Çözüldü Windows 10 "Memory management" mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

Pratzkaa

Hectopat
Katılım
31 Temmuz 2020
Mesajlar
1.079
Çözümler
6
Daha fazla  
Cinsiyet
Erkek
Bu kaçıncı mavi ekran sorunum bilmiyorum. Bu sefer bilgisayar açılırken mavi ekran hatası aldım, Memory management diye hata verdi. Minidump dosyasına bakmadan Memtest86 testi yaptım ancak bellek temiz çıktı. Tek modül 8 GB 3000MHz Crucial RAM kullanıyorum. Minidump dosyasını atıyorum. Unknown module diyor tam anlamadım ama anakartta sorun olabilir mi? RAM slotunu değiştirsem değişiklik olur mu?
 
Çözüm
Sıfırlamakla çözülecek bir sorun değil bu. Donanımsal bir hata kendisi. Okunan veri ile yazılan veri birbiri ile eşleşmediği için hata veriyor. Yazılan veri sonradan bozulduğu için.
Buradaki hata donanımsal değil de direkt olarak erişim istenen dosyanın bozuk olmasıyla da gerçekleşebilir mi? Sistemi sıfırlasam sorunun çözülme ihtimali var mı?
Mavi ekran sorununuz çözüldü mü? Çözülmediyse yeni dosyaları paylaşınız.
Unknow module diyorsa Minidump düzgün oluşmamıştır. Anakart ile alakalı değildir bu sorun.
RAM slotunu değiştirmeyi deneyiniz. Minidump dosyalarını atmamışsınız.
 
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız. Sorun disk kaynaklı gözüküyor.
Vanguard kaldırınız.
MSI Afterburner kaldırınız.
Her Memory management hatası bellek kaynaklı değilmiş.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 000000000000eabd
Arg3: 000000000000e8bd
Arg4: 00000000d44880d4

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7078

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 33070

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: eabd

BUGCHECK_P3: e8bd

BUGCHECK_P4: d44880d4

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME:  ffff8b80b7e76060 -- (.trap 0xffff8b80b7e76060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8043d8804a0 rbx=0000000000000000 rcx=ffff99816a853000
rdx=ffff99816a853000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043d8804f0 rsp=ffff8b80b7e761f8 rbp=000002088486fe28
 r8=000002088486fc00  r9=000000000000027e r10=ffff99816a853ea0
r11=000002088486fe7e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff804`3d8804f0 418b08          mov     ecx,dword ptr [r8] ds:00000208`8486fc00=????????
Resetting default scope

STACK_TEXT: 
ffff8b80`b7e75bd8 fffff804`3db575ad     : 00000000`0000001a 00000000`0000003f 00000000`0000eabd 00000000`0000e8bd : nt!KeBugCheckEx
ffff8b80`b7e75be0 fffff804`3d919b21     : ffffaa06`787ca860 ffffffff`ffffffff 00000000`00000000 fffff601`04424378 : nt!MiValidatePagefilePageHash+0x331
ffff8b80`b7e75cc0 fffff804`3d917835     : ffff8b80`00010000 ffff8b80`b7e75e00 ffff8b80`b7e75e50 fffff804`00000000 : nt!MiWaitForInPageComplete+0x351
ffff8b80`b7e75db0 fffff804`3d8ea648     : 00000000`c0033333 00000000`00000000 00000208`8486fc00 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffff8b80`b7e75ec0 fffff804`3da0275e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468
ffff8b80`b7e76060 fffff804`3d8804f0     : ffff9981`6a853000 ffffaa06`77656050 fffff804`3d8b5fa0 ffff9981`6a853000 : nt!KiPageFault+0x35e
ffff8b80`b7e761f8 fffff804`3d8b5fa0     : ffff9981`6a853000 ffff9981`6a853000 00000000`00000002 00000208`8486fc00 : nt!RtlDecompressBufferXpressLz+0x50
ffff8b80`b7e76210 fffff804`3d847328     : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`0016a844 : nt!RtlDecompressBufferEx+0x60
ffff8b80`b7e76260 fffff804`3d8471b5     : 00000000`00000004 fffff804`3d846d1e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffff8b80`b7e76320 fffff804`3d846a84     : 00000000`00000001 00000000`0001fc00 ffffaa06`77656000 ffffaa06`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff8b80`b7e76370 fffff804`3d89285c     : fffff804`ffffffff ffffaa06`79ddb000 ffff8b80`b7e76450 ffffaa06`74654c10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff8b80`b7e76410 fffff804`3d8926a9     : ffff9981`69f09730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff8b80`b7e764c0 fffff804`3d892561     : ffffaa06`77656000 ffffaa06`74654c10 ffffaa06`79ddb000 ffffaa06`776579c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff8b80`b7e76540 fffff804`3d80d468     : ffffaa06`757e0080 ffffaa06`77656000 00000000`00000000 ffffaa06`7bac0440 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff8b80`b7e76570 fffff804`3d893a37     : fffff804`3d892540 ffff8b80`b7e76610 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8b80`b7e765e0 fffff804`3d84db74     : ffff8b80`b7e766e0 00000000`31526d73 00000000`000003ff fffff804`3e3239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff8b80`b7e766b0 fffff804`3d84d5a8     : 00000000`0000000c 00000000`000003ff ffff8b80`b7e76760 fffff804`3e3239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff8b80`b7e76700 fffff804`3d892c97     : 00000000`0000000c 00000000`00000001 ffffaa06`74654c10 ffffaa06`7bac0440 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff8b80`b7e76790 fffff804`3d8a854b     : ffffaa06`00000001 ffffaa06`7bac0500 00000000`00000000 ffffaa06`77656000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff8b80`b7e76800 fffff804`3d917438     : 0000007f`00000100 00000000`00000000 ffff8b80`b7e76a58 fffff804`3d917bb0 : nt!SmPageRead+0x33
ffff8b80`b7e76850 fffff804`3d91770d     : 00000000`00000002 ffff8b80`b7e768e0 ffff8b80`b7e76a58 ffffaa06`7bac03f0 : nt!MiIssueHardFaultIo+0x10c
ffff8b80`b7e768a0 fffff804`3d8ea648     : 00000000`c0033333 00000000`00000001 00007ffc`60ce5260 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffff8b80`b7e76960 fffff804`3da0275e     : ffffaa06`757e0080 00000000`00000000 00000000`00000000 ffffaa06`00000000 : nt!MmAccessFault+0x468
ffff8b80`b7e76b00 00007ffc`60cb931d     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
0000003c`e3cff200 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`60cb931d


