Çözüldü KERNEL_DATA_INPAGE_ERROR (7a) mavi ekran

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.
İşletim sistemi
Windows 10
Çözüm
SSD sorunu gibi. Garantiye gönderin.


Kod:
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffa78f4823c140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7606

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffa78f4823c140

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000

ERROR_CODE: (NTSTATUS) 0x497e0080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
ffffe108`92ad0d88 fffff801`3e7068e2     : 00000000`000000ef ffffa78f`4823c140 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffe108`92ad0d90 fffff801`3e649b39     : 00000000`00000001 fffff801`3e15971d 00000000`00000002 fffff801`3e158d37 : nt!PspCatchCriticalBreak+0x10e
ffffe108`92ad0e30 fffff801`3e509724     : ffffa78f`00000000 00000000`00000000 ffffa78f`4823c140 ffffa78f`4823c578 : nt!PspTerminateAllThreads+0x140b4d
ffffe108`92ad0ea0 fffff801`3e509a4c     : ffffa78f`4823c140 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffe108`92ad0ee0 fffff801`3e2071b8     : ffffa78f`4823c140 ffffa78f`497e0080 ffffe108`92ad0fd0 fffff801`3e51da92 : nt!NtTerminateProcess+0x9c
ffffe108`92ad0f50 fffff801`3e1f95e0     : fffff801`3e291307 ffffe108`92ad1a58 ffffe108`92ad1a58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffffe108`92ad10e8 fffff801`3e291307     : ffffe108`92ad1a58 ffffe108`92ad1a58 ffffffff`ffffffff 00007ffc`0afc3000 : nt!KiServiceLinkage
ffffe108`92ad10f0 fffff801`3e2078ac     : 00000000`00001000 ffffe108`92ad1b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166907
ffffe108`92ad1920 fffff801`3e203a43     : 00007ffc`0d92fe3e 00000000`00000000 ffffe108`92ad1b80 ffffa78f`497e0080 : nt!KiExceptionDispatch+0x12c
ffffe108`92ad1b00 00007ffc`0d8db3de     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
000000fa`3cac0eb0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d8db3de


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_497e0080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f675ca05-0aff-fb30-f6f7-79e7272cdd81}

Followup:     MachineOwner
---------

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffffd5852f289da8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 00000000b3552860, current process (virtual address for lock type 3, or PTE)
Arg4: ffff8453269b5f60, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3843

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4857

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffffd5852f289da8

BUGCHECK_P2: ffffffffc000000e

BUGCHECK_P3: b3552860

BUGCHECK_P4: ffff8453269b5f60

ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.

DISK_HARDWARE_ERROR: There was error with disk hardware

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffffb182e2ca6a80 -- (.trap 0xffffb182e2ca6a80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8c06cdbf6620 rbx=0000000000000000 rcx=ffff8417006248a0
rdx=ffff841700830930 rsi=0000000000000000 rdi=0000000000000000
rip=ffff8453269b5f60 rsp=ffffb182e2ca6c18 rbp=ffffb182e2ca6ce9
 r8=ffffb182e2ca6b50  r9=0000000000000000 r10=ffff8453269b5f60
r11=ffffb182e2ca6ae0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kbase!CancelCapturedMipOverride:
ffff8453`269b5f60 4883ec28        sub     rsp,28h
Resetting default scope

STACK_TEXT: 
ffffb182`e2ca66d8 fffff803`52eb6e29     : 00000000`0000007a ffffd585`2f289da8 ffffffff`c000000e 00000000`b3552860 : nt!KeBugCheckEx
ffffb182`e2ca66e0 fffff803`52eb4b35     : ffffb182`00008000 ffffb182`e2ca6800 ffffb182`e2ca6870 fffff803`00000000 : nt!MiWaitForInPageComplete+0x7d9
ffffb182`e2ca67d0 fffff803`52e0c9c8     : 00000000`c0033333 00000000`00000000 ffff8453`269b5f60 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffb182`e2ca68e0 fffff803`5300395e     : 00000000`00000000 ffff8c06`d60a65f0 00000000`00000000 fffff803`52e50cb9 : nt!MmAccessFault+0x468
ffffb182`e2ca6a80 ffff8453`269b5f60     : ffff8453`26c84dba 00000000`00000000 00000000`0000002e ffff8417`071e5780 : nt!KiPageFault+0x35e
ffffb182`e2ca6c18 ffff8453`26c84dba     : 00000000`00000000 00000000`0000002e ffff8417`071e5780 00000000`00000000 : win32kbase!CancelCapturedMipOverride
ffffb182`e2ca6c20 ffff8453`26bbb061     : ffff8417`006248a0 00000000`00000000 ffffffff`00000000 ffffb182`e2ca6e88 : win32kfull!xxxDoHotKeyStuff+0xc9d2a
ffffb182`e2ca6d50 ffff8453`26869100     : ffffffff`ffffffff ffff8417`006248a0 ffff8417`0462c230 ffffb182`e2ca6dd0 : win32kfull!EditionDoHotKeys+0x21
ffffb182`e2ca6d80 ffff8453`26868b78     : ffffffff`ffffffff ffffb182`e2ca6ec9 00000000`0000002e ffff8417`006248a0 : win32kbase!ApiSetEditionDoHotKeys+0xac
ffffb182`e2ca6de0 ffff8453`26868982     : ffffb182`e2ca70e0 ffffb182`e2ca6fc9 00000000`00000000 ffffb182`e2ca70e0 : win32kbase!xxxUpdateGlobalsAndSendKeyEvent+0x1b8
ffffb182`e2ca6f10 ffff8453`269b8e8a     : ffffb182`e2ca0100 ffffb182`e2ca70d0 00000000`07b9df24 00000000`00000000 : win32kbase!xxxKeyEventEx+0x1e2
ffffb182`e2ca7010 ffff8453`269b8b07     : ffff8417`00606a30 00000000`00000000 ffffb182`e2ca7190 ffff8c06`ce1520c8 : win32kbase!xxxProcessKeyEvent+0x2da
ffffb182`e2ca7090 ffff8453`269aa508     : 00000000`00000000 ffff8c06`d60a8bf0 ffff8417`00606a30 ffffa87f`50e00000 : win32kbase!ProcessKeyboardInputWorker+0x837
ffffb182`e2ca71f0 ffff8453`269aa389     : ffff8453`26a5b6d0 ffffb182`e2ca7301 00000000`00000000 ffff8c06`d0dcdf00 : win32kbase!CKeyboardProcessor::ProcessInputNoLock+0xdc
ffffb182`e2ca7220 ffff8453`269b2d3d     : ffff8417`006069e0 ffff8c06`ce152070 00000000`0000000c 00000000`00000000 : win32kbase!CKeyboardProcessor::ProcessInput+0x491
ffffb182`e2ca7360 ffff8453`269ac04a     : ffff8453`26a10700 ffffb182`e2ca74a0 ffff8417`006069e0 ffff8453`26a51970 : win32kbase!CKeyboardSensor::ProcessInput+0x5d
ffffb182`e2ca73a0 ffff8453`26864c1d     : 00000000`00000040 ffff8453`26a10700 00000000`00000001 00000000`00000000 : win32kbase!CBaseInput::OnReadNotification+0x52a
ffffb182`e2ca74e0 ffff8453`26864d52     : ffff8c06`ce219080 ffff8417`00658100 00000000`00000006 ffffaeee`955f04de : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
ffffb182`e2ca7620 ffff8453`268586de     : ffff8453`26a582a0 ffff8417`00658100 ffff8453`26a51970 00000000`00000001 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffb182`e2ca7650 ffff8453`26858430     : 00000000`00000006 ffff8453`26a582a0 00000000`00000001 ffff8417`00641c00 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffffb182`e2ca7680 ffff8453`26b99e7f     : 00000000`00000010 00000000`00000001 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffffb182`e2ca77b0 ffff8453`268c60c3     : ffff8c06`ce219080 ffff8c06`ce219080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffffb182`e2ca7970 ffff8453`26b38d80     : ffff8c06`ce219080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffb182`e2ca7aa0 ffff8453`2749474d     : ffff8c06`ce219080 ffff8c06`ce219080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffb182`e2ca7ad0 fffff803`530071b8     : ffff8c06`00000005 00000000`00000005 00000245`1d8041e0 00000000`00001d9c : win32k!NtUserCallNoParam+0x15
ffffb182`e2ca7b00 00007ff8`0ff110e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000061`aa13fbe8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`0ff110e4


