf1a20 : nt!CmpDoParseKey+0x849
ffff8e88`22b56370 fffff800`810ec3ae : fffff800`810e8001 00000000`00000000 ffff960a`daaf1a20 00000000`00000001 : nt!CmpParseKey+0x2c3
ffff8e88`22b56510 fffff800`810f566a : ffff960a`daaf1a00 ffff8e88`22b56778 00000000`00000040 ffff960a`cccf5560 : nt!ObpLookupObjectName+0x3fe
ffff8e88`22b566e0 fffff800`810f544c : 00000000`00000000 00000000`00000000 00000000`00000000 ffff960a`cccf5560 : nt!ObOpenObjectByNameEx+0x1fa
ffff8e88`22b56810 fffff800`810f4f71 : 00000021`303fe6f8 ffff8e88`22b56b80 00000000`00000001 fffff800`80c9cb8e : nt!ObOpenObjectByName+0x5c
ffff8e88`22b56860 fffff800`810f4c9f : fffff800`80df1300 fffff800`80d3160e 000001eb`8d5f3a00 ffff8e88`22b56a88 : nt!CmOpenKey+0x2c1
ffff8e88`22b56ac0 fffff800`80e06bb8 : 00000000`00000002 00000000`00000000 ffff8e88`22b56b80 000001eb`8dbeb4e0 : nt!NtOpenKeyEx+0xf
ffff8e88`22b56b00 00007ffe`bf46e194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000021`303fe618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`bf46e194
SYMBOL_NAME: nt!HvpGetCellPaged+a2
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffff8e8822b55570 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}
Followup: MachineOwner
---------