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

 *** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_SERVICE_FAILED (5a)
Arguments:
Arg1: 0000000000000001
Arg2: ffffc20f2f28db10
Arg3: ffff868e55533220
Arg4: ffffffffc000000e

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: baseName                                      ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5765

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 30207

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  5a

BUGCHECK_P1: 1

BUGCHECK_P2: ffffc20f2f28db10

BUGCHECK_P3: ffff868e55533220

BUGCHECK_P4: ffffffffc000000e

BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffd78c`57606938 fffff800`7edec492     : 00000000`0000005a 00000000`00000001 ffffc20f`2f28db10 ffff868e`55533220 : nt!KeBugCheckEx
ffffd78c`57606940 fffff800`7f053eaf     : ffffc20f`2bdf94a0 ffffc20f`2bdf94a0 ffffd78c`57606b80 00000000`00000000 : nt!IopLoadDriver+0xce5aa
ffffd78c`57606b10 fffff800`7f060ad6     : ffffffff`00000000 ffff868e`55609b00 00000000`00000000 fffff800`7a07a860 : nt!IopInitializeSystemDrivers+0x157
ffffd78c`57606bb0 fffff800`7ed946db     : fffff800`7a07a860 fffff800`7f247048 fffff800`7ed946a0 fffff800`7a07a860 : nt!IoInitSystem+0x2e
ffffd78c`57606be0 fffff800`7e8a2ae5     : ffffc20f`29c6f400 fffff800`7ed946a0 fffff800`7a07a860 245c8948`0015ea97 : nt!Phase1Initialization+0x3b
ffffd78c`57606c10 fffff800`7e9fbbf8     : fffff800`7a3ed180 ffffc20f`29c6f400 fffff800`7e8a2a90 000000f0`838b4800 : nt!PspSystemThreadStartup+0x55
ffffd78c`57606c60 00000000`00000000     : ffffd78c`57607000 ffffd78c`57601000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!IopLoadDriver+ce5aa

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ce5aa

FAILURE_BUCKET_ID:  0x5A_c000000e_nt!IopLoadDriver

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9778c4da-880c-c900-5b14-c503b2b13611}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffd087cf911000, Pointer to the store context or data manager
Arg2: ffffb600741387d0, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 46593

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  154

BUGCHECK_P1: ffffd087cf911000

BUGCHECK_P2: ffffb600741387d0

BUGCHECK_P3: 2

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffb60074139758 -- (.exr 0xffffb60074139758)
ExceptionAddress: fffff80127e804f0 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
   ExceptionCode: c0000006 (In-page I/O error)
  ExceptionFlags: 00000000
NumberParameters: 3
   Parameter[0]: 0000000000000000
   Parameter[1]: 000001c7ce965310
   Parameter[2]: 00000000c000000e
Inpage operation failed at 000001c7ce965310, due to I/O error 00000000c000000e

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000001c7ce965310

CONTEXT:  ffffb60074138f90 -- (.cxr 0xffffb60074138f90)
rax=fffff80127e804a0 rbx=ffffc081265c4000 rcx=ffffc081265c4000
rdx=ffffc081265c4000 rsi=0000000000000002 rdi=000001c7ce965310
rip=fffff80127e804f0 rsp=ffffb60074139998 rbp=000001c7ce965e5b
 r8=000001c7ce965310  r9=0000000000000ba1 r10=ffffc081265c4ea0
r11=000001c7ce965eb1 r12=ffffb60074139c08 r13=ffffd087cbdde000
r14=ffffc081265c5000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlDecompressBufferXpressLz+0x50:
fffff801`27e804f0 418b08          mov     ecx,dword ptr [r8] ds:002b:000001c7`ce965310=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/  hata durumu y z nden belle e yerle tirilmedi.

EXCEPTION_CODE_STR:  c0000006

EXCEPTION_PARAMETER3:  00000000c000000e

EXCEPTION_STR:  0xc0000006

TRAP_FRAME:  ffffb6007413a2a0 -- (.trap 0xffffb6007413a2a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc08125197180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012d47029c rsp=ffffb6007413a430 rbp=ffffb6007413a530
 r8=0000000000000011  r9=000000000000002f r10=0000fffff80127e7
r11=ffffb07989e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
CLASSPNP!ClassDispatchPnp+0x6e8c:
fffff801`2d47029c ff              ???
Resetting default scope