SYMBOL_NAME:  win32kfull!xxxDoHotKeyStuff+c9d2a

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.1131

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c9d2a

FAILURE_BUCKET_ID:  0x7a_c000000e_win32kfull!xxxDoHotKeyStuff

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {aa029fec-9ea3-bc99-2cd2-7ccae0765f65}

Followup:     MachineOwner
---------
CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffff980b5ce48080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4514

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13023

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffff980b5ce48080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  ffff980b5ce487c0 -- (.exr 0xffff980b5ce487c0)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

ERROR_CODE: (NTSTATUS) 0x59030080 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

EXCEPTION_STR:  0x0

STACK_TEXT: 
ffffce87`bde7cd88 fffff806`5d5068e2     : 00000000`000000ef ffff980b`5ce48080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffce87`bde7cd90 fffff806`5d449b39     : 00000000`00000001 fffff806`5cf5971d 00000000`00000002 fffff806`5cf58d37 : nt!PspCatchCriticalBreak+0x10e
ffffce87`bde7ce30 fffff806`5d309724     : ffff980b`00000000 00000000`00000000 ffff980b`5ce48080 ffff980b`5ce484b8 : nt!PspTerminateAllThreads+0x140b4d
ffffce87`bde7cea0 fffff806`5d309a4c     : ffff980b`5ce48080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffffce87`bde7cee0 fffff806`5d0071b8     : ffff980b`5ce48080 ffff980b`59030080 ffffce87`bde7cfd0 fffff806`5d31da92 : nt!NtTerminateProcess+0x9c
ffffce87`bde7cf50 fffff806`5cff95e0     : fffff806`5d091307 ffffce87`bde7da58 ffffce87`bde7da58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffffce87`bde7d0e8 fffff806`5d091307     : ffffce87`bde7da58 ffffce87`bde7da58 ffffffff`ffffffff 00007ffa`5c9e3000 : nt!KiServiceLinkage
ffffce87`bde7d0f0 fffff806`5d0078ac     : ffff980b`5ce487c0 fffff806`5ce0ecc6 00000000`00000c00 ffffce87`bde7db00 : nt!KiDispatchException+0x166907
ffffce87`bde7d920 fffff806`5d003a43     : 00000000`00000000 00000000`00000000 ffffce87`bde7db80 ffff980b`5cdd9340 : nt!KiExceptionDispatch+0x12c
ffffce87`bde7db00 00007ffa`5f2d4042     : 00000000`00000000 00000051`00000000 00000051`f0c41700 00000051`f0c41708 : nt!KiPageFault+0x443
00000051`f0c416e0 00000000`00000000     : 00000051`00000000 00000051`f0c41700 00000051`f0c41708 00007ffa`5c9e3000 : 0x00007ffa`5f2d4042


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_59030080_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3d7cdc3d-7c70-e0e0-600c-30fe3569ecf0}

Followup:     MachineOwner
---------

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000020, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: ffffd083362730e0, current process (virtual address for lock type 3, or PTE)
Arg4: 0000000000000000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 38617

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7a

BUGCHECK_P1: 20

BUGCHECK_P2: ffffffffc000000e

BUGCHECK_P3: ffffd083362730e0

BUGCHECK_P4: 0

ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.

DISK_HARDWARE_ERROR: There was error with disk hardware

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffb809`71a613f8 fffff806`7849e336     : 00000000`0000007a 00000000`00000020 ffffffff`c000000e ffffd083`362730e0 : nt!KeBugCheckEx
ffffb809`71a61400 fffff806`78320afb     : 00000000`00000000 ffffb809`c000000e 00000000`00000000 fffff806`00002000 : nt!MiWriteComplete+0x14a9f6
ffffb809`71a614b0 fffff806`78267ce0     : ffffd083`36214580 ffffd083`38cbc9d8 ffffe381`3a791730 00000000`00000000 : nt!IopCompletePageWrite+0x4b
ffffb809`71a614e0 fffff806`783f9ae0     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd083`423ff000 : nt!KiDeliverApc+0x1b0
ffffb809`71a61590 fffff806`783449d9     : ffffd083`00000000 00000000`0000001f 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0x2f0
ffffb809`71a61720 fffff806`7834e23c     : ffffffff`0039f1b2 ffffffff`ffffff00 ffffd083`361c21a0 0002a2e5`00000100 : nt!MiStoreUpdatePagefileHash+0xc9
ffffb809`71a617b0 fffff806`7834fe8d     : ffffd083`361c20d0 ffffd083`37851bb8 fffff380`0039f2b2 fffff806`00000000 : nt!MiStoreWriteModifiedPages+0x670
ffffb809`71a618e0 fffff806`783baf59     : ffffd083`361c20d0 fffff806`00000100 fffff806`00000100 ffffe381`00000100 : nt!MiGatherPagefilePages+0x455
ffffb809`71a619e0 fffff806`78317e25     : ffffd083`36214580 ffffd083`36214580 00000000`00000080 fffff806`783bacc0 : nt!MiModifiedPageWriter+0x299
ffffb809`71a61c10 fffff806`783fcdd8     : fffff806`73291180 ffffd083`36214580 fffff806`78317dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb809`71a61c60 00000000`00000000     : ffffb809`71a62000 ffffb809`71a5c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiWriteComplete+14a9f6

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  14a9f6

FAILURE_BUCKET_ID:  0x7a_c000000e_nt!MiWriteComplete

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fcc12098-ee04-35bd-5cea-593a2c6ec31d}

Followup:     MachineOwner
---------
RAM veya disk sorunu gibi. İlk iş bir bellek testi yapınız:


HDD için de bilgi paylaşın Health sekmesinden:


Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80763a9e3d2, Address of the instruction which caused the bugcheck
Arg3: ffffb80aba1fd570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6218

