CoD Warzone mavi ekran hatası

RAM'niz bellek destek listesinde yok ve dosyalar RAM'e işaret ediyor. Yeni RAM almalısınız ama bazen destek listesinde olmayan RAM'ler de uyumlu çalışabiliyor bu yüzden Memtest86 ile USB üzerinden RAM testi yapmanızı öneririm.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8030c0aa4bf, Address of the instruction which caused the bugcheck
Arg3: fffff90430970ef0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8030c0aa4bf

BUGCHECK_P3: fffff90430970ef0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!RtlpHpEnvAllocVA+bf
fffff803`0c0aa4bf 89442420        mov     dword ptr [rsp+20h],eax

CONTEXT:  fffff90430970ef0 -- (.cxr 0xfffff90430970ef0)
rax=0000000000000001 rbx=0000000000001000 rcx=fffff90430971950
rdx=fffff90430971960 rsi=0000000000001001 rdi=0000000000000001
rip=fffff8030c0aa4bf rsp=fffff904309718e0 rbp=fffff90430971920
r8=0000000000001001  r9=0000000000000004 r10=0000000000001001
r11=0000000000001000 r12=0000000000000000 r13=0000000000001000
r14=fffff90430971a40 r15=fffff904309719d0
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlpHpEnvAllocVA+0xbf:
fffff803`0c0aa4bf 89442420        mov     dword ptr [rsp+20h],eax ss:0018:fffff904`30971900=00000011
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-11-2020 16:12:56.0823

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8030c0aa314 to fffff8030c0aa4bf

STACK_TEXT:
fffff904`309718e0 fffff803`0c0aa314 : ffffcc8f`d9fea000 fffff904`30971a48 00000000`00001000 ffffcc8f`d1000100 : nt!RtlpHpEnvAllocVA+0xbf
fffff904`30971950 fffff803`0c0a9bd8 : 00000000`00001000 ffffad00`0c119d30 ffff8b05`e4542df0 ffff8b05`e4542e10 : nt!RtlpHpAllocVA+0xf8
fffff904`30971a10 fffff803`0c0a9848 : ffffcc8f`d9f01d00 ffffcc8f`d9f00000 00000000`00000001 ffffcc8f`d1000100 : nt!RtlpHpSegMgrCommit+0x108
fffff904`30971b00 fffff803`0c11bea9 : ffffcc8f`00000001 00000000`00007fff ffffcc8f`00000001 ffffcc8f`d9fe9018 : nt!RtlpHpSegLfhVsCommit+0x1c8
fffff904`30971b80 fffff803`0c11b639 : 00010000`00000000 00000000`00000002 0000001e`00000001 00000000`00001000 : nt!RtlpHpVsChunkSplit+0x779
fffff904`30971c50 fffff803`0c10bcbe : ffffcc8f`0000008a ffff8b05`00000880 ffff8b05`00000880 ffffcc8f`d1000000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
fffff904`30971cc0 fffff803`0c36f08d : fffff904`80000001 00000000`00000000 00000000`00000000 00000000`00000800 : nt!ExAllocateHeapPool+0xc0e
fffff904`30971e00 fffff803`0c07a487 : ffffffff`ffffffff 00000000`00000100 00000000`00000100 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
fffff904`30971e50 fffff803`0c094ef1 : ffff8b05`00000000 ffffffff`ffffffff ffff8b05`ece67cd0 fffff803`00000000 : nt!MiCreatePrototypePtes+0x53
fffff904`30971ef0 fffff803`0c097ba0 : fffff904`00000001 00000000`00000040 00000000`00000040 00000000`00000100 : nt!MiAddViewsForSection+0x3f1
fffff904`30971ff0 fffff803`0c09982f : 00000000`00000000 ffff8b05`dffddac8 00000000`00000000 fffff803`0c10b9ab : nt!MmMapViewInSystemCache+0xc0
fffff904`30972160 fffff803`0c0d4bcb : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!CcGetVacbMiss+0xcf
fffff904`309721f0 fffff803`0c1273fe : ffff8b05`00000000 fffff904`00000000 fffff904`309722f8 fffff904`309722dc : nt!CcGetVirtualAddress+0x33b
fffff904`30972290 fffff803`0c1292d5 : ffff8b05`ec358ba0 000001ad`92c42690 fffff904`30972470 00000000`00000178 : nt!CcMapAndCopyInToCache+0x4fe
fffff904`30972410 fffff803`0dd1d81a : ffffcc8f`d7b318c0 ffff8b05`eaa784f0 ffff8b05`eaa784f0 ffffcc8f`d7b31700 : nt!CcCopyWriteEx+0x105
fffff904`30972490 fffff803`0dd1c438 : ffff8b05`eaa78468 00000000`00000001 fffff904`30972718 00000000`00000000 : Ntfs!NtfsCommonWrite+0x113a
fffff904`309726c0 fffff803`0c10a929 : ffff8b05`ea3f08a0 ffff8b05`eccf9460 ffff8b05`eccf9800 ffff8b05`e4572d60 : Ntfs!NtfsFsdWrite+0x1e8
fffff904`30972790 fffff803`0d2e55de : 00000000`00000000 fffff904`30972870 ffff8b05`eccf9460 fffff904`30972880 : nt!IofCallDriver+0x59
fffff904`309727d0 fffff803`0d2e3f16 : fffff904`30972870 00000000`00000000 00000000`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
fffff904`30972850 fffff803`0c10a929 : ffff8b05`eccf9460 ffff8b05`ecb4c7e0 00000000`00000000 00000000`00000000 : FLTMGR!FltpDispatch+0xb6
fffff904`309728b0 fffff803`0c6b3115 : 00000000`00000001 ffff8b05`ecb4c7e0 ffff8b05`eccf9848 ffff8b05`ecb4c7e0 : nt!IofCallDriver+0x59
fffff904`309728f0 fffff803`0c636a46 : ffff8b05`00000000 ffff8b05`e4572d60 ffff8b05`ecb4c7e0 fffff904`30972b80 : nt!IopSynchronousServiceTail+0x1a5
fffff904`30972990 fffff803`0c1d3c18 : ffff8b05`dfc94080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x676
fffff904`30972a90 00007ffb`1fcbc174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a2`07aff2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`1fcbc174