STACK_TEXT: 
ffffb600`7413a430 fffff801`2d4283e3     : fffff801`28326ea0 fffff801`283239e0 ffffd087`d1e79700 4aca104a`78c34fc8 : CLASSPNP!ClassDispatchPnp+0x6e8c
ffffb600`7413a5b0 fffff801`27ecd805     : ffffb600`7413a628 ffffac11`4fa0feb1 ffffe106`db37fdb0 00000000`00000300 : CLASSPNP!ClassGlobalDispatch+0x23
ffffb600`7413a5e0 fffff801`27e99f6e     : ffffb600`00000000 00000000`00000000 00000000`00000000 fffff801`27c0c440 : nt!IofCallDriver+0x55
ffffb600`7413a620 fffff801`2827bd21     : 00000000`00000000 00000000`00000280 ffffb600`7413a6d8 fffff801`27c0af28 : nt!IoSynchronousCallDriver+0x4e
ffffb600`7413a680 fffff801`2c5aecb6     : ffffb600`00000010 ffffb600`7413a6d0 00000000`00000001 ffffd087`c83c8a20 : nt!IoForwardIrpSynchronously+0x41
ffffb600`7413a6b0 fffff801`2c5ac2d9     : ffffd087`d1e79700 00000000`00000000 ffffb600`7413a850 fffff801`27ecd9e1 : partmgr!PmSurpriseRemoval+0x26
ffffb600`7413a6e0 fffff801`2c593cff     : ffffd087`c83c88d0 00000000`00000000 ffffb600`7413a850 ffffd087`c8285050 : partmgr!PmPnp+0xf9
ffffb600`7413a730 fffff801`27ecd805     : 00000000`00000000 fffff801`27e03773 00000000`00000003 00000000`69706e04 : partmgr!PmGlobalDispatch+0x1f
ffffb600`7413a760 fffff801`281d4b48     : 00000000`00000000 ffffd087`c83c88d0 ffffb600`7413a850 ffffd087`c81a8c20 : nt!IofCallDriver+0x55
ffffb600`7413a7a0 fffff801`28339b31     : ffffd087`c8285050 ffffd087`c8285050 ffffd087`c81a8c20 00000000`00000017 : nt!IopSynchronousCall+0xf8
ffffb600`7413a810 fffff801`2833b944     : ffffe107`0c41ed80 00000000`00000000 00000000`0000030a 00000000`00000308 : nt!IopRemoveDevice+0x105
ffffb600`7413a8c0 fffff801`28339734     : ffffd087`c81a8c20 00000000`00000000 00000000`00000000 fffff801`2833967b : nt!PnpSurpriseRemoveLockedDeviceNode+0xb0
ffffb600`7413a920 fffff801`2833942f     : ffffd087`c81a8c20 ffffb600`7413a9a0 00000000`00000000 fffff801`28339168 : nt!PnpDeleteLockedDeviceNode+0x88
ffffb600`7413a960 fffff801`28337b7a     : ffffd087`c8285050 00000045`00000002 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7
ffffb600`7413a9e0 fffff801`28327c53     : ffffb600`7413ab20 ffffd087`c81a8c00 ffffb600`7413ab00 ffffe106`00000001 : nt!PnpProcessQueryRemoveAndEject+0x1da
ffffb600`7413aac0 fffff801`28208b1e     : ffffe107`0c41ed80 ffffe106`f0229d20 ffffd087`c608d500 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xeb
ffffb600`7413aaf0 fffff801`27f035f5     : ffffd087`d583d040 ffffd087`d583d040 ffffd087`c608d520 ffffd087`d30e85e0 : nt!PnpDeviceEventWorker+0x2ce
ffffb600`7413ab70 fffff801`27ea2ae5     : ffffd087`d583d040 00000000`00000080 ffffd087`c60aa040 79010400`00000001 : nt!ExpWorkerThread+0x105
ffffb600`7413ac10 fffff801`27ffbbf8     : ffffc081`25447180 ffffd087`d583d040 fffff801`27ea2a90 0001eb01`7a2350e0 : nt!PspSystemThreadStartup+0x55
ffffb600`7413ac60 00000000`00000000     : ffffb600`7413b000 ffffb600`74135000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .trap 0xffffb6007413a2a0 ; kb

SYMBOL_NAME:  partmgr!PmSurpriseRemoval+26

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

IMAGE_VERSION:  10.0.19041.1030

BUCKET_ID_FUNC_OFFSET:  26

FAILURE_BUCKET_ID:  0x154_c0000006_c000000e_partmgr!PmSurpriseRemoval

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c74b6c8b-7b95-0433-ac99-4d7718353379}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80604051112, Address of the instruction which caused the bugcheck
Arg3: ffffdb0872043570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 31856