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13629

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80763a9e3d2

BUGCHECK_P3: ffffb80aba1fd570

BUGCHECK_P4: 0

CONTEXT:  ffffb80aba1fd570 -- (.cxr 0xffffb80aba1fd570)
rax=0000000000000000 rbx=ffffb80aba1fdfd0 rcx=0000000000000007
rdx=00000000030ab918 rsi=000000000000036d rdi=ffff800315eea000
rip=fffff80763a9e3d2 rsp=ffffb80aba1fdf78 rbp=ffff800315eea000
 r8=000000000000001c  r9=ffffcd83664070c0 r10=0000020c5efcc918
r11=0000000000000918 r12=00000000ce4cf905 r13=ffffb80aba1fe230
r14=000000000000036d r15=0000020c5eee3024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff807`63a9e3d2 418b02          mov     eax,dword ptr [r10] ds:002b:0000020c`5efcc918=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
ffffb80a`ba1fdf78 fffff807`63a1bbef     : 00000000`7f147a21 ffffb80a`ba1fe2f0 00000000`00000000 ffff8003`2ebc2dc0 : nt!HvpGetCellPaged+0xa2
ffffb80a`ba1fdf80 fffff807`63a21a25     : 00000001`ffffffff 00000000`ce4cf905 ffffb80a`ba1fe9e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffb80a`ba1fdfd0 fffff807`63a24b69     : ffff8003`2ebc2dc0 00000000`00000006 ffffb80a`ba1fe1d0 ffffb80a`ba1fe250 : nt!CmpWalkOneLevel+0x6f5
ffffb80a`ba1fe0d0 fffff807`63a23453     : 00000000`0000001c ffffb80a`ba1fe420 ffffb80a`ba1fe3d8 ffffcd83`68daaa20 : nt!CmpDoParseKey+0x849
ffffb80a`ba1fe370 fffff807`63a2751e     : fffff807`63a23101 00000000`00000000 ffffcd83`68daaa20 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffb80a`ba1fe510 fffff807`639eb19a     : ffffcd83`68daaa00 ffffb80a`ba1fe778 00000000`00000040 ffffcd83`5c0f3380 : nt!ObpLookupObjectName+0x3fe
ffffb80a`ba1fe6e0 fffff807`639eaf7c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffcd83`5c0f3380 : nt!ObOpenObjectByNameEx+0x1fa
ffffb80a`ba1fe810 fffff807`639eaaa1     : 00000085`f787e8c8 ffffb80a`ba1feb80 00000000`00000001 fffff807`6366119e : nt!ObOpenObjectByName+0x5c
ffffb80a`ba1fe860 fffff807`639ea7cf     : 0000020f`cbc97086 0000020f`cbc97000 00000000`00000000 00000000`00000004 : nt!CmOpenKey+0x2c1
ffffb80a`ba1feac0 fffff807`638071b8     : 0000020f`cbc6b300 00000000`00000000 ffffb80a`ba1feb80 0000020f`cd0020e0 : nt!NtOpenKeyEx+0xf
ffffb80a`ba1feb00 00007ffc`4fcee3a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000085`f787e7e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`4fcee3a4


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .cxr 0xffffb80aba1fd570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff8013389e3d2, Address of the instruction which caused the bugcheck
Arg3: ffffb5893a2f3570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 26183

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff8013389e3d2

BUGCHECK_P3: ffffb5893a2f3570

BUGCHECK_P4: 0

CONTEXT:  ffffb5893a2f3570 -- (.cxr 0xffffb5893a2f3570)
rax=0000000000000000 rbx=ffffb5893a2f3fd0 rcx=0000000000000007
rdx=00000000030ab918 rsi=000000000000036d rdi=ffffc8807a2e5000
rip=fffff8013389e3d2 rsp=ffffb5893a2f3f78 rbp=ffffc8807a2e5000
 r8=000000000000001c  r9=ffff8008fa1eb540 r10=0000021ab070c918
r11=0000000000000918 r12=00000000ce4cf905 r13=ffffb5893a2f4230
r14=000000000000036d r15=0000021ab0623024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff801`3389e3d2 418b02          mov     eax,dword ptr [r10] ds:002b:0000021a`b070c918=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
ffffb589`3a2f3f78 fffff801`3381bbef     : 00000000`7f147a21 ffffb589`3a2f42f0 00000000`00000287 ffffb589`3a2f4089 : nt!HvpGetCellPaged+0xa2
ffffb589`3a2f3f80 fffff801`33821a25     : 00000001`ffffffff 00000000`ce4cf905 ffffb589`3a2f49e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffb589`3a2f3fd0 fffff801`33824b69     : ffffc880`9101a3c0 00000000`00000006 ffffb589`3a2f41d0 ffffb589`3a2f4250 : nt!CmpWalkOneLevel+0x6f5
ffffb589`3a2f40d0 fffff801`33823453     : 00000000`0000001c ffffb589`3a2f4420 ffffb589`3a2f43d8 ffff8008`ff9e57b0 : nt!CmpDoParseKey+0x849
ffffb589`3a2f4370 fffff801`3382751e     : fffff801`33823101 00000000`00000000 ffff8008`ff9e57b0 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffb589`3a2f4510 fffff801`337eb19a     : ffff8008`ff9e5700 ffffb589`3a2f4778 00000000`00000040 ffff8008`f00f44e0 : nt!ObpLookupObjectName+0x3fe
ffffb589`3a2f46e0 fffff801`337eaf7c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8008`f00f44e0 : nt!ObOpenObjectByNameEx+0x1fa
ffffb589`3a2f4810 fffff801`337eaaa1     : 00000061`82e7e828 ffffb589`3a2f4b80 00000000`00000001 fffff801`3346119e : nt!ObOpenObjectByName+0x5c
ffffb589`3a2f4860 fffff801`337ea7cf     : 00000000`00000000 00000000`00000000 00000061`82e7eb60 000001b6`1408bff8 : nt!CmOpenKey+0x2c1
ffffb589`3a2f4ac0 fffff801`336071b8     : 00000000`00000000 00000000`00000000 ffffb589`3a2f4b80 000001b6`1681be80 : nt!NtOpenKeyEx+0xf
ffffb589`3a2f4b00 00007ff9`b3e4e3a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000061`82e7e748 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b3e4e3a4


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .cxr 0xffffb5893a2f3570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80730c51112, Address of the instruction which caused the bugcheck
Arg3: fffffb8e5f18d570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21496

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80730c51112

BUGCHECK_P3: fffffb8e5f18d570

BUGCHECK_P4: 0

CONTEXT:  fffffb8e5f18d570 -- (.cxr 0xfffffb8e5f18d570)
rax=0000000000000000 rbx=fffffb8e5f18dfd0 rcx=0000000000000007
rdx=00000000028a5c70 rsi=0000000000000153 rdi=ffffd58232be8000
rip=fffff80730c51112 rsp=fffffb8e5f18df78 rbp=ffffd58232be8000
 r8=000000000000001c  r9=ffffa0023a745080 r10=0000021390b26c70
r11=0000000000000c70 r12=00000000a88ef046 r13=fffffb8e5f18e230
r14=0000000000000153 r15=0000021391a80024
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff807`30c51112 418b02          mov     eax,dword ptr [r10] ds:002b:00000213`90b26c70=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
fffffb8e`5f18df78 fffff807`30ce0a7f     : 00000000`e9c5e935 fffffb8e`5f18e2f0 00000213`91a79ff4 00000000`c0000034 : nt!HvpGetCellPaged+0xa2
fffffb8e`5f18df80 fffff807`30ce68b5     : 00000001`ffffffff 00000000`a88ef046 00000000`e9c5e935 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
fffffb8e`5f18dfd0 fffff807`30ce99f9     : ffffd582`5c907d70 00000000`00000006 fffffb8e`5f18e1d0 fffffb8e`5f18e250 : nt!CmpWalkOneLevel+0x6f5
fffffb8e`5f18e0d0 fffff807`30ce82e3     : 00000000`0000001c fffffb8e`5f18e420 fffffb8e`5f18e3d8 ffffa002`3cf2e010 : nt!CmpDoParseKey+0x849
fffffb8e`5f18e370 fffff807`30cec3ae     : fffff807`30ce8001 00000000`00000000 ffffa002`3cf2e010 00000000`6d4e6201 : nt!CmpParseKey+0x2c3
fffffb8e`5f18e510 fffff807`30cf566a     : ffffa002`3cf2e000 fffffb8e`5f18e778 00000000`00000040 ffffa002`2acf5820 : nt!ObpLookupObjectName+0x3fe
fffffb8e`5f18e6e0 fffff807`30cf544c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa002`2acf5820 : nt!ObOpenObjectByNameEx+0x1fa
fffffb8e`5f18e810 fffff807`30cf4f71     : 000000aa`debfe768 fffffb8e`5f18eb80 00000000`00000001 fffff807`3089cb8e : nt!ObOpenObjectByName+0x5c
fffffb8e`5f18e860 fffff807`30cf4c9f     : 00000276`8399a046 00000000`00000000 00000000`0000001b 00000000`00000006 : nt!CmOpenKey+0x2c1
fffffb8e`5f18eac0 fffff807`30a06bb8     : 000000aa`debfe800 00000000`00000000 fffffb8e`5f18eb80 00000276`836c5180 : nt!NtOpenKeyEx+0xf
fffffb8e`5f18eb00 00007ffb`fed6e194     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000aa`debfe688 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`fed6e194


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .cxr 0xfffffb8e5f18d570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffff93845aa02e10, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 0000000181a8a8c0, current process (virtual address for lock type 3, or PTE)
Arg4: fffff80628cb0000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6327

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 34539

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffff93845aa02e10

BUGCHECK_P2: ffffffffc000000e

BUGCHECK_P3: 181a8a8c0

BUGCHECK_P4: fffff80628cb0000

ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.

