IRQL_NOT_LESS_OR_EQUAL ve MEMORY_MANAGEMENT hataları

İşletim sistemi
Windows 10

Hardvane

Hectopat
Katılım
17 Haziran 2018
Mesajlar
31
Daha fazla  
Cinsiyet
Erkek
7.15 MB folder on MEGA

Bu minidump dosyalarını RAM'lerin 1 tanesini çıkardığımda aldım.
Memtest86 sonucunuda ekledim. Sonrasında RAM'in 16 GB olanını çıkarttım ve minidump dosyasını bu şekilde paylaşıyorum.

Sistemim şöyle:
  • MSI B550M Pro VDH anakart.
  • Ryzen 5 3400G işlemci.
  • 2x8 + 1x16 GB RAM (frekansları aynı)
  • WD 500 GB M.2 NVMe.
  • Cooler Master kule tipi soğutucu.
  • 850W 80+ Gold sertifikalı PSU.
WhatsApp Image 2021-12-11 at 12.53.36 (1).jpeg
WhatsApp Image 2021-12-11 at 12.53.36 (2).jpeg
WhatsApp Image 2021-12-11 at 12.53.36.jpeg
 
Sorun RAM kaynaklı görünüyor. Testi RAM'leri tek tek takıp tekrar yapın. Eğer iki RAM'de de hata varsa iade edin/garantiye gönderin. Onun dışında sorunun yazılımsal olduğunu düşünmüyorum.

[CODE title="Hatalar"]MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000404, The subtype of the BugCheck.
Arg2: ffffee53c34e3148
Arg3: 8a0000069fbb3963
Arg4: ffffee51c34e3148

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5265

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 18606

Key : Analysis.Init.CPU.mSec
Value: 592

Key : Analysis.Init.Elapsed.mSec
Value: 4168

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 120521-9968-01.dmp

BUGCHECK_CODE: 1a

BUGCHECK_P1: 404

BUGCHECK_P2: ffffee53c34e3148

BUGCHECK_P3: 8a0000069fbb3963

BUGCHECK_P4: ffffee51c34e3148

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
ffffa786`9a0eb888 fffff804`140b673d : 00000000`0000001a 00000000`00000404 ffffee53`c34e3148 8a000006`9fbb3963 : nt!KeBugCheckEx
ffffa786`9a0eb890 fffff804`140b9047 : fffff804`14a4f3c0 00000000`00000000 00000000`00000000 ffffa786`9a0eb958 : nt!MiDeleteValidSystemPage+0x5fd
ffffa786`9a0eb930 fffff804`140f333e : 00000000`00000007 fffff804`14a50c00 8a000006`9fbb3963 00000000`00000006 : nt!MiDeleteKernelStack+0x107
ffffa786`9a0eb9e0 fffff804`140f3266 : ffffa786`9a0eba38 fffff804`14a50c40 fffff804`14a4ee00 fffff804`14a4ea18 : nt!MiDeleteCachedKernelStack+0x4a
ffffa786`9a0eba20 fffff804`140f37ec : fffff804`14a50c40 00000000`00000000 00000000`00000000 ffffa884`6b84b010 : nt!MiAdjustCachedStacks+0x116
ffffa786`9a0eba60 fffff804`141b5cb7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8181`2d2c0180 : nt!MiWorkingSetManager+0x17c
ffffa786`9a0ebb20 fffff804`14155855 : ffffa884`6b890040 00000000`00000080 fffff804`141b5b60 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffa786`9a0ebc10 fffff804`141fe8f8 : ffff8181`2d376180 ffffa884`6b890040 fffff804`14155800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa786`9a0ebc60 00000000`00000000 : ffffa786`9a0ec000 ffffa786`9a0e6000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!MiDeleteValidSystemPage+5fd

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1348

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 5fd

FAILURE_BUCKET_ID: 0x1a_404_nt!MiDeleteValidSystemPage

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {57d19cf7-fb4a-adfd-0709-78f77073d319}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8002e52d001, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5202

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 21617

Key : Analysis.Init.CPU.mSec
Value: 671

Key : Analysis.Init.Elapsed.mSec
Value: 5567

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 120121-11437-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: 38

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8002e52d001

READ_ADDRESS: fffff8002eefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000038

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffd28736a3d810 -- (.trap 0xffffd28736a3d810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffac091fdc8d78 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002e52d001 rsp=ffffd28736a3d9a0 rbp=fffff8002ee50c40
r8=0000000080000000 r9=0000000000000003 r10=ffffd60004552350
r11=ffffd28736a3d980 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDereferenceControlAreaPfnList+0x21:
fffff800`2e52d001 8b4138 mov eax,dword ptr [rcx+38h] ds:00000000`00000038=????????
Resetting default scope