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80604051112

BUGCHECK_P3: ffffdb0872043570

BUGCHECK_P4: 0

CONTEXT:  ffffdb0872043570 -- (.cxr 0xffffdb0872043570)
rax=0000000000000000 rbx=ffffdb0872043fd0 rcx=0000000000000007
rdx=00000000019a6818 rsi=000000000000010d rdi=ffffc78c64aa4000
rip=fffff80604051112 rsp=ffffdb0872043f78 rbp=ffffc78c64aa4000
 r8=000000000000001c  r9=ffffa38f88ef6080 r10=00000226c7327818
r11=0000000000000818 r12=0000000081edda76 r13=ffffdb0872044230
r14=000000000000010d r15=00000226c7370024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff806`04051112 418b02          mov     eax,dword ptr [r10] ds:002b:00000226`c7327818=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
ffffdb08`72043f78 fffff806`040e0a7f     : 00000000`ec2ba625 ffffdb08`720442e0 00000226`c76f8ac4 00000000`c0000034 : nt!HvpGetCellPaged+0xa2
ffffdb08`72043f80 fffff806`040e68b5     : 00000001`ffffffff 00000000`81edda76 00000000`ec2ba625 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffdb08`72043fd0 fffff806`040e99f9     : ffffc78c`6fdf59f0 00000000`00000005 ffffdb08`720441d0 ffffdb08`72044250 : nt!CmpWalkOneLevel+0x6f5
ffffdb08`720440d0 fffff806`040e82e3     : ffffa38f`0000001c ffffdb08`72044420 ffffdb08`720443d8 ffffa38f`8d4ec560 : nt!CmpDoParseKey+0x849
ffffdb08`72044370 fffff806`040ec3ae     : fffff806`040e8001 00000000`00000000 ffffa38f`8d4ec560 00000000`6d4e6201 : nt!CmpParseKey+0x2c3
ffffdb08`72044510 fffff806`040f566a     : ffffa38f`8d4ec500 ffffdb08`72044778 ffffa38f`00000040 ffffa38f`7eef10c0 : nt!ObpLookupObjectName+0x3fe
ffffdb08`720446e0 fffff806`040f544c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa38f`7eef10c0 : nt!ObOpenObjectByNameEx+0x1fa
ffffdb08`72044810 fffff806`040f4f71     : 000000a7`7edfcac0 ffffdb08`72044b80 00000000`00000001 fffff806`03c9ccce : nt!ObOpenObjectByName+0x5c
ffffdb08`72044860 fffff806`040f4c9f     : 000000a7`7edfe89c 000000a7`7edfd258 00000208`4182de20 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffdb08`72044ac0 fffff806`03e05fb8     : ffffa38f`88ef0000 ffffa38f`8d9d8ce0 ffffdb08`72044b80 ffffa38f`00000238 : nt!NtOpenKeyEx+0xf
ffffdb08`72044b00 00007ffd`8568e184     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a7`7edfc978 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8568e184


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffdb0872043570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80072c51112, Address of the instruction which caused the bugcheck
Arg3: ffffd2052656a570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8531

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 29979

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80072c51112

BUGCHECK_P3: ffffd2052656a570

BUGCHECK_P4: 0

CONTEXT:  ffffd2052656a570 -- (.cxr 0xffffd2052656a570)
rax=0000000000000000 rbx=ffffd2052656afd0 rcx=0000000000000007
rdx=00000000045f9560 rsi=000000000000034e rdi=ffffbf8723a87000
rip=fffff80072c51112 rsp=ffffd2052656af78 rbp=ffffbf8723a87000
 r8=000000000000001c  r9=ffffaa873210c080 r10=0000017dc0a3a560
r11=0000000000000560 r12=00000000ce4cf905 r13=ffffd2052656b230
r14=000000000000034e r15=0000017dc095b024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff800`72c51112 418b02          mov     eax,dword ptr [r10] ds:002b:0000017d`c0a3a560=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
ffffd205`2656af78 fffff800`72ce0a7f     : 00000000`7f147a21 ffffd205`2656b2f0 00000000`00000000 ffffbf87`2ae5f7d0 : nt!HvpGetCellPaged+0xa2
ffffd205`2656af80 fffff800`72ce68b5     : 00000001`ffffffff 00000000`ce4cf905 ffffd205`2656b9e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffd205`2656afd0 fffff800`72ce99f9     : ffffbf87`2ae5f7d0 00000000`00000006 ffffd205`2656b1d0 ffffd205`2656b250 : nt!CmpWalkOneLevel+0x6f5
ffffd205`2656b0d0 fffff800`72ce82e3     : 00000000`0000001c ffffd205`2656b420 ffffd205`2656b3d8 ffffaa87`3057d270 : nt!CmpDoParseKey+0x849
ffffd205`2656b370 fffff800`72cec3ae     : fffff800`72ce8001 00000000`00000000 ffffaa87`3057d270 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffd205`2656b510 fffff800`72cf566a     : ffffaa87`3057d200 ffffd205`2656b778 00000000`00000040 ffffaa87`288f0bc0 : nt!ObpLookupObjectName+0x3fe
ffffd205`2656b6e0 fffff800`72cf544c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffaa87`288f0bc0 : nt!ObOpenObjectByNameEx+0x1fa
ffffd205`2656b810 fffff800`72cf4f71     : 000000d8`2ecfed98 ffffd205`2656bb80 00000000`00000001 fffff800`7289ccce : nt!ObOpenObjectByName+0x5c
ffffd205`2656b860 fffff800`72cf4c9f     : 000001f2`5e6d78e0 000001f2`5e6d7900 000001f2`5c47f000 000001f2`5c48c7d0 : nt!CmOpenKey+0x2c1
ffffd205`2656bac0 fffff800`72a05fb8     : ffffaa87`3210c000 00000000`00000000 ffffd205`2656bb80 000001f2`5eb93060 : nt!NtOpenKeyEx+0xf
ffffd205`2656bb00 00007ffb`d10ae184     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`2ecfecb8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d10ae184


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffd2052656a570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------
HDD'in SATA kablosunu değiştiriniz.
 
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız. Sorun disk kaynaklı gözüküyor.
Vanguard kaldırınız.
MSI Afterburner kaldırınız.
Her Memory management hatası bellek kaynaklı değilmiş.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 000000000000003f, An inpage operation failed with a CRC error. Parameter 2 contains
    the pagefile offset. Parameter 3 contains the page CRC value.
    Parameter 4 contains the expected CRC value.
Arg2: 000000000000eabd
Arg3: 000000000000e8bd
Arg4: 00000000d44880d4

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7078

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 33070

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 3f

BUGCHECK_P2: eabd

BUGCHECK_P3: e8bd

BUGCHECK_P4: d44880d4

ADDITIONAL_DEBUG_TEXT:  Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.


BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

PAGE_HASH_ERRORS_DETECTED: 1

TRAP_FRAME:  ffff8b80b7e76060 -- (.trap 0xffff8b80b7e76060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8043d8804a0 rbx=0000000000000000 rcx=ffff99816a853000
rdx=ffff99816a853000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043d8804f0 rsp=ffff8b80b7e761f8 rbp=000002088486fe28
r8=000002088486fc00  r9=000000000000027e r10=ffff99816a853ea0
r11=000002088486fe7e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlDecompressBufferXpressLz+0x50:
fffff804`3d8804f0 418b08          mov     ecx,dword ptr [r8] ds:00000208`8486fc00=????????
Resetting default scope

STACK_TEXT:
ffff8b80`b7e75bd8 fffff804`3db575ad     : 00000000`0000001a 00000000`0000003f 00000000`0000eabd 00000000`0000e8bd : nt!KeBugCheckEx
ffff8b80`b7e75be0 fffff804`3d919b21     : ffffaa06`787ca860 ffffffff`ffffffff 00000000`00000000 fffff601`04424378 : nt!MiValidatePagefilePageHash+0x331
ffff8b80`b7e75cc0 fffff804`3d917835     : ffff8b80`00010000 ffff8b80`b7e75e00 ffff8b80`b7e75e50 fffff804`00000000 : nt!MiWaitForInPageComplete+0x351
ffff8b80`b7e75db0 fffff804`3d8ea648     : 00000000`c0033333 00000000`00000000 00000208`8486fc00 00000000`00000000 : nt!MiIssueHardFault+0x3c5
ffff8b80`b7e75ec0 fffff804`3da0275e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x468
ffff8b80`b7e76060 fffff804`3d8804f0     : ffff9981`6a853000 ffffaa06`77656050 fffff804`3d8b5fa0 ffff9981`6a853000 : nt!KiPageFault+0x35e
ffff8b80`b7e761f8 fffff804`3d8b5fa0     : ffff9981`6a853000 ffff9981`6a853000 00000000`00000002 00000208`8486fc00 : nt!RtlDecompressBufferXpressLz+0x50
ffff8b80`b7e76210 fffff804`3d847328     : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`0016a844 : nt!RtlDecompressBufferEx+0x60
ffff8b80`b7e76260 fffff804`3d8471b5     : 00000000`00000004 fffff804`3d846d1e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffff8b80`b7e76320 fffff804`3d846a84     : 00000000`00000001 00000000`0001fc00 ffffaa06`77656000 ffffaa06`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff8b80`b7e76370 fffff804`3d89285c     : fffff804`ffffffff ffffaa06`79ddb000 ffff8b80`b7e76450 ffffaa06`74654c10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff8b80`b7e76410 fffff804`3d8926a9     : ffff9981`69f09730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff8b80`b7e764c0 fffff804`3d892561     : ffffaa06`77656000 ffffaa06`74654c10 ffffaa06`79ddb000 ffffaa06`776579c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff8b80`b7e76540 fffff804`3d80d468     : ffffaa06`757e0080 ffffaa06`77656000 00000000`00000000 ffffaa06`7bac0440 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff8b80`b7e76570 fffff804`3d893a37     : fffff804`3d892540 ffff8b80`b7e76610 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8b80`b7e765e0 fffff804`3d84db74     : ffff8b80`b7e766e0 00000000`31526d73 00000000`000003ff fffff804`3e3239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff8b80`b7e766b0 fffff804`3d84d5a8     : 00000000`0000000c 00000000`000003ff ffff8b80`b7e76760 fffff804`3e3239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff8b80`b7e76700 fffff804`3d892c97     : 00000000`0000000c 00000000`00000001 ffffaa06`74654c10 ffffaa06`7bac0440 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff8b80`b7e76790 fffff804`3d8a854b     : ffffaa06`00000001 ffffaa06`7bac0500 00000000`00000000 ffffaa06`77656000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff8b80`b7e76800 fffff804`3d917438     : 0000007f`00000100 00000000`00000000 ffff8b80`b7e76a58 fffff804`3d917bb0 : nt!SmPageRead+0x33
ffff8b80`b7e76850 fffff804`3d91770d     : 00000000`00000002 ffff8b80`b7e768e0 ffff8b80`b7e76a58 ffffaa06`7bac03f0 : nt!MiIssueHardFaultIo+0x10c
ffff8b80`b7e768a0 fffff804`3d8ea648     : 00000000`c0033333 00000000`00000001 00007ffc`60ce5260 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffff8b80`b7e76960 fffff804`3da0275e     : ffffaa06`757e0080 00000000`00000000 00000000`00000000 ffffaa06`00000000 : nt!MmAccessFault+0x468
ffff8b80`b7e76b00 00007ffc`60cb931d     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
0000003c`e3cff200 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`60cb931d


SYMBOL_NAME:  PAGE_HASH_ERRORS_INPAGE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_HASH_ERRORS_0x1a_3f

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6a2d4548-0eec-578d-e8f1-9e2239aa9a00}

Followup:     MachineOwner
---------

*** Memory manager detected 1 instance(s) of corrupted pagefilepage(s) while performing in-page operations.
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

CRITICAL_SERVICE_FAILED (5a)
Arguments:
Arg1: 0000000000000001
Arg2: ffffc20f2f28db10
Arg3: ffff868e55533220
Arg4: ffffffffc000000e

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: baseName                                      ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5765