DISK_HARDWARE_ERROR: There was error with disk hardware

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff9057acc3300 -- (.trap 0xfffff9057acc3300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80628caff00 rbx=0000000000000000 rcx=0000000000005a4d
rdx=fffff80628cb0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80622a7db45 rsp=fffff9057acc3498 rbp=fffff9057acc3588
 r8=0000000000000000  r9=fffff9057acc34f0 r10=0000000000000000
r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlImageNtHeaderEx+0x35:
fffff806`22a7db45 66390a          cmp     word ptr [rdx],cx ds:fffff806`28cb0000=????
Resetting default scope

STACK_TEXT: 
fffff905`7acc2f58 fffff806`22ab6e29     : 00000000`0000007a ffff9384`5aa02e10 ffffffff`c000000e 00000001`81a8a8c0 : nt!KeBugCheckEx
fffff905`7acc2f60 fffff806`22ab4b35     : fffff905`00001000 fffff905`7acc3000 fffff905`7acc30f0 fffff806`00000000 : nt!MiWaitForInPageComplete+0x7d9
fffff905`7acc3050 fffff806`22a0c9c8     : 00000000`c0033333 00000000`00000000 fffff806`28cb0000 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffff905`7acc3160 fffff806`22c0395e     : 00000000`00000000 00000000`00200040 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468
fffff905`7acc3300 fffff806`22a7db45     : fffff806`22b3aa93 fffff806`22b21da0 fffff806`22bcdf48 00000000`00000000 : nt!KiPageFault+0x35e
fffff905`7acc3498 fffff806`22b3aa93     : fffff806`22b21da0 fffff806`22bcdf48 00000000`00000000 00000000`00000000 : nt!RtlImageNtHeaderEx+0x35
fffff905`7acc34a0 fffff806`22b3aa1c     : 00000000`00000000 00000000`00000000 fffff905`7acc38a0 00000000`00000000 : nt!RtlpImageDirectoryEntryToDataEx+0x5b
fffff905`7acc34f0 fffff806`22ef85ef     : 00000000`00000800 00000000`00000000 fffff905`7acc38a0 00000000`00000004 : nt!RtlImageDirectoryEntryToData+0x1c
fffff905`7acc3540 fffff806`22b3a6d7     : fffff905`7acc3878 00000000`00000000 fffff905`7acc3878 fffff806`22b3bf12 : nt!LdrpSearchResourceSection_U+0xff
fffff905`7acc3690 fffff806`22ef89de     : 00000000`00000003 00000000`00000004 00000000`00000002 00000000`00000000 : nt!LdrpLoadResourceFromAlternativeModule+0xa3
fffff905`7acc36e0 fffff806`22efc09a     : 00640072`00000000 006b0073`00690064 00520044`005c0030 00000000`00200040 : nt!LdrpSearchResourceSection_U+0x4ee
fffff905`7acc3830 fffff806`28361169     : 00000000`00000000 ffffa90e`3336a6e8 00000000`00000000 00000000`00000000 : nt!RtlFindMessage+0x6a
fffff905`7acc38c0 fffff806`2835e084     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsMessageText+0x39
fffff905`7acc3900 fffff806`22a25975     : ffffa90e`350bb400 ffffa90e`350bb400 ffffa90e`2949b520 00000000`00000000 : Ntfs!NtfsTelemetryLogFileObjectInfo+0xd4
fffff905`7acc3b70 fffff806`22b17e25     : ffffa90e`350bb400 00000000`00000080 ffffa90e`29491040 00000000`00000001 : nt!ExpWorkerThread+0x105
fffff905`7acc3c10 fffff806`22bfcdd8     : ffffd281`2b080180 ffffa90e`350bb400 fffff806`22b17dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffff905`7acc3c60 00000000`00000000     : fffff905`7acc4000 fffff905`7acbe000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiWaitForInPageComplete+7d9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  7d9

FAILURE_BUCKET_ID:  0x7a_c000000e_nt!MiWaitForInPageComplete

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {329318b9-5fab-73eb-d104-f79603e1bdb3}

Followup:     MachineOwner
---------
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffffd98a6e297da8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 000000010edc9860, current process (virtual address for lock type 3, or PTE)
Arg4: ffff983084bb5f60, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6561

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17327

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffffd98a6e297da8

BUGCHECK_P2: ffffffffc000000e

BUGCHECK_P3: 10edc9860

BUGCHECK_P4: ffff983084bb5f60

ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.

DISK_HARDWARE_ERROR: There was error with disk hardware

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffffee0fb6745a80 -- (.trap 0xffffee0fb6745a80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb40fd1afee60 rbx=0000000000000000 rcx=ffff98530061b050
rdx=ffff985300830930 rsi=0000000000000000 rdi=0000000000000000
rip=ffff983084bb5f60 rsp=ffffee0fb6745c18 rbp=ffffee0fb6745ce9
 r8=ffffee0fb6745b50  r9=0000000000000000 r10=ffff983084bb5f60
r11=ffffee0fb6745ae0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kbase!CancelCapturedMipOverride:
ffff9830`84bb5f60 4883ec28        sub     rsp,28h
Resetting default scope

