Sorun RAM kaynaklı görünüyor. Testi RAM'leri tek tek takıp tekrar yapın. Eğer iki RAM'de de hata varsa iade edin/garantiye gönderin. Onun dışında sorunun yazılımsal olduğunu düşünmüyorum.
[CODE title="Hatalar"]MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000404, The subtype of the BugCheck.
Arg2: ffffee53c34e3148
Arg3: 8a0000069fbb3963
Arg4: ffffee51c34e3148
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5265
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 18606
Key : Analysis.Init.CPU.mSec
Value: 592
Key : Analysis.Init.Elapsed.mSec
Value: 4168
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 120521-9968-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 404
BUGCHECK_P2: ffffee53c34e3148
BUGCHECK_P3: 8a0000069fbb3963
BUGCHECK_P4: ffffee51c34e3148
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffa786`9a0eb888 fffff804`140b673d : 00000000`0000001a 00000000`00000404 ffffee53`c34e3148 8a000006`9fbb3963 : nt!KeBugCheckEx
ffffa786`9a0eb890 fffff804`140b9047 : fffff804`14a4f3c0 00000000`00000000 00000000`00000000 ffffa786`9a0eb958 : nt!MiDeleteValidSystemPage+0x5fd
ffffa786`9a0eb930 fffff804`140f333e : 00000000`00000007 fffff804`14a50c00 8a000006`9fbb3963 00000000`00000006 : nt!MiDeleteKernelStack+0x107
ffffa786`9a0eb9e0 fffff804`140f3266 : ffffa786`9a0eba38 fffff804`14a50c40 fffff804`14a4ee00 fffff804`14a4ea18 : nt!MiDeleteCachedKernelStack+0x4a
ffffa786`9a0eba20 fffff804`140f37ec : fffff804`14a50c40 00000000`00000000 00000000`00000000 ffffa884`6b84b010 : nt!MiAdjustCachedStacks+0x116
ffffa786`9a0eba60 fffff804`141b5cb7 : 00000000`00000008 00000000`00000008 00000000`ffffffff ffff8181`2d2c0180 : nt!MiWorkingSetManager+0x17c
ffffa786`9a0ebb20 fffff804`14155855 : ffffa884`6b890040 00000000`00000080 fffff804`141b5b60 00000000`00000000 : nt!KeBalanceSetManager+0x157
ffffa786`9a0ebc10 fffff804`141fe8f8 : ffff8181`2d376180 ffffa884`6b890040 fffff804`14155800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffa786`9a0ebc60 00000000`00000000 : ffffa786`9a0ec000 ffffa786`9a0e6000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiDeleteValidSystemPage+5fd
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1348
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5fd
FAILURE_BUCKET_ID: 0x1a_404_nt!MiDeleteValidSystemPage
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {57d19cf7-fb4a-adfd-0709-78f77073d319}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8002e52d001, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5202
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 21617
Key : Analysis.Init.CPU.mSec
Value: 671
Key : Analysis.Init.Elapsed.mSec
Value: 5567
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 120121-11437-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 38
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8002e52d001
READ_ADDRESS: fffff8002eefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000038
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd28736a3d810 -- (.trap 0xffffd28736a3d810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffac091fdc8d78 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8002e52d001 rsp=ffffd28736a3d9a0 rbp=fffff8002ee50c40
r8=0000000080000000 r9=0000000000000003 r10=ffffd60004552350
r11=ffffd28736a3d980 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDereferenceControlAreaPfnList+0x21:
fffff800`2e52d001 8b4138 mov eax,dword ptr [rcx+38h] ds:00000000`00000038=????????
Resetting default scope
STACK_TEXT:
ffffd287`36a3d6c8 fffff800`2e609269 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd287`36a3d6d0 fffff800`2e605569 : 00000000`00000010 ffffac09`2dbdd080 00000000`0000000a ffffd287`36a3d8d9 : nt!KiBugCheckDispatch+0x69
ffffd287`36a3d810 fffff800`2e52d001 : 00000000`00000000 fffff800`2e438622 00000000`00108919 8a000001`08919963 : nt!KiPageFault+0x469
ffffd287`36a3d9a0 fffff800`2e4f6dfb : ac091fdc`8d780460 fffff800`2ee50c40 00000000`80000000 ffffd600`0319b4b0 : nt!MiDereferenceControlAreaPfnList+0x21
ffffd287`36a3d9f0 fffff800`2e582bc8 : ac091fdc`8d780460 ffffd600`151ed380 00000000`00000001 00000000`00000002 : nt!MiRestoreTransitionPte+0x2cb
ffffd287`36a3da60 fffff800`2e5824b0 : fffff800`2ee50c40 00000000`00000000 00000000`00002000 fffff800`2ee516d8 : nt!MiRemoveLowestPriorityStandbyPage+0x648
ffffd287`36a3db00 fffff800`2e581d48 : ffffac09`128afb20 00000000`00000007 ffffac09`00000000 ffffac09`128be530 : nt!MiPurgePartitionStandby+0x4c
ffffd287`36a3db40 fffff800`2e4b8515 : ffffac09`2dbdd080 fffff800`2e581d00 ffffac09`128873f0 00000000`00000000 : nt!MiFinishResume+0x48
ffffd287`36a3db70 fffff800`2e555855 : ffffac09`2dbdd080 00000000`00000080 ffffac09`1288d1c0 00000000`00989680 : nt!ExpWorkerThread+0x105
ffffd287`36a3dc10 fffff800`2e5fe8f8 : fffff800`2c936180 ffffac09`2dbdd080 fffff800`2e555800 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd287`36a3dc60 00000000`00000000 : ffffd287`36a3e000 ffffd287`36a38000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiDereferenceControlAreaPfnList+21
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1348
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 21
FAILURE_BUCKET_ID: AV_nt!MiDereferenceControlAreaPfnList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {97b4b4f9-cdc2-f9fb-f66d-b09d543deab0}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8061ab2d0e1, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5546
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13896
Key : Analysis.Init.CPU.mSec
Value: 1139
Key : Analysis.Init.Elapsed.mSec
Value: 27668
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 120721-7937-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 38
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8061ab2d0e1
READ_ADDRESS: fffff8061b4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000038
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffa002da61810 -- (.trap 0xfffffa002da61810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff890a8100ae08 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061ab2d0e1 rsp=fffffa002da619a0 rbp=fffff8061b450b40
r8=0000000080000000 r9=0000000000000003 r10=ffffaa800e94ab30
r11=fffffa002da61980 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDereferenceControlAreaPfnList+0x21:
fffff806`1ab2d0e1 8b4138 mov eax,dword ptr [rcx+38h] ds:00000000`00000038=????????