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 30207

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  5a

BUGCHECK_P1: 1

BUGCHECK_P2: ffffc20f2f28db10

BUGCHECK_P3: ffff868e55533220

BUGCHECK_P4: ffffffffc000000e

BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffd78c`57606938 fffff800`7edec492     : 00000000`0000005a 00000000`00000001 ffffc20f`2f28db10 ffff868e`55533220 : nt!KeBugCheckEx
ffffd78c`57606940 fffff800`7f053eaf     : ffffc20f`2bdf94a0 ffffc20f`2bdf94a0 ffffd78c`57606b80 00000000`00000000 : nt!IopLoadDriver+0xce5aa
ffffd78c`57606b10 fffff800`7f060ad6     : ffffffff`00000000 ffff868e`55609b00 00000000`00000000 fffff800`7a07a860 : nt!IopInitializeSystemDrivers+0x157
ffffd78c`57606bb0 fffff800`7ed946db     : fffff800`7a07a860 fffff800`7f247048 fffff800`7ed946a0 fffff800`7a07a860 : nt!IoInitSystem+0x2e
ffffd78c`57606be0 fffff800`7e8a2ae5     : ffffc20f`29c6f400 fffff800`7ed946a0 fffff800`7a07a860 245c8948`0015ea97 : nt!Phase1Initialization+0x3b
ffffd78c`57606c10 fffff800`7e9fbbf8     : fffff800`7a3ed180 ffffc20f`29c6f400 fffff800`7e8a2a90 000000f0`838b4800 : nt!PspSystemThreadStartup+0x55
ffffd78c`57606c60 00000000`00000000     : ffffd78c`57607000 ffffd78c`57601000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!IopLoadDriver+ce5aa

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  ce5aa

FAILURE_BUCKET_ID:  0x5A_c000000e_nt!IopLoadDriver

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9778c4da-880c-c900-5b14-c503b2b13611}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffd087cf911000, Pointer to the store context or data manager
Arg2: ffffb600741387d0, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 46593

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  154

BUGCHECK_P1: ffffd087cf911000

BUGCHECK_P2: ffffb600741387d0

BUGCHECK_P3: 2

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffb60074139758 -- (.exr 0xffffb60074139758)
ExceptionAddress: fffff80127e804f0 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
   ExceptionCode: c0000006 (In-page I/O error)
  ExceptionFlags: 00000000
NumberParameters: 3
   Parameter[0]: 0000000000000000
   Parameter[1]: 000001c7ce965310
   Parameter[2]: 00000000c000000e
Inpage operation failed at 000001c7ce965310, due to I/O error 00000000c000000e

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000001c7ce965310

CONTEXT:  ffffb60074138f90 -- (.cxr 0xffffb60074138f90)
rax=fffff80127e804a0 rbx=ffffc081265c4000 rcx=ffffc081265c4000
rdx=ffffc081265c4000 rsi=0000000000000002 rdi=000001c7ce965310
rip=fffff80127e804f0 rsp=ffffb60074139998 rbp=000001c7ce965e5b
r8=000001c7ce965310  r9=0000000000000ba1 r10=ffffc081265c4ea0
r11=000001c7ce965eb1 r12=ffffb60074139c08 r13=ffffd087cbdde000
r14=ffffc081265c5000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlDecompressBufferXpressLz+0x50:
fffff801`27e804f0 418b08          mov     ecx,dword ptr [r8] ds:002b:000001c7`ce965310=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/  hata durumu y z nden belle e yerle tirilmedi.

EXCEPTION_CODE_STR:  c0000006

EXCEPTION_PARAMETER3:  00000000c000000e

EXCEPTION_STR:  0xc0000006

TRAP_FRAME:  ffffb6007413a2a0 -- (.trap 0xffffb6007413a2a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc08125197180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012d47029c rsp=ffffb6007413a430 rbp=ffffb6007413a530
r8=0000000000000011  r9=000000000000002f r10=0000fffff80127e7
r11=ffffb07989e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
CLASSPNP!ClassDispatchPnp+0x6e8c:
fffff801`2d47029c ff              ???
Resetting default scope