STACK_TEXT: 
ffffee0f`b67456d8 fffff805`362b6e29     : 00000000`0000007a ffffd98a`6e297da8 ffffffff`c000000e 00000001`0edc9860 : nt!KeBugCheckEx
ffffee0f`b67456e0 fffff805`362b4b35     : ffffee0f`00008000 ffffee0f`b6745800 ffffee0f`b6745870 fffff805`00000000 : nt!MiWaitForInPageComplete+0x7d9
ffffee0f`b67457d0 fffff805`3620c9c8     : 00000000`c0033333 00000000`00000000 ffff9830`84bb5f60 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffffee0f`b67458e0 fffff805`3640395e     : 00000000`00000000 ffffb40f`d1aa6070 00000000`00000004 fffff805`36250cb9 : nt!MmAccessFault+0x468
ffffee0f`b6745a80 ffff9830`84bb5f60     : ffff9830`84e84dba 00000000`00000000 00000000`0000002e ffff9853`06a304f0 : nt!KiPageFault+0x35e
ffffee0f`b6745c18 ffff9830`84e84dba     : 00000000`00000000 00000000`0000002e ffff9853`06a304f0 00000000`00000000 : win32kbase!CancelCapturedMipOverride
ffffee0f`b6745c20 ffff9830`84dbb061     : ffff9853`0061b050 00000000`00000000 ffffffff`00000000 ffffee0f`b6745e88 : win32kfull!xxxDoHotKeyStuff+0xc9d2a
ffffee0f`b6745d50 ffff9830`84a69100     : ffffffff`ffffffff ffff9853`0061b050 ffff9853`04ebb620 ffffee0f`b6745dd0 : win32kfull!EditionDoHotKeys+0x21
ffffee0f`b6745d80 ffff9830`84a68b78     : ffffffff`ffffffff ffffee0f`b6745ec9 00000000`0000002e ffff9853`0061b050 : win32kbase!ApiSetEditionDoHotKeys+0xac
ffffee0f`b6745de0 ffff9830`84a68982     : ffffee0f`b67460e0 ffffee0f`b6745fc9 00000000`00000000 ffffee0f`b67460e0 : win32kbase!xxxUpdateGlobalsAndSendKeyEvent+0x1b8
ffffee0f`b6745f10 ffff9830`84bb8e8a     : ffffee0f`b6740100 ffffee0f`b67460d0 00000000`021ec2f5 00000000`00000000 : win32kbase!xxxKeyEventEx+0x1e2
ffffee0f`b6746010 ffff9830`84bb8b07     : ffff9853`00606a30 00000000`00000000 ffffee0f`b6746190 ffffb40f`d25290c8 : win32kbase!xxxProcessKeyEvent+0x2da
ffffee0f`b6746090 ffff9830`84baa508     : 00000000`00000000 ffffb40f`d1aa6f70 ffff9853`00606a30 ffff73ff`d4a00000 : win32kbase!ProcessKeyboardInputWorker+0x837
ffffee0f`b67461f0 ffff9830`84baa389     : ffff9830`84c5b6d0 ffffee0f`b6746301 00000000`00000000 ffffb40f`d2434620 : win32kbase!CKeyboardProcessor::ProcessInputNoLock+0xdc
ffffee0f`b6746220 ffff9830`84bb2d3d     : ffff9853`006069e0 ffffb40f`d2529070 00000000`0000000c 00000000`00000000 : win32kbase!CKeyboardProcessor::ProcessInput+0x491
ffffee0f`b6746360 ffff9830`84bac04a     : ffff9830`84c10700 ffffee0f`b67464a0 ffff9853`006069e0 ffff9830`84c51970 : win32kbase!CKeyboardSensor::ProcessInput+0x5d
ffffee0f`b67463a0 ffff9830`84a64c1d     : 00000000`00000040 ffff9830`84c10700 00000000`00000001 00000000`00000000 : win32kbase!CBaseInput::OnReadNotification+0x52a
ffffee0f`b67464e0 ffff9830`84a64d52     : ffffb40f`d2524080 ffff9853`0069c240 00000000`00000006 ffff33fb`daabcd52 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
ffffee0f`b6746620 ffff9830`84a586de     : ffff9830`84c582a0 ffff9853`0069c240 ffff9830`84c51970 00000000`00000001 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
ffffee0f`b6746650 ffff9830`84a58430     : 00000000`00000006 ffff9830`84c582a0 00000000`00000001 ffff9853`030f2300 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
ffffee0f`b6746680 ffff9830`84d99e7f     : 00000000`0000000f 00000000`00000001 00002000`00000000 00000000`00000004 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
ffffee0f`b67467b0 ffff9830`84ac60c3     : ffffb40f`d2524080 ffffb40f`d2524080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7bf
ffffee0f`b6746970 ffff9830`84d38d80     : ffffb40f`d2524080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
ffffee0f`b6746aa0 ffff9830`8579474d     : ffffb40f`d2524080 ffffb40f`d2524080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
ffffee0f`b6746ad0 fffff805`364071b8     : ffffb40f`00000005 00000000`00000005 00000242`622041d0 00000000`000004a8 : win32k!NtUserCallNoParam+0x15
ffffee0f`b6746b00 00007ffa`75e710e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b3`19cbfd38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`75e710e4


SYMBOL_NAME:  win32kfull!xxxDoHotKeyStuff+c9d2a

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c9d2a

FAILURE_BUCKET_ID:  0x7a_c000000e_win32kfull!xxxDoHotKeyStuff

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {aa029fec-9ea3-bc99-2cd2-7ccae0765f65}

Followup:     MachineOwner
---------



KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffff95847840dbb0, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc000000e, error status (normally i/o status code)
Arg3: 0000000002e1e860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff8021cb928b0, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 60458

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7a

BUGCHECK_P1: ffff95847840dbb0

BUGCHECK_P2: ffffffffc000000e

BUGCHECK_P3: 2e1e860

BUGCHECK_P4: fffff8021cb928b0

ERROR_CODE: (NTSTATUS) 0xc000000e - Varolmayan bir ayg t belirtildi.

DISK_HARDWARE_ERROR: There was error with disk hardware

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffb06797fc740 -- (.trap 0xfffffb06797fc740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8021cb928b0 rbx=0000000000000000 rcx=ffff958494a061c8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021cb928b0 rsp=fffffb06797fc8d8 rbp=fffffb06797fc9e0
 r8=0000000000000000  r9=0000000000000000 r10=0000fffff8021cb9
r11=ffff96ffc8a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
Vid!VidTracepEtwCallback:
fffff802`1cb928b0 4d              ???
Resetting default scope