STACK_TEXT:
ffffd287`36a3d6c8 fffff800`2e609269 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd287`36a3d6d0 fffff800`2e605569 : 00000000`00000010 ffffac09`2dbdd080 00000000`0000000a ffffd287`36a3d8d9 : nt!KiBugCheckDispatch+0x69
ffffd287`36a3d810 fffff800`2e52d001 : 00000000`00000000 fffff800`2e438622 00000000`00108919 8a000001`08919963 : nt!KiPageFault+0x469
ffffd287`36a3d9a0 fffff800`2e4f6dfb : ac091fdc`8d780460 fffff800`2ee50c40 00000000`80000000 ffffd600`0319b4b0 : nt!MiDereferenceControlAreaPfnList+0x21
ffffd287`36a3d9f0 fffff800`2e582bc8 : ac091fdc`8d780460 ffffd600`151ed380 00000000`00000001 00000000`00000002 : nt!MiRestoreTransitionPte+0x2cb
ffffd287`36a3da60 fffff800`2e5824b0 : fffff800`2ee50c40 00000000`00000000 00000000`00002000 fffff800`2ee516d8 : nt!MiRemoveLowestPriorityStandbyPage+0x648
ffffd287`36a3db00 fffff800`2e581d48 : ffffac09`128afb20 00000000`00000007 ffffac09`00000000 ffffac09`128be530 : nt!MiPurgePartitionStandby+0x4c
ffffd287`36a3db40 fffff800`2e4b8515 : ffffac09`2dbdd080 fffff800`2e581d00 ffffac09`128873f0 00000000`00000000 : nt!MiFinishResume+0x48
ffffd287`36a3db70 fffff800`2e555855 : ffffac09`2dbdd080 00000000`00000080 ffffac09`1288d1c0 00000000`00989680 : nt!ExpWorkerThread+0x105
ffffd287`36a3dc10 fffff800`2e5fe8f8 : fffff800`2c936180 ffffac09`2dbdd080 fffff800`2e555800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd287`36a3dc60 00000000`00000000 : ffffd287`36a3e000 ffffd287`36a38000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!MiDereferenceControlAreaPfnList+21

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1348

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 21

FAILURE_BUCKET_ID: AV_nt!MiDereferenceControlAreaPfnList

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {97b4b4f9-cdc2-f9fb-f66d-b09d543deab0}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8061ab2d0e1, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5546

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 13896

Key : Analysis.Init.CPU.mSec
Value: 1139

Key : Analysis.Init.Elapsed.mSec
Value: 27668

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 120721-7937-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: 38

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8061ab2d0e1

READ_ADDRESS: fffff8061b4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000038

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffffa002da61810 -- (.trap 0xfffffa002da61810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff890a8100ae08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061ab2d0e1 rsp=fffffa002da619a0 rbp=fffff8061b450b40
r8=0000000080000000 r9=0000000000000003 r10=ffffaa800e94ab30
r11=fffffa002da61980 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDereferenceControlAreaPfnList+0x21:
fffff806`1ab2d0e1 8b4138 mov eax,dword ptr [rcx+38h] ds:00000000`00000038=????????
Resetting default scope

STACK_TEXT:
fffffa00`2da616c8 fffff806`1ac09069 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa00`2da616d0 fffff806`1ac05369 : 00000000`00000001 fffffa00`2da61950 ffffaa80`0e94ae00 fffff806`1ab16f07 : nt!KiBugCheckDispatch+0x69
fffffa00`2da61810 fffff806`1ab2d0e1 : 00000000`00000000 fffff806`1aa38622 00000000`00177a5b 8a000001`77a5b963 : nt!KiPageFault+0x469
fffffa00`2da619a0 fffff806`1aaf6edb : 890a8100`ae080460 fffff806`1b450b40 00000000`80000000 ffffaa80`0466f110 : nt!MiDereferenceControlAreaPfnList+0x21
fffffa00`2da619f0 fffff806`1ab82ca8 : 890a8100`ae080460 ffffaa80`0e94ab60 00000000`00000001 00000000`00000002 : nt!MiRestoreTransitionPte+0x2cb
fffffa00`2da61a60 fffff806`1ab82590 : fffff806`1b450b40 00000000`00000000 00000000`00002000 fffff806`1b4515d8 : nt!MiRemoveLowestPriorityStandbyPage+0x648
fffffa00`2da61b00 fffff806`1ab81e28 : ffff890a`74eaeb20 00000000`00000007 ffff890a`00000000 ffff890a`74ebeed0 : nt!MiPurgePartitionStandby+0x4c
fffffa00`2da61b40 fffff806`1aab85f5 : ffff890a`8d117040 fffff806`1ab81de0 ffff890a`74e90ce0 00000000`00000000 : nt!MiFinishResume+0x48
fffffa00`2da61b70 fffff806`1ab55935 : ffff890a`8d117040 00000000`00000080 ffff890a`74ece140 00000008`00000000 : nt!ExpWorkerThread+0x105
fffffa00`2da61c10 fffff806`1abfe728 : ffffba81`3245f180 ffff890a`8d117040 fffff806`1ab558e0 080023d1`00000004 : nt!PspSystemThreadStartup+0x55
fffffa00`2da61c60 00000000`00000000 : fffffa00`2da62000 fffffa00`2da5c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!MiDereferenceControlAreaPfnList+21