STACK_TEXT:
ffffb600`7413a430 fffff801`2d4283e3     : fffff801`28326ea0 fffff801`283239e0 ffffd087`d1e79700 4aca104a`78c34fc8 : CLASSPNP!ClassDispatchPnp+0x6e8c
ffffb600`7413a5b0 fffff801`27ecd805     : ffffb600`7413a628 ffffac11`4fa0feb1 ffffe106`db37fdb0 00000000`00000300 : CLASSPNP!ClassGlobalDispatch+0x23
ffffb600`7413a5e0 fffff801`27e99f6e     : ffffb600`00000000 00000000`00000000 00000000`00000000 fffff801`27c0c440 : nt!IofCallDriver+0x55
ffffb600`7413a620 fffff801`2827bd21     : 00000000`00000000 00000000`00000280 ffffb600`7413a6d8 fffff801`27c0af28 : nt!IoSynchronousCallDriver+0x4e
ffffb600`7413a680 fffff801`2c5aecb6     : ffffb600`00000010 ffffb600`7413a6d0 00000000`00000001 ffffd087`c83c8a20 : nt!IoForwardIrpSynchronously+0x41
ffffb600`7413a6b0 fffff801`2c5ac2d9     : ffffd087`d1e79700 00000000`00000000 ffffb600`7413a850 fffff801`27ecd9e1 : partmgr!PmSurpriseRemoval+0x26
ffffb600`7413a6e0 fffff801`2c593cff     : ffffd087`c83c88d0 00000000`00000000 ffffb600`7413a850 ffffd087`c8285050 : partmgr!PmPnp+0xf9
ffffb600`7413a730 fffff801`27ecd805     : 00000000`00000000 fffff801`27e03773 00000000`00000003 00000000`69706e04 : partmgr!PmGlobalDispatch+0x1f
ffffb600`7413a760 fffff801`281d4b48     : 00000000`00000000 ffffd087`c83c88d0 ffffb600`7413a850 ffffd087`c81a8c20 : nt!IofCallDriver+0x55
ffffb600`7413a7a0 fffff801`28339b31     : ffffd087`c8285050 ffffd087`c8285050 ffffd087`c81a8c20 00000000`00000017 : nt!IopSynchronousCall+0xf8
ffffb600`7413a810 fffff801`2833b944     : ffffe107`0c41ed80 00000000`00000000 00000000`0000030a 00000000`00000308 : nt!IopRemoveDevice+0x105
ffffb600`7413a8c0 fffff801`28339734     : ffffd087`c81a8c20 00000000`00000000 00000000`00000000 fffff801`2833967b : nt!PnpSurpriseRemoveLockedDeviceNode+0xb0
ffffb600`7413a920 fffff801`2833942f     : ffffd087`c81a8c20 ffffb600`7413a9a0 00000000`00000000 fffff801`28339168 : nt!PnpDeleteLockedDeviceNode+0x88
ffffb600`7413a960 fffff801`28337b7a     : ffffd087`c8285050 00000045`00000002 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7
ffffb600`7413a9e0 fffff801`28327c53     : ffffb600`7413ab20 ffffd087`c81a8c00 ffffb600`7413ab00 ffffe106`00000001 : nt!PnpProcessQueryRemoveAndEject+0x1da
ffffb600`7413aac0 fffff801`28208b1e     : ffffe107`0c41ed80 ffffe106`f0229d20 ffffd087`c608d500 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xeb
ffffb600`7413aaf0 fffff801`27f035f5     : ffffd087`d583d040 ffffd087`d583d040 ffffd087`c608d520 ffffd087`d30e85e0 : nt!PnpDeviceEventWorker+0x2ce
ffffb600`7413ab70 fffff801`27ea2ae5     : ffffd087`d583d040 00000000`00000080 ffffd087`c60aa040 79010400`00000001 : nt!ExpWorkerThread+0x105
ffffb600`7413ac10 fffff801`27ffbbf8     : ffffc081`25447180 ffffd087`d583d040 fffff801`27ea2a90 0001eb01`7a2350e0 : nt!PspSystemThreadStartup+0x55
ffffb600`7413ac60 00000000`00000000     : ffffb600`7413b000 ffffb600`74135000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  .trap 0xffffb6007413a2a0 ; kb

SYMBOL_NAME:  partmgr!PmSurpriseRemoval+26

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

IMAGE_VERSION:  10.0.19041.1030

BUCKET_ID_FUNC_OFFSET:  26

FAILURE_BUCKET_ID:  0x154_c0000006_c000000e_partmgr!PmSurpriseRemoval

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c74b6c8b-7b95-0433-ac99-4d7718353379}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80604051112, Address of the instruction which caused the bugcheck
Arg3: ffffdb0872043570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 31856

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80604051112

BUGCHECK_P3: ffffdb0872043570

BUGCHECK_P4: 0

CONTEXT:  ffffdb0872043570 -- (.cxr 0xffffdb0872043570)
rax=0000000000000000 rbx=ffffdb0872043fd0 rcx=0000000000000007
rdx=00000000019a6818 rsi=000000000000010d rdi=ffffc78c64aa4000
rip=fffff80604051112 rsp=ffffdb0872043f78 rbp=ffffc78c64aa4000
r8=000000000000001c  r9=ffffa38f88ef6080 r10=00000226c7327818
r11=0000000000000818 r12=0000000081edda76 r13=ffffdb0872044230
r14=000000000000010d r15=00000226c7370024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff806`04051112 418b02          mov     eax,dword ptr [r10] ds:002b:00000226`c7327818=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT:
ffffdb08`72043f78 fffff806`040e0a7f     : 00000000`ec2ba625 ffffdb08`720442e0 00000226`c76f8ac4 00000000`c0000034 : nt!HvpGetCellPaged+0xa2
ffffdb08`72043f80 fffff806`040e68b5     : 00000001`ffffffff 00000000`81edda76 00000000`ec2ba625 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffdb08`72043fd0 fffff806`040e99f9     : ffffc78c`6fdf59f0 00000000`00000005 ffffdb08`720441d0 ffffdb08`72044250 : nt!CmpWalkOneLevel+0x6f5
ffffdb08`720440d0 fffff806`040e82e3     : ffffa38f`0000001c ffffdb08`72044420 ffffdb08`720443d8 ffffa38f`8d4ec560 : nt!CmpDoParseKey+0x849
ffffdb08`72044370 fffff806`040ec3ae     : fffff806`040e8001 00000000`00000000 ffffa38f`8d4ec560 00000000`6d4e6201 : nt!CmpParseKey+0x2c3
ffffdb08`72044510 fffff806`040f566a     : ffffa38f`8d4ec500 ffffdb08`72044778 ffffa38f`00000040 ffffa38f`7eef10c0 : nt!ObpLookupObjectName+0x3fe
ffffdb08`720446e0 fffff806`040f544c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa38f`7eef10c0 : nt!ObOpenObjectByNameEx+0x1fa
ffffdb08`72044810 fffff806`040f4f71     : 000000a7`7edfcac0 ffffdb08`72044b80 00000000`00000001 fffff806`03c9ccce : nt!ObOpenObjectByName+0x5c
ffffdb08`72044860 fffff806`040f4c9f     : 000000a7`7edfe89c 000000a7`7edfd258 00000208`4182de20 00000000`00000000 : nt!CmOpenKey+0x2c1
ffffdb08`72044ac0 fffff806`03e05fb8     : ffffa38f`88ef0000 ffffa38f`8d9d8ce0 ffffdb08`72044b80 ffffa38f`00000238 : nt!NtOpenKeyEx+0xf
ffffdb08`72044b00 00007ffd`8568e184     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a7`7edfc978 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8568e184