STACK_TEXT: 
fffffb06`797fc398 fffff802`10b19e69     : 00000000`0000007a ffff9584`7840dbb0 ffffffff`c000000e 00000000`02e1e860 : nt!KeBugCheckEx
fffffb06`797fc3a0 fffff802`10b176f5     : fffffb06`00008000 fffffb06`797fc500 fffffb06`797fc530 fffff802`00000000 : nt!MiWaitForInPageComplete+0x7d9
fffffb06`797fc490 fffff802`10aea508     : 00000000`c0033333 00000000`00000000 fffff802`1cb928b0 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffffb06`797fc5a0 fffff802`10c0335e     : 00000000`00000001 00000000`00000fff 00000000`00000000 ffffa701`1caa1180 : nt!MmAccessFault+0x468
fffffb06`797fc740 fffff802`1cb928b0     : fffff802`10e35280 ffff9584`77a00100 00000000`00000000 00000000`000001c0 : nt!KiPageFault+0x35e
fffffb06`797fc8d8 fffff802`10e35280     : ffff9584`77a00100 00000000`00000000 00000000`000001c0 00000000`000007ad : Vid!VidTracepEtwCallback
fffffb06`797fc8e0 fffff802`10e37220     : 00000000`00000000 fffffb06`797fca99 ffff9584`94a06190 ffffe68e`f2e66020 : nt!EtwpSendDataBlock+0x13c
fffffb06`797fca30 fffff802`10e36de2     : fffff780`00000380 fffff780`00000380 ffffe68e`f2e66020 ffffe68e`f2642000 : nt!EtwpClearSessionAndUnreferenceEntry+0x26c
fffffb06`797fcb00 fffff802`10e3ae03     : fffffb06`797fcbc0 ffffe68e`f24a1640 00000000`00000000 00000000`00000004 : nt!EtwpDisableTraceProviders+0x4a
fffffb06`797fcb50 fffff802`1102b4bf     : ffffe68e`f24a1640 00000000`00000000 ffffffff`fffffffd ffffe68e`fd670180 : nt!EtwpStopLoggerInstance+0x4b
fffffb06`797fcb90 fffff802`10aa29a5     : ffffffff`fffffffd ffffe68e`f2590080 00000000`00000080 fffff802`10eb5dc0 : nt!EtwpLogger+0x1756ff
fffffb06`797fcc10 fffff802`10bfc868     : ffffa701`1cb5c180 ffffe68e`f2590080 fffff802`10aa2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffb06`797fcc60 00000000`00000000     : fffffb06`797fd000 fffffb06`797f7000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -db !Vid
3272 errors : !Vid (fffff8021cb92000-fffff8021cb92fff)
fffff8021cb92000 *00 *00 *00 *cc *d6 *84 *02 *41 *b9 *cc *d6 *84 *02 *4c *8d *45 .......A.....L.E
fffff8021cb92010 *78 *48 *8b  4d  38  e8  22  cf  ea  ff  89  85  88  00  00 *00 xH.M8.".........
fffff8021cb92020 *48 *c7 *c0  00 *00 *00 *00 *48 *83 *c4 *20 *5d *c3 *48 *89 *54 H......H.. ].H.T
fffff8021cb92030 *24 *10 *55 *48 *83 *ec *20 *48 *8b *ea *48 *8d *05 *0f *7d *01 $.UH.. H..H...}.
fffff8021cb92040 *00 *48 *89 *45  58  0f  57  c0  0f  11  45  60  c7  85  8c  00 .H.EX.W...E`....
fffff8021cb92050 *00 *00 *cd *d6 *84 *02 *41 *b9 *cd *d6 *84 *02 *4c *8d *45 *78 ......A.....L.Ex
fffff8021cb92060 *48 *8b *4d *38 *e8 *d3 *ce *ea *ff *89 *85 *88 *00 *00 *00  48 H.M8...........H
fffff8021cb92070 *8d *05 *da *7c *01 *00 *48 *89 *45 *58 *48 *8d *4d *60 *ff *15 ...|..H.EXH.M`..
fffff8021cb92080 *64 *72 *01 *00 *48 *c7 *c0 *00 *00 *00 *00 *48 *83 *c4 *20 *5d dr..H......H.. ]
fffff8021cb92090 *c3 *48 *89 *54 *24 *10 *53 *55 *48 *83 *ec *28 *48 *8b *ea  48 .H.T$.SUH..(H..H
fffff8021cb920a0  8b *5d *48 *48 *8d *53 *68 *48 *8d *4d *48 *e8 *4c *7c *27 *ff .]HH.ShH.MH.L|'.
fffff8021cb920b0  48 *8d *8b *68 *01 *00 *00 *e8 *dc *bc *ea *ff *33 *d2 *33 *c9 H..h........3.3.
fffff8021cb920c0 *e8 *ee *0d *fd *ff *90 *90 *90 *48 *8d *4a *70 *e9 *3f *4b *9e ........H.Jp.?K.
fffff8021cb920d0 *ff *90 *90 *90 *48 *89 *54 *24 *10 *55 *48 *83 *ec *20 *48 *8b ....H.T$.UH.. H.
fffff8021cb920e0 *ea *48 *8b *55 *60 *8b *42 *68 *83 *e8 *04 *f7 *d8 *1b *c0 *83 .H.U`.Bh........
fffff8021cb920f0 *c0 *07  89 *45 *7c *41 *b9 *4e *90 *44 *23 *4c *8d *45 *70 *48 ...E|A.N.D#L.EpH
fffff8021cb92100 *8b *4d *28 *e8 *d4 *bb *ea *ff *48 *c7 *c0 *00 *00 *00 *00 *48 .M(.....H......H
fffff8021cb92110 *83 *c4 *20 *5d *c3 *48 *89 *54 *24 *10 *55 *48 *83 *ec *20 *48 .. ].H.T$.UH.. H
fffff8021cb92120 *8b *ea *41 *b9 *dc *d6 *84 *02 *4c *8d *45 *70 *48 *8b *55 *68 ..A.....L.EpH.Uh
fffff8021cb92130 *48 *8b *4d *28 *e8 *a3 *bb *ea *ff *48 *c7 *c0 *00 *00 *00 *00 H.M(.....H......
fffff8021cb92140  48 *83 *c4 *20 *5d *c3 *90 *90 *90 *90 *90 *90 *90 *90 *90 *90 H.. ]...........
fffff8021cb92150  48  89 *54 *24 *10 *55 *48 *83 *ec *20 *48 *8b *ea *c7  85 *84 H.T$.UH.. H.....
fffff8021cb92160 *00 *00 *00 *dd *d6 *84 *02 *41 *b9 *dd *d6  84  02  4c  8d  45 .......A.....L.E
fffff8021cb92170  70  48  8b  4d  28  e8  c2 *cd *ea  ff *89 *85 *80 *00 *00 *00 pH.M(...........
fffff8021cb92180 *48 *c7 *c0 *00 *00 *00 *00 *48 *83 *c4 *20 *5d *c3 *48 *89 *54 H......H.. ].H.T
fffff8021cb92190 *24 *10 *55  48 *83 *ec *20 *48 *8b *ea *48 *8d *05 *af *7b *01 $.UH.. H..H...{.
fffff8021cb921a0 *00 *48 *89 *45 *30 *0f *57 *c0 *0f *11 *45 *38 *c7 *85 *84 *00 .H.E0.W...E8....
fffff8021cb921b0 *00 *00 *4f *52 *39 *23 *41 *b9 *4f *52 *39 *23 *4c *8d *45 *70 ..OR9#A.OR9#L.Ep
fffff8021cb921c0 *48 *8b *4d *28 *e8 *73 *cd *ea *ff *89 *85 *80 *00 *00 *00 *48 H.M(.s.........H
fffff8021cb921d0 *8d *05 *7a *7b  01  00 *48 *89 *45 *30 *48 *8d *4d *38 *ff *15 ..z{..H.E0H.M8..
fffff8021cb921e0 *04 *71 *01 *00 *48 *c7 *c0 *00 *00  00 *00 *48 *83 *c4 *20 *5d .q..H......H.. ]
fffff8021cb921f0 *c3 *48 *89 *54  24 *10 *55 *48 *83 *ec  30 *48 *8b *ea *41 *b9 .H.T$.UH..0H..A.
fffff8021cb92200 *e3 *d6 *84  02  4c  8b  85  c8  00  00  00  48  8b  55  50 *48 ....L......H.UPH
fffff8021cb92210 *8b *8d *c0 *00 *00 *00 *e8 *c1 *ba *ea *ff *48 *c7 *c0  00  00 ...........H....
fffff8021cb92220  00  00  48  83  c4  30  5d  c3  48  89 *54 *24 *10 *53  55  48 ..H..0].H.T$.SUH
fffff8021cb92230  83  ec  38  48  8b  ea  48  8b  9d  c8 *00 *00 *00 *c7 *43 *14 ..8H..H.......C.
fffff8021cb92240  00 *d7 *84 *02 *41 *b9  00 *d7 *84 *02 *4c *8b *c3 *48 *8b  8d ....A.....L..H..
fffff8021cb92250  c0  00  00  00  e8  e3  cc  ea  ff  89  43 *10 *48 *c7 *c0 *00 ..........C.H...
fffff8021cb92260 *00 *00 *00 *48 *83 *c4 *38 *5d *5b *c3 *90 *90 *48 *89 *54 *24 ...H..8][...H.T$
fffff8021cb92270 *10 *53 *55 *48 *83 *ec *38 *48 *8b *ea *48 *8d *05 *cf *7a *01 .SUH..8H..H...z.
fffff8021cb92280 *00 *48 *89 *45 *58 *0f *57 *c0 *0f *11 *45 *60 *48 *8b *9d *c8 .H.EX.W...E`H...
fffff8021cb92290 *00 *00 *00 *c7 *43 *14 *01 *d7 *84 *02 *41 *b9 *01 *d7 *84 *02 ....C.....A.....
fffff8021cb922a0 *4c *8b *c3 *48 *8b  8d *c0 *00 *00 *00 *e8 *8d *cc *ea *ff *89 L..H............
fffff8021cb922b0 *43 *10 *48 *8d *05 *97 *7a *01 *00 *48 *89 *45 *58 *48 *8d *4d C.H...z..H.EXH.M
fffff8021cb922c0 *60 *ff *15 *21 *70 *01 *00 *48 *c7 *c0  00  00  00 *00 *48 *83 `..!p..H......H.
fffff8021cb922d0 *c4 *38 *5d *5b *c3 *48 *8b *4a *28 *48 *83 *c1 *10 *e9 *be *82 .8][.H.J(H......
fffff8021cb922e0 *9f *ff *48 *8b *4a *28 *48 *83 *c1 *68 *e9 *61 *32 *46 *ff *48 ..H.J(H..h.a2F.H
fffff8021cb922f0 *8b *4a *28 *48 *81 *c1 *d0 *00 *00 *00 *e9 *f1 *a5 *e8 *ff *40 .J(H...........@
fffff8021cb92300 *55 *48 *83 *ec *20 *48 *8b *ea *8b *45 *20 *83 *e0 *02 *85 *c0 UH.. H...E .....
fffff8021cb92310 *74 *0d *83 *65 *20 *fd *48 *8d *4d *30 *e8 *a1 *a4 *93 *ff *48 t..e .H.M0.....H
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE_4096

