Windows randomly reboots

  • Thread starter Thread starter ソンウンホ
  • Start date Start date

ソンウンホ

Guest
Hey, I've just built a pc and I am getting random reboots with no bluescreen.


I used windbg to analyze error logs and got this on the MEMORY.dmp

Any recommendations?


Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.





Loading Dump File [C:\Windows\MEMORY.DMP]

Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.





************* Path validation summary **************

Response Time (ms) Location

Deferred SRV*C:\Symbols*Symbol information

Symbol search path is: SRV*C:\Symbols*Symbol information

Executable search path is:

Windows 10 Kernel Version 19041 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS Personal

Built by: 19041.1.amd64fre.vb_release.191206-1406

Machine Name:

Kernel base = 0xfffff800`54a00000 PsLoadedModuleList = 0xfffff800`5562a490

Debug session time: Fri Apr 9 06:09:26.200 2021 (UTC + 9:00)

System Uptime: 0 days 1:01:41.889

Loading Kernel Symbols

...............................................................

................................................................

......................................................

Loading User Symbols

PEB address is NULL !

Loading unloaded module list

..........

For analysis of this file, run !analyze -v

6: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the bugcheck

Arg2: fffff8005509e938, Address of the instruction which caused the bugcheck

Arg3: fffff3008dd78c20, Address of the context record for the exception that caused the bugcheck

Arg4: 0000000000000000, zero.



Debugging Details:

------------------





KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 2



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on FREEMAN



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 20



Key : Analysis.Memory.CommitPeak.Mb

Value: 73



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: 3b



BUGCHECK_P1: c0000005



BUGCHECK_P2: fffff8005509e938



BUGCHECK_P3: fffff3008dd78c20



BUGCHECK_P4: 0



CONTEXT: fffff3008dd78c20 -- (.cxr 0xfffff3008dd78c20)

rax=0000000000002f40 rbx=fffff3008dd796b0 rcx=00000000000005e8

rdx=00000000827f827f rsi=0000000000000000 rdi=ffffab03a351f000

rip=fffff8005509e938 rsp=fffff3008dd79628 rbp=fffff3008dd79730

r8=ffffab03ad04a000 r9=0000000000000013 r10=000000000000027f

r11=000000000000027f r12=000001f3b838dc64 r13=ffffab03a351f000

r14=fffff3008dd79920 r15=0000000000000000

iopl=0 nv up ei pl nz na pe nc

cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202

nt!HvpGetCellPaged+0x68:

fffff800`5509e938 488b4808 mov rcx,qword ptr [rax+8] ds:002b:00000000`00002f48=????????????????

Resetting default scope



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



PROCESS_NAME: Registry



STACK_TEXT:

fffff300`8dd79628 fffff800`55020a74 : 00000000`00000060 00000000`00000001 fffff300`00000000 00000000`00000000 : nt!HvpGetCellPaged+0x68

fffff300`8dd79630 fffff800`54fecb32 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x284

fffff300`8dd79790 fffff800`54e075b8 : 00000000`08b3e370 00000000`00000002 00000000`00000000 00000000`02000000 : nt!NtQueryValueKey+0x5f2

fffff300`8dd79a90 00007ffd`6abacef4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28

00000000`08b3e2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6abacef4





SYMBOL_NAME: nt!HvpGetCellPaged+68



MODULE_NAME: nt



IMAGE_NAME: ntkrnlmp.exe



STACK_COMMAND: .cxr 0xfffff3008dd78c20 ; kb



BUCKET_ID_FUNC_OFFSET: 68



FAILURE_BUCKET_ID: 0x3B_c0000005_nt!HvpGetCellPaged



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {32f4db97-5bc1-37be-caf3-746cdc554a0b}



Followup: MachineOwner

---------

Continue reading...
 
Back
Top