are the ram sticks even the problem?
* Path validation summary
**
Response Time (ms) Location
Deferred srv
C:\Temp
WARNING: Whitespace at start of path element
Microsoft (R) Windows Debugger Version 10.0.18362.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\122619-8125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
* Path validation summary
**
Response Time (ms) Location
Deferred srv
C:\Temp
WARNING: Whitespace at start of path element
Symbol search path is: SRV
C:\Temp[/URL]
Executable search path is:
Windows 10 Kernel Version 18362 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff806
72600000 PsLoadedModuleList = 0xfffff806
72a48130
Debug session time: Thu Dec 26 16:50:56.767 2019 (UTC + 1:00)
System Uptime: 0 days 3:54:10.449
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
15: kd> !analyze -v
***
***
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80672bd6a5a, Address of the instruction which caused the bugcheck
Arg3: ffff888d76edea80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.535 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80672bd6a5a
BUGCHECK_P3: ffff888d76edea80
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%p verwies auf Arbeitsspeicher bei 0x%p. Der Vorgang %s konnte im Arbeitsspeicher nicht durchgef hrt werden.
FAULTING_IP:
nt!EtwpWriteUserEvent+d0a
fffff806
72bd6a5a 488b4578 mov rax,qword ptr [rbp+78h]
CONTEXT: ffff888d76edea80 -- (.cxr 0xffff888d76edea80)
rax=0000000040000000 rbx=0000000000000006 rcx=ffff888d76edf990
rdx=000000000000001e rsi=0000000000000000 rdi=0000000000000006
rip=fffff80672bd6a5a rsp=ffff888d76edf470 rbp=ffff888d76edf4c0
r8=0000000000000068 r9=0000000000000000 r10=ffffe7039e2e69e4
r11=ffffe7039e2e69e4 r12=ffffe7039e2e6980 r13=0000000000000000
r14=0000000000000068 r15=0000004a947fded0
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!EtwpWriteUserEvent+0xd0a:
fffff806
72bd6a5a 488b4578 mov rax,qword ptr [rbp+78h] ss:0018:ffff888d
76edf538=00000020b6cf5820
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 10
CPU_MHZ: e10
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: c
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-7BRTSPA
ANALYSIS_SESSION_TIME: 12-26-2019 20:24:38.0297
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff80672624fb8 to fffff80672bd6a5a
STACK_TEXT:
ffff888d
76edf470 fffff806
72624fb8 : ffff888d
76edf920 fffff806
78f75517 0000004a
947fdc98 fffff806
7263a5a7 : nt!EtwpWriteUserEvent+0xd0a
ffff888d
76edf840 fffff806
727d2d15 : ffffe703
00000000 00000216
00000001 00000000
00000000 ffff888d
76edfa80 : nt!NtTraceEvent+0x248
ffff888d
76edfa00 00007ffb
25bfcc74 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004a
947fdc28 00000000
00000000 : 00000000
00000000 00000000
00000000 00000000
00000000 00000000
00000000 : 0x00007ffb
25bfcc74
THREAD_SHA1_HASH_MOD_FUNC: f8d38820688d47b00c7baf415d5b102971b86af3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ba7a1d957ef6294e495f4ddfb4e5c7b37f47f92f
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!EtwpWriteUserEvent+d0a
fffff806`72bd6a5a 488b4578 mov rax,qword ptr [rbp+78h]
FAULT_INSTR_CODE: 78458b48
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!EtwpWriteUserEvent+d0a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .cxr 0xffff888d76edea80 ; kb
BUCKET_ID_FUNC_OFFSET: d0a
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!EtwpWriteUserEvent
BUCKET_ID: 0x3B_c0000005_nt!EtwpWriteUserEvent
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_nt!EtwpWriteUserEvent
TARGET_TIME: 2019-12-26T15:50:56.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 16:53:20
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.535
ANALYSIS_SESSION_ELAPSED_TIME: 130d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_nt!etwpwriteuserevent
FAILURE_ID_HASH: {f4ba4e04-c347-1683-5519-b57989a066f1}
Followup: MachineOwner
---------
This is a dmp from today. Can you see whats causing it?