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE_4096

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8d7aaa06-783f-2252-c9f3-768cf1e213bd}

Followup:     memory_corruption
---------

0: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.2, DMIVersion 0, Size=2279]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = F51
BiosReleaseDate = 07/29/2020
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = B450M S2H
SystemFamily = B450 MB
SystemVersion = Default string
SystemSKU = Default string
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = B450M S2H
BaseBoardVersion = x.x
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80081051112, Address of the instruction which caused the bugcheck
Arg3: ffff8e8822b55570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6592

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-KTSBH2V

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25220

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80081051112

BUGCHECK_P3: ffff8e8822b55570

BUGCHECK_P4: 0

CONTEXT:  ffff8e8822b55570 -- (.cxr 0xffff8e8822b55570)
rax=0000000000000000 rbx=ffff8e8822b55fd0 rcx=0000000000000007
rdx=000000000299e470 rsi=000000000000036d rdi=ffffa883383b2000
rip=fffff80081051112 rsp=ffff8e8822b55f78 rbp=ffffa883383b2000
 r8=000000000000001c  r9=ffff960ad7fe03c0 r10=000001c8b401f470
r11=0000000000000470 r12=00000000ce4cf905 r13=ffff8e8822b56230
r14=000000000000036d r15=000001c8b3f36024
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff800`81051112 418b02          mov     eax,dword ptr [r10] ds:002b:000001c8`b401f470=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
ffff8e88`22b55f78 fffff800`810e0a7f     : 00000000`7f147a21 ffff8e88`22b562f0 00000000`00000000 ffffa883`4f729a30 : nt!HvpGetCellPaged+0xa2
ffff8e88`22b55f80 fffff800`810e68b5     : 00000001`ffffffff 00000000`ce4cf905 ffff8e88`22b569e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffff8e88`22b55fd0 fffff800`810e99f9     : ffffa883`4f729a30 00000000`00000006 ffff8e88`22b561d0 ffff8e88`22b56250 : nt!CmpWalkOneLevel+0x6f5
ffff8e88`22b560d0 fffff800`810e82e3     : 00000000`0000001c ffff8e88`22b56420 ffff8e88`22b563d8 ffff960a`daaf1a20 : nt!CmpDoParseKey+0x849
ffff8e88`22b56370 fffff800`810ec3ae     : fffff800`810e8001 00000000`00000000 ffff960a`daaf1a20 00000000`00000001 : nt!CmpParseKey+0x2c3
ffff8e88`22b56510 fffff800`810f566a     : ffff960a`daaf1a00 ffff8e88`22b56778 00000000`00000040 ffff960a`cccf5560 : nt!ObpLookupObjectName+0x3fe
ffff8e88`22b566e0 fffff800`810f544c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff960a`cccf5560 : nt!ObOpenObjectByNameEx+0x1fa
ffff8e88`22b56810 fffff800`810f4f71     : 00000021`303fe6f8 ffff8e88`22b56b80 00000000`00000001 fffff800`80c9cb8e : nt!ObOpenObjectByName+0x5c
ffff8e88`22b56860 fffff800`810f4c9f     : fffff800`80df1300 fffff800`80d3160e 000001eb`8d5f3a00 ffff8e88`22b56a88 : nt!CmOpenKey+0x2c1
ffff8e88`22b56ac0 fffff800`80e06bb8     : 00000000`00000002 00000000`00000000 ffff8e88`22b56b80 000001eb`8dbeb4e0 : nt!NtOpenKeyEx+0xf
ffff8e88`22b56b00 00007ffe`bf46e194     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000021`303fe618 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`bf46e194


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .cxr 0xffff8e8822b55570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------
 
Ekran görüntüsü 2020-12-14 213108.png


Ekran görüntüsü 2020-12-14 213049.png


SSD ve HDD Bilgisi bunlar.
Benim USB olmadığı içini RAM testini yapamadım. Farklı bir program var mıdır?
Bunlar yeni mavi ekran hataları diğerleri hep benzer hata kodları vardı. Ama sonuncusu diğerlerinden farklıydı.
 
DDU ile ekran kartı sürücüsünü kaldırıp yeniden kurun.

RAM testi için en iyi ve kapsamlı uygulama Memtest86. Şimdilik Windows'un kendi aracını deneyelim. En kısa sürede Memtest'i yapın.
 
Bu arada "Kayıt Defteri" üzerinden hiç oynama yaptınız mı? Ek olarak DDU ile kaldırıp kurmanıza rağmen sorun devam ediyor gibi, OCCT ile ekran kartınızı test edin bence. BIOS'ta XMP açık ise kapatmayı unutmayın. XMP kapalı halde Memtest86 testi uygulayın bu arada. Son olarak DDU ile ses sürücünüzü kaldırıp aşağıdaki linkten indireceğiniz sürücüyü kurun.
Son bir ek yapayım, Valorant yüklü ve bunun Anti-Cheat yazılımı sorun çıkarıyor olabilir. Vanguard kaldırın lütfen.

Sürücü: https://download.gigabyte.com/FileList/Driver/mb_driver_612_realtekdch_6.0.8945.1.zip

NOT: BIOS güncel değil lakin F51 sürümü son zamanlarda burada gördüğüm kadarı ile daha stabil. Bu yüzden BIOS sürümüne pek bir şey demiyorum.

Kod:
Machine ID Information [From Smbios 3.2, DMIVersion 0, Size=2279]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = F51
BiosReleaseDate = 07/29/2020
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = B450M S2H
SystemFamily = B450 MB
SystemVersion = Default string
SystemSKU = Default string
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = B450M S2H
BaseBoardVersion = x.x

[CPU Information]
~MHz = REG_DWORD 3194
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1
ProcessorNameString = REG_SZ AMD Ryzen 5 1600 Six-Core Processor          
Update Status = REG_DWORD 3
VendorIdentifier = REG_SZ AuthenticAMD

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff8051ae9e3d2, Address of the instruction which caused the bugcheck
Arg3: ffff858be789fc20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11359

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 48480

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff8051ae9e3d2

BUGCHECK_P3: ffff858be789fc20

BUGCHECK_P4: 0

CONTEXT:  ffff858be789fc20 -- (.cxr 0xffff858be789fc20)
rax=0000000000000000 rbx=ffff858be78a06b0 rcx=0000000000000007
rdx=000000000004d7a8 rsi=0000024cbedb47c3 rdi=ffff878a2a495000
rip=fffff8051ae9e3d2 rsp=ffff858be78a0628 rbp=ffff858be78a0730
r8=000000000000001c  r9=ffffaf05b19ab080 r10=0000024cbedfe7a8
r11=00000000000007a8 r12=0000024cbee08368 r13=ffff878a2a495000
r14=ffff858be78a0920 r15=0000000000000001
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff805`1ae9e3d2 418b02          mov     eax,dword ptr [r10] ds:002b:0000024c`bedfe7a8=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT:
ffff858b`e78a0628 fffff805`1ae206f4     : 00000000`0000000d 00000000`0000000c ffff858b`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
ffff858b`e78a0630 fffff805`1adeca52     : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x284
ffff858b`e78a0790 fffff805`1ac071b8     : 00000000`00000000 00000000`00000000 00000000`00000001 00007ff8`5c70f8f8 : nt!NtQueryValueKey+0x5f2
ffff858b`e78a0a90 00007ff8`619ac294     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000002c`58bdef58 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`619ac294