THREAD_SHA1_HASH_MOD_FUNC:  fbb1184da64a235b248d45a00fce32d824e6162c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  9723d6d3f27b171408fe640c5eb6bf608b31c277

THREAD_SHA1_HASH_MOD:  13e686901dea61d3e397ce00cea9a85feb1b3478

FOLLOWUP_IP:
nt!RtlpHpEnvAllocVA+bf
fffff803`0c0aa4bf 89442420        mov     dword ptr [rsp+20h],eax

FAULT_INSTR_CODE:  20244489

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!RtlpHpEnvAllocVA+bf

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .cxr 0xfffff90430970ef0 ; kb

BUCKET_ID_FUNC_OFFSET:  bf

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!RtlpHpEnvAllocVA

BUCKET_ID:  0x3B_c0000005_nt!RtlpHpEnvAllocVA

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!RtlpHpEnvAllocVA

TARGET_TIME:  2020-05-14T03:51:19.000Z

OSBUILD:  18362

OSSERVICEPACK:  836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  6a53

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!rtlphpenvallocva

FAILURE_ID_HASH:  {56c77282-6425-0530-d8dd-ceeab434fa0b}

Followup:     MachineOwner
---------
Kod:
STORE_DATA_STRUCTURE_CORRUPTION (1c7)
The store component detected a corruption in its data structures.
Arguments:
Arg1: 0000000000000000, A chunk heap buffer's hash doesn't match.
Arg2: ffff9588ab7a2000, Chunk heap buffer whose hash didn't match.
Arg3: 000000009efdfef8, Expected buffer hash.
Arg4: 00000000000c846a, Page frame number of the corrupted page.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ffff9588ab7a2000

BUGCHECK_P3: 9efdfef8

BUGCHECK_P4: c846a

BUGCHECK_STR:  0x1C7_0

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MemCompression

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-11-2020 16:09:41.0438

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8015e61195c to fffff8015e5c2390