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1387

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 21

FAILURE_BUCKET_ID: AV_nt!MiDereferenceControlAreaPfnList

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {97b4b4f9-cdc2-f9fb-f66d-b09d543deab0}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000402, The subtype of the BugCheck.
Arg2: ffffc88b76994300
Arg3: 000000051166a880
Arg4: ffffc88376994300

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5827

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20709

Key : Analysis.Init.CPU.mSec
Value: 1124

Key : Analysis.Init.Elapsed.mSec
Value: 29889

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : Memory.System.Errors.BadPageCount
Value: 7

Key : Memory.System.Errors.ScrubErrors
Value: 7

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 121021-10078-01.dmp

BUGCHECK_CODE: 1a

BUGCHECK_P1: 402

BUGCHECK_P2: ffffc88b76994300

BUGCHECK_P3: 51166a880

BUGCHECK_P4: ffffc88376994300

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: LeagueClientUxRender.exe

BAD_PAGES_DETECTED: 7

STACK_TEXT:
ffffbc0e`dd7c42d8 fffff801`4fc27315 : 00000000`0000001a 00000000`00000402 ffffc88b`76994300 00000005`1166a880 : nt!KeBugCheckEx
ffffbc0e`dd7c42e0 fffff801`4fa2a625 : 00000000`00000000 fffff801`50450b40 00000000`00000011 80000004`00000001 : nt!MiDeleteTransitionPte+0x1e5975
ffffbc0e`dd7c4360 fffff801`4fa606c6 : ffffe00b`605f8c40 ffffbc0e`dd7c4488 00000000`00000000 00000000`00000000 : nt!MiDeleteSubsectionPages+0x435
ffffbc0e`dd7c4420 fffff801`4fe09246 : 00000000`00002001 00000000`00000000 fffff801`50450b40 00000000`00002001 : nt!MiDeleteSegmentPages+0x56
ffffbc0e`dd7c4480 fffff801`4fa4aa9a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiSegmentDelete+0x92
ffffbc0e`dd7c44d0 fffff801`4fa132c7 : 00000000`00000000 00000000`00000000 ffffe00b`605f8c40 ffffe00b`605f8c40 : nt!MiCheckControlArea+0x1fa
ffffbc0e`dd7c4550 fffff801`4fe01149 : 00000000`00000000 00000000`00000000 ffffe00b`00000000 ffffe00b`00000000 : nt!MiDeleteVad+0xb87
ffffbc0e`dd7c4660 fffff801`4fe007e0 : ffffe00b`6b2bc4e0 ffffe00b`593d0c80 ffffe00b`59611080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffbc0e`dd7c4690 fffff801`4fdfeaaf : ffffe00b`6b2be6a0 ffffe00b`6b2be6a0 ffffe00b`6b2bc4e0 ffffe00b`61b83080 : nt!MiCleanVad+0x30
ffffbc0e`dd7c46c0 fffff801`4fe5c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe00b`61b83080 : nt!MmCleanProcessAddressSpace+0x137
ffffbc0e`dd7c4740 fffff801`4feb0bc6 : ffffe00b`61b83080 ffffc88b`761dd060 ffffbc0e`dd7c4990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffbc0e`dd7c47d0 fffff801`4fef54d8 : 01010101`00000000 fffff801`00000001 ffffbc0e`dd7c49e0 00000000`00de6000 : nt!PspExitThread+0x5f6
ffffbc0e`dd7c48d0 fffff801`4fa0ef67 : 00000000`40440088 00000000`00000000 00000000`00000000 ffffe00b`67bac5e0 : nt!KiSchedulerApcTerminate+0x38
ffffbc0e`dd7c4910 fffff801`4fbfb670 : 00000000`00000000 ffffbc0e`dd7c49c0 ffffbc0e`dd7c4b80 00000000`00000000 : nt!KiDeliverApc+0x487
ffffbc0e`dd7c49c0 fffff801`4fc08b5f : ffffe00b`59611080 ffffe00b`670cb260 ffffbc0e`dd7c4b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffbc0e`dd7c4b00 00000000`773e1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`04c0eb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773e1cfc


SYMBOL_NAME: PAGE_NOT_ZERO

MODULE_NAME: hardware

IMAGE_NAME: hardware_ram

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: PAGE_NOT_ZERO_0x1a_402

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b43c5554-6539-be06-f87e-d63a3ecb455b}