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .cxr 0xffff858be789fc20 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffde07addea140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11014

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 25292

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffde07addea140

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000

ERROR_CODE: (NTSTATUS) 0xb5ee50c0 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT:
ffff8204`c9539d88 fffff802`363068e2     : 00000000`000000ef ffffde07`addea140 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8204`c9539d90 fffff802`36249b39     : 00000000`00000001 fffff802`35d5971d 00000000`00000002 fffff802`35d58d37 : nt!PspCatchCriticalBreak+0x10e
ffff8204`c9539e30 fffff802`36109724     : ffffde07`00000000 00000000`00000000 ffffde07`addea140 ffffde07`addea578 : nt!PspTerminateAllThreads+0x140b4d
ffff8204`c9539ea0 fffff802`36109a4c     : ffffde07`addea140 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffff8204`c9539ee0 fffff802`35e071b8     : ffffde07`addea140 ffffde07`b5ee50c0 ffff8204`c9539fd0 fffff802`3611da92 : nt!NtTerminateProcess+0x9c
ffff8204`c9539f50 fffff802`35df95e0     : fffff802`35e91307 ffff8204`c953aa58 ffff8204`c953aa58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffff8204`c953a0e8 fffff802`35e91307     : ffff8204`c953aa58 ffff8204`c953aa58 ffffffff`ffffffff 00000000`00000000 : nt!KiServiceLinkage
ffff8204`c953a0f0 fffff802`35e078ac     : 00000000`00001000 ffff8204`c953ab00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166907
ffff8204`c953a920 fffff802`35e03a43     : 00000008`40842970 00000000`00000000 ffff8204`c953ab80 ffffde07`b3ea8e10 : nt!KiExceptionDispatch+0x12c
ffff8204`c953ab00 00007ffe`3f271227     : 00000000`00000000 00000000`0010000b 00007ffe`3f21b48f 00000000`00000000 : nt!KiPageFault+0x443
00000008`40841118 00000000`00000000     : 00000000`0010000b 00007ffe`3f21b48f 00000000`00000000 00000008`40841340 : 0x00007ffe`3f271227


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_b5ee50c0_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2a3de3be-4fb3-2971-d751-84055c91b0fd}

Followup:     MachineOwner
---------
 
SSD sağlığını da kontrol edin CDI ile:


Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff8051ae9e3d2, Address of the instruction which caused the bugcheck
Arg3: ffff858be789fc20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4265

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 26402

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff8051ae9e3d2

BUGCHECK_P3: ffff858be789fc20

BUGCHECK_P4: 0

CONTEXT:  ffff858be789fc20 -- (.cxr 0xffff858be789fc20)
rax=0000000000000000 rbx=ffff858be78a06b0 rcx=0000000000000007
rdx=000000000004d7a8 rsi=0000024cbedb47c3 rdi=ffff878a2a495000
rip=fffff8051ae9e3d2 rsp=ffff858be78a0628 rbp=ffff858be78a0730
r8=000000000000001c r9=ffffaf05b19ab080 r10=0000024cbedfe7a8
r11=00000000000007a8 r12=0000024cbee08368 r13=ffff878a2a495000
r14=ffff858be78a0920 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff805`1ae9e3d2 418b02 mov eax,dword ptr [r10] ds:002b:0000024c`bedfe7a8=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Registry

STACK_TEXT:
ffff858b`e78a0628 fffff805`1ae206f4 : 00000000`0000000d 00000000`0000000c ffff858b`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
ffff858b`e78a0630 fffff805`1adeca52 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x284
ffff858b`e78a0790 fffff805`1ac071b8 : 00000000`00000000 00000000`00000000 00000000`00000001 00007ff8`5c70f8f8 : nt!NtQueryValueKey+0x5f2
ffff858b`e78a0a90 00007ff8`619ac294 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000002c`58bdef58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`619ac294


SYMBOL_NAME: nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.685

STACK_COMMAND: .cxr 0xffff858be789fc20 ; kb

BUCKET_ID_FUNC_OFFSET: a2

FAILURE_BUCKET_ID: 0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup: MachineOwner
---------


CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: ffffde07addea140, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16987

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  ef

BUGCHECK_P1: ffffde07addea140

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME:  csrss.exe

CRITICAL_PROCESS:  csrss.exe

EXCEPTION_RECORD:  0000000000001000 -- (.exr 0x1000)
Cannot read Exception record @ 0000000000001000

ERROR_CODE: (NTSTATUS) 0xb5ee50c0 - <Unable to get error code text>

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

STACK_TEXT: 
ffff8204`c9539d88 fffff802`363068e2     : 00000000`000000ef ffffde07`addea140 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffff8204`c9539d90 fffff802`36249b39     : 00000000`00000001 fffff802`35d5971d 00000000`00000002 fffff802`35d58d37 : nt!PspCatchCriticalBreak+0x10e
ffff8204`c9539e30 fffff802`36109724     : ffffde07`00000000 00000000`00000000 ffffde07`addea140 ffffde07`addea578 : nt!PspTerminateAllThreads+0x140b4d
ffff8204`c9539ea0 fffff802`36109a4c     : ffffde07`addea140 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
ffff8204`c9539ee0 fffff802`35e071b8     : ffffde07`addea140 ffffde07`b5ee50c0 ffff8204`c9539fd0 fffff802`3611da92 : nt!NtTerminateProcess+0x9c
ffff8204`c9539f50 fffff802`35df95e0     : fffff802`35e91307 ffff8204`c953aa58 ffff8204`c953aa58 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffff8204`c953a0e8 fffff802`35e91307     : ffff8204`c953aa58 ffff8204`c953aa58 ffffffff`ffffffff 00000000`00000000 : nt!KiServiceLinkage
ffff8204`c953a0f0 fffff802`35e078ac     : 00000000`00001000 ffff8204`c953ab00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166907
ffff8204`c953a920 fffff802`35e03a43     : 00000008`40842970 00000000`00000000 ffff8204`c953ab80 ffffde07`b3ea8e10 : nt!KiExceptionDispatch+0x12c
ffff8204`c953ab00 00007ffe`3f271227     : 00000000`00000000 00000000`0010000b 00007ffe`3f21b48f 00000000`00000000 : nt!KiPageFault+0x443
00000008`40841118 00000000`00000000     : 00000000`0010000b 00007ffe`3f21b48f 00000000`00000000 00000008`40841340 : 0x00007ffe`3f271227


SYMBOL_NAME:  nt!PspCatchCriticalBreak+10e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10e

FAILURE_BUCKET_ID:  0xEF_csrss.exe_BUGCHECK_CRITICAL_PROCESS_b5ee50c0_nt!PspCatchCriticalBreak

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2a3de3be-4fb3-2971-d751-84055c91b0fd}

Followup:     MachineOwner
---------
 
  • İstediğiniz RAM testini yaptım.(X.M.P kapalı olarak)
  • OCCT ile 3D testi yaptım hata vermedi.
  • SSD ve HDD CrystalDiskInfo ile kontrol ettim.
  • XMP kapatıcaktım ki zaten kapalı olduğunu gördüm. XMP açayım mı?
  • BIOS'u da güncelledim.

Ekran görüntüsü 2020-12-17 181935.png


Ekran görüntüsü 2020-12-17 181950.png


WhatsApp Image 2020-12-17 at 18.07.36 (1).jpeg


WhatsApp Image 2020-12-17 at 18.07.36.jpeg


SSD kısmında mı sıkıntı var? HD Tune Pro'da test yapmıştım yüksek ısı diye hata vermişti...
Sürekli mavi ekran veriyor can sıkıcı :(

Her testi yaptım ama negatif bir cevap almadım donanımsal bir hata olabilir mi?
 
Durum
Mesaj gönderimine kapalı.

Technopat Haberler

Yeni konular

Geri
Yukarı