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffdb0872043570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the bugcheck
Arg2: fffff80072c51112, Address of the instruction which caused the bugcheck
Arg3: ffffd2052656a570, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8531

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 29979

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff80072c51112

BUGCHECK_P3: ffffd2052656a570

BUGCHECK_P4: 0

CONTEXT:  ffffd2052656a570 -- (.cxr 0xffffd2052656a570)
rax=0000000000000000 rbx=ffffd2052656afd0 rcx=0000000000000007
rdx=00000000045f9560 rsi=000000000000034e rdi=ffffbf8723a87000
rip=fffff80072c51112 rsp=ffffd2052656af78 rbp=ffffbf8723a87000
r8=000000000000001c  r9=ffffaa873210c080 r10=0000017dc0a3a560
r11=0000000000000560 r12=00000000ce4cf905 r13=ffffd2052656b230
r14=000000000000034e r15=0000017dc095b024
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!HvpGetCellPaged+0xa2:
fffff800`72c51112 418b02          mov     eax,dword ptr [r10] ds:002b:0000017d`c0a3a560=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT:
ffffd205`2656af78 fffff800`72ce0a7f     : 00000000`7f147a21 ffffd205`2656b2f0 00000000`00000000 ffffbf87`2ae5f7d0 : nt!HvpGetCellPaged+0xa2
ffffd205`2656af80 fffff800`72ce68b5     : 00000001`ffffffff 00000000`ce4cf905 ffffd205`2656b9e8 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffd205`2656afd0 fffff800`72ce99f9     : ffffbf87`2ae5f7d0 00000000`00000006 ffffd205`2656b1d0 ffffd205`2656b250 : nt!CmpWalkOneLevel+0x6f5
ffffd205`2656b0d0 fffff800`72ce82e3     : 00000000`0000001c ffffd205`2656b420 ffffd205`2656b3d8 ffffaa87`3057d270 : nt!CmpDoParseKey+0x849
ffffd205`2656b370 fffff800`72cec3ae     : fffff800`72ce8001 00000000`00000000 ffffaa87`3057d270 00000000`00000001 : nt!CmpParseKey+0x2c3
ffffd205`2656b510 fffff800`72cf566a     : ffffaa87`3057d200 ffffd205`2656b778 00000000`00000040 ffffaa87`288f0bc0 : nt!ObpLookupObjectName+0x3fe
ffffd205`2656b6e0 fffff800`72cf544c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffaa87`288f0bc0 : nt!ObOpenObjectByNameEx+0x1fa
ffffd205`2656b810 fffff800`72cf4f71     : 000000d8`2ecfed98 ffffd205`2656bb80 00000000`00000001 fffff800`7289ccce : nt!ObOpenObjectByName+0x5c
ffffd205`2656b860 fffff800`72cf4c9f     : 000001f2`5e6d78e0 000001f2`5e6d7900 000001f2`5c47f000 000001f2`5c48c7d0 : nt!CmOpenKey+0x2c1
ffffd205`2656bac0 fffff800`72a05fb8     : ffffaa87`3210c000 00000000`00000000 ffffd205`2656bb80 000001f2`5eb93060 : nt!NtOpenKeyEx+0xf
ffffd205`2656bb00 00007ffb`d10ae184     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d8`2ecfecb8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`d10ae184


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffd2052656a570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------
HDD'in SATA kablosunu değiştiriniz.
Yakın zamanda bad sector araması yaptım, temiz çıktı. Anakart ile beraber gelen SATA kablosunu kullanıyorum. Parçalarda uyumsuzluk olma ihtimali var mı?
Ekran Görüntüsü (4).png

Smart verileri de burada.
Ekran Görüntüsü (6).png

Ekran Görüntüsü (5).png
 
Raw Read Error Rate ve Seek Error Rate değerleri çok fazla. Başka bir SATA portuna takın HDD'i. Anakart ile RAM uyumsuz mu diye soruyorsunuz? SSD almanızı tavsiye ederim.
 
Bozuk olabilir o yüzden başka bir SATA portuna takmanızı istedim. Sistem 1 aylık değilse HDD ikinci el.
bu ciddi bir sorun mu?
Bu değerler sürekli artmış disk sorunlu sayılabilir. HDD hatası olduğunu bu yazı söylüyor.
Memory Manager detected corruption of a pagefile page while performing an in-page operation.
The data read from storage does not match the original data written.
This indicates the data was corrupted by the storage stack, or device hardware.

Türkçe olarak.
Bellek Yöneticisi, bir sayfa içi işlem gerçekleştirirken bir disk belleği dosyası sayfasının bozulması algıladı.
Depodan okunan veriler, yazılan orijinal verilerle eşleşmiyor.
Bu, verilerin depolama yığını veya aygıt donanımı tarafından bozulmuş olduğunu gösterir.
 
1 aylık olsa bile sorunlu olabilir HDD. Prime95 ile stress testi yapın işlemciye. OCTT ile tüm sisteme test sonra güç testi yapınız. Testlerden birinde mavi ekran alırsanız hangi testte aldığınızı söylersiniz. OCTT'nin yükleme linki:
Prime95.,
 

Yeni konular

Geri
Yukarı