STACK_TEXT:
ffffdd81`6c206908 fffff801`5e61195c : 00000000`000001c7 00000000`00000000 ffff9588`ab7a2000 00000000`9efdfef8 : nt!KeBugCheckEx
ffffdd81`6c206910 fffff801`5e550f81 : 00000000`000c846a 00000000`00000f36 ffff9588`a2f49050 fffff801`5e551623 : nt!SmHpBufferProtectEx+0xc09cc
ffffdd81`6c206970 fffff801`5e550e9c : 00000000`00000000 00000000`00000000 ffffdd81`6c206a69 fffff801`5e550d14 : nt!SmHpChunkUnprotect+0x2d
ffffdd81`6c2069a0 fffff801`5e54e04a : 00000000`ffffffff ffff1b6b`9c9932b4 ffff9588`a2f49068 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRecordUnprotect+0x1c
ffffdd81`6c2069d0 fffff801`5e54e321 : 00000000`00000000 ffffdd81`6c206a69 ffff9588`a2f49050 00000000`203f3a4e : nt!ST_STORE<SM_TRAITS>::StDmCombinePageEntry+0xa2
ffffdd81`6c206a00 fffff801`5e54f63d : 00000000`00000000 ffff9588`a8418c10 00000000`00000000 fffff801`5e45024f : nt!ST_STORE<SM_TRAITS>::StDmPageRemove+0x11d
ffffdd81`6c206ad0 fffff801`5e44fa7e : ffff9588`a2f49000 ffffdd81`6c206b98 00000000`00000001 ffff9588`a2f53080 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0xc1
ffffdd81`6c206b20 fffff801`5e44f941 : 00000000`00000000 ffffcb00`00000000 ffff9588`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x12e
ffffdd81`6c206be0 fffff801`5e46bcd5 : ffff9588`a2f49000 fffff801`5e44f930 ffffdd81`6c0df278 00000067`b4bbbdff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffdd81`6c206c10 fffff801`5e5c9998 : ffffcb00`8d179180 ffff9588`a2f53080 fffff801`5e46bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffdd81`6c206c60 00000000`00000000 : ffffdd81`6c207000 ffffdd81`6c201000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


THREAD_SHA1_HASH_MOD_FUNC:  f4b5f12fb588ec3fb66ec71b92363040a8e28532

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6fc095cfa53dd5704e87bf7fc6ff4076cfa297bb

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!SmHpBufferProtectEx+c09cc
fffff801`5e61195c cc              int     3

FAULT_INSTR_CODE:  3b9cccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!SmHpBufferProtectEx+c09cc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  c09cc

FAILURE_BUCKET_ID:  0x1C7_0_nt!SmHpBufferProtectEx

BUCKET_ID:  0x1C7_0_nt!SmHpBufferProtectEx

PRIMARY_PROBLEM_CLASS:  0x1C7_0_nt!SmHpBufferProtectEx

TARGET_TIME:  2020-06-08T19:14:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  27a7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1c7_0_nt!smhpbufferprotectex

FAILURE_ID_HASH:  {677f42d4-ea31-d924-1621-3373689c0a0a}

Followup:     MachineOwner
---------
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc9862e151e70, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804554d8332, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/27/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: ffffc9862e151e70

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff804554d8332

WRITE_ADDRESS: fffff804559733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffc9862e151e70

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiReadyStandbyPageForActive+c2
fffff804`554d8332 488917          mov     qword ptr [rdi],rdx

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  ModernWarfare.exe

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-11-2020 16:08:45.0140

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff8b813df78fa0 -- (.trap 0xffff8b813df78fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc9862e151e70
rdx=0a000000c76db921 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804554d8332 rsp=ffff8b813df79130 rbp=0000000000011000
r8=0000000020000006  r9=ffff9f5101400270 r10=000000000016b8e3
r11=ffff8b813df79130 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReadyStandbyPageForActive+0xc2:
fffff804`554d8332 488917          mov     qword ptr [rdi],rdx ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804555d41e9 to fffff804555c2390