Followup: MachineOwner
---------

*** Memory manager detected 7 instance(s) of page corruption, target is likely to have memory corruption.

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa20929c05598, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80670e27248, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5186

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 10320

Key : Analysis.Init.CPU.mSec
Value: 10374

Key : Analysis.Init.Elapsed.mSec
Value: 34853

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : Memory.System.Errors.BadPageCount
Value: 1

Key : Memory.System.Errors.ScrubErrors
Value: 1

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 112321-9562-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: ffffa20929c05598

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80670e27248

WRITE_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffa20929c05598

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: LeagueClientUx.exe

BAD_PAGES_DETECTED: 1

TRAP_FRAME: ffff8081f6012fb0 -- (.trap 0xffff8081f6012fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa20929c05598
rdx=00000003dd2aa921 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80670e27248 rsp=ffff8081f6013140 rbp=8000000000000000
r8=0000000020000006 r9=fffffd4841f5ad98 r10=ffffef8000007078
r11=0000000000762099 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReadyStandbyPageForActive+0xb8:
fffff806`70e27248 48891e mov qword ptr [rsi],rbx ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffff8081`f6012e68 fffff806`71009269 : 00000000`0000000a ffffa209`29c05598 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8081`f6012e70 fffff806`71005569 : ffffec80`0b9780a0 fffff806`71852880 80000003`dd2ae921 00000000`00000004 : nt!KiBugCheckDispatch+0x69
ffff8081`f6012fb0 fffff806`70e27248 : ffffec80`0b977fe0 80000000`00000000 ffffa209`29c05598 ffffa20b`29c05598 : nt!KiPageFault+0x469
ffff8081`f6013140 fffff806`70e27116 : ffffec80`0b977fe0 00000000`0014a000 00000000`0000000d ffffec80`0b978080 : nt!MiReadyStandbyPageForActive+0xb8
ffff8081`f6013170 fffff806`70e30d22 : 00000000`00000000 ffffec80`08b40df0 00000000`00000001 ffffec80`0b978070 : nt!MiUnlinkStandbyBatch+0x186
ffff8081`f60131b0 fffff806`70e2ef5f : 00000000`00000680 00000000`00680000 00000000`00040000 ffffb402`f21b9800 : nt!MmCheckCachedPageStates+0x12f2
ffff8081`f6013380 fffff806`711fcbf0 : 00000000`00680000 00000000`00000000 00000000`00000001 ffff8081`f6013490 : nt!CcFetchDataForRead+0x8f
ffff8081`f60133e0 fffff806`70e2ecf9 : ffffb402`e80e6898 00000000`00680000 00000000`00040000 ffffb402`f3465001 : nt!CcMapAndCopyFromCache+0xe0
ffff8081`f6013480 fffff806`734a44ed : ffff8081`f60135e0 00000000`00000000 ffffa20b`0017ca33 00000000`0017ca33 : nt!CcCopyReadEx+0x139
ffff8081`f6013530 fffff806`6d3e738b : 00000000`00000000 ffff8081`f6013908 ffff8081`f60138c8 00000000`067f4020 : Ntfs!NtfsCopyReadA+0x2ed
ffff8081`f6013820 fffff806`6d3e42bf : ffff8081`f6013930 ffff8081`f60138c8 ffffb402`f89aa110 ffffb402`f89aa010 : FLTMGR!FltpPerformFastIoCall+0x16b
ffff8081`f6013880 fffff806`6d41bab5 : ffff8081`f6014000 ffff8081`f600e000 ffffb402`f3465080 fffff806`711f5cbe : FLTMGR!FltpPassThroughFastIo+0x25f
ffff8081`f6013900 fffff806`7128c60f : ffffb402`f7a43b60 00000000`00000000 00000000`00000000 ffffb402`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff8081`f60139b0 fffff806`71008cb8 : 00000000`00000890 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x37f
ffff8081`f6013a90 00000000`777f1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`063af0e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777f1cfc


SYMBOL_NAME: PAGE_NOT_ZERO

MODULE_NAME: hardware

IMAGE_NAME: hardware_ram

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: PAGE_NOT_ZERO_AV

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {91fefd05-7a2b-5d37-e27f-7af624353ffc}

Followup: MachineOwner
---------

*** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.

[/CODE]
 
Şu an 16 GB olanı çıkarttım herhangi bir hata almıyorum fakat hatalar G.Skill'den vermişti 16 GB olan Corsair idi. Çok ilginç.
Şu an hata almıyorsunuz değil mi? Sorunlu belleğin garantisi varsa garantiye gönderin değişim yapsınlar veya iade edin.
 

Yeni konular

Geri
Yukarı