STACK_TEXT:
ffff8b81`3df78e58 fffff804`555d41e9 : 00000000`0000000a ffffc986`2e151e70 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8b81`3df78e60 fffff804`555d0529 : fffff804`5586c440 ffff9f4f`a880a000 fffffa80`0b516790 fffff804`5586c440 : nt!KiBugCheckDispatch+0x69
ffff8b81`3df78fa0 fffff804`554d8332 : fffffa80`02564910 00000000`00011000 80000000`00000000 00000000`00000005 : nt!KiPageFault+0x469
ffff8b81`3df79130 fffff804`554d81f6 : fffffa80`02564910 00000000`00000009 00000000`00000009 ffffc986`2e951e70 : nt!MiReadyStandbyPageForActive+0xc2
ffff8b81`3df79160 fffff804`554d5fe5 : 00000000`00000001 fffffa80`0c2007d0 ffff9f51`01400238 00000000`00000000 : nt!MiUnlinkStandbyBatch+0x186
ffff8b81`3df791a0 fffff804`554d43cf : 00000000`000083c6 00000000`083c6000 00000000`00011000 00000000`00000000 : nt!MmCheckCachedPageStates+0x1145
ffff8b81`3df793a0 fffff804`55a8fa09 : 00000000`083c6858 00000000`00000000 00000000`00000001 ffff8b81`3df794b0 : nt!CcFetchDataForRead+0x8f
ffff8b81`3df79400 fffff804`554d4175 : ffffe086`d5321000 00000000`083c6858 00000000`000397a8 00000000`00000001 : nt!CcMapAndCopyFromCache+0xd9
ffff8b81`3df794a0 fffff804`5902a54d : ffffe086`cbec4cb0 ffffe086`00000000 ffffc986`00010000 00000000`083d6858 : nt!CcCopyReadEx+0x135
ffff8b81`3df79540 fffff804`584e5f77 : 00000000`00000000 00000000`000002b0 ffffe086`e4dc1d60 00000000`00000000 : Ntfs!NtfsCopyReadA+0x2ed
ffff8b81`3df79830 fffff804`584e2fa3 : ffff8b81`3df79920 00000000`00000000 00000000`00000000 ffffe086`d4c747f0 : FLTMGR!FltpPerformFastIoCall+0x197
ffff8b81`3df79890 fffff804`5851c7c5 : ffff8b81`3df799f8 ffff8b81`3df79b80 ffffe086`c958c080 ffffe086`e4dc1d60 : FLTMGR!FltpPassThroughFastIo+0xd3
ffff8b81`3df798f0 fffff804`55aaf10f : ffffe086`e4dc1d60 00000000`00000000 00000000`00000000 ffffe086`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff8b81`3df799a0 fffff804`555d3c18 : 00000000`00000764 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x39f
ffff8b81`3df79a90 00007ffe`3a93c134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bf`d77fd318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3a93c134


THREAD_SHA1_HASH_MOD_FUNC:  b60739bfb1b79e7c33434e811c532fe89ec0c8b0

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  34a1023c9fe057645a84341bdd5503ece6ca2641

THREAD_SHA1_HASH_MOD:  9dc2e6571e76d76797c7edd1f908d7f21707f5de

FOLLOWUP_IP:
nt!MiReadyStandbyPageForActive+c2
fffff804`554d8332 488917          mov     qword ptr [rdi],rdx

FAULT_INSTR_CODE:  48178948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiReadyStandbyPageForActive+c2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.836

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  c2

FAILURE_BUCKET_ID:  AV_nt!MiReadyStandbyPageForActive

BUCKET_ID:  AV_nt!MiReadyStandbyPageForActive

PRIMARY_PROBLEM_CLASS:  AV_nt!MiReadyStandbyPageForActive

TARGET_TIME:  2020-06-11T11:59:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  836

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  b20b

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!mireadystandbypageforactive

FAILURE_ID_HASH:  {162abed9-8eea-1274-0bec-dc2682dbf597}

Followup:     MachineOwner
---------
 
Yaklasık bir 10 gun once yaptım ilk yaptığımda 1 hata verdi RAM'lerin slotlarının yerini değiştirdim tekrar yaptım bu sefer hata almadım.
 

Dosya Ekleri

  • 20eb6754-6243-4854-af1b-e5070b796ce3.jpg
    20eb6754-6243-4854-af1b-e5070b796ce3.jpg
    170,3 KB · Görüntüleme: 90

Yeni konular

Geri
Yukarı