Resetting default scope
STACK_TEXT:
fffffa00`2da616c8 fffff806`1ac09069 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa00`2da616d0 fffff806`1ac05369 : 00000000`00000001 fffffa00`2da61950 ffffaa80`0e94ae00 fffff806`1ab16f07 : nt!KiBugCheckDispatch+0x69
fffffa00`2da61810 fffff806`1ab2d0e1 : 00000000`00000000 fffff806`1aa38622 00000000`00177a5b 8a000001`77a5b963 : nt!KiPageFault+0x469
fffffa00`2da619a0 fffff806`1aaf6edb : 890a8100`ae080460 fffff806`1b450b40 00000000`80000000 ffffaa80`0466f110 : nt!MiDereferenceControlAreaPfnList+0x21
fffffa00`2da619f0 fffff806`1ab82ca8 : 890a8100`ae080460 ffffaa80`0e94ab60 00000000`00000001 00000000`00000002 : nt!MiRestoreTransitionPte+0x2cb
fffffa00`2da61a60 fffff806`1ab82590 : fffff806`1b450b40 00000000`00000000 00000000`00002000 fffff806`1b4515d8 : nt!MiRemoveLowestPriorityStandbyPage+0x648
fffffa00`2da61b00 fffff806`1ab81e28 : ffff890a`74eaeb20 00000000`00000007 ffff890a`00000000 ffff890a`74ebeed0 : nt!MiPurgePartitionStandby+0x4c
fffffa00`2da61b40 fffff806`1aab85f5 : ffff890a`8d117040 fffff806`1ab81de0 ffff890a`74e90ce0 00000000`00000000 : nt!MiFinishResume+0x48
fffffa00`2da61b70 fffff806`1ab55935 : ffff890a`8d117040 00000000`00000080 ffff890a`74ece140 00000008`00000000 : nt!ExpWorkerThread+0x105
fffffa00`2da61c10 fffff806`1abfe728 : ffffba81`3245f180 ffff890a`8d117040 fffff806`1ab558e0 080023d1`00000004 : nt!PspSystemThreadStartup+0x55
fffffa00`2da61c60 00000000`00000000 : fffffa00`2da62000 fffffa00`2da5c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiDereferenceControlAreaPfnList+21
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1387
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 21
FAILURE_BUCKET_ID: AV_nt!MiDereferenceControlAreaPfnList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {97b4b4f9-cdc2-f9fb-f66d-b09d543deab0}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000402, The subtype of the BugCheck.
Arg2: ffffc88b76994300
Arg3: 000000051166a880
Arg4: ffffc88376994300
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5827
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20709
Key : Analysis.Init.CPU.mSec
Value: 1124
Key : Analysis.Init.Elapsed.mSec
Value: 29889
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Memory.System.Errors.BadPageCount
Value: 7
Key : Memory.System.Errors.ScrubErrors
Value: 7
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 121021-10078-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 402
BUGCHECK_P2: ffffc88b76994300
BUGCHECK_P3: 51166a880
BUGCHECK_P4: ffffc88376994300
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LeagueClientUxRender.exe
BAD_PAGES_DETECTED: 7
STACK_TEXT:
ffffbc0e`dd7c42d8 fffff801`4fc27315 : 00000000`0000001a 00000000`00000402 ffffc88b`76994300 00000005`1166a880 : nt!KeBugCheckEx
ffffbc0e`dd7c42e0 fffff801`4fa2a625 : 00000000`00000000 fffff801`50450b40 00000000`00000011 80000004`00000001 : nt!MiDeleteTransitionPte+0x1e5975
ffffbc0e`dd7c4360 fffff801`4fa606c6 : ffffe00b`605f8c40 ffffbc0e`dd7c4488 00000000`00000000 00000000`00000000 : nt!MiDeleteSubsectionPages+0x435
ffffbc0e`dd7c4420 fffff801`4fe09246 : 00000000`00002001 00000000`00000000 fffff801`50450b40 00000000`00002001 : nt!MiDeleteSegmentPages+0x56
ffffbc0e`dd7c4480 fffff801`4fa4aa9a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiSegmentDelete+0x92
ffffbc0e`dd7c44d0 fffff801`4fa132c7 : 00000000`00000000 00000000`00000000 ffffe00b`605f8c40 ffffe00b`605f8c40 : nt!MiCheckControlArea+0x1fa
ffffbc0e`dd7c4550 fffff801`4fe01149 : 00000000`00000000 00000000`00000000 ffffe00b`00000000 ffffe00b`00000000 : nt!MiDeleteVad+0xb87
ffffbc0e`dd7c4660 fffff801`4fe007e0 : ffffe00b`6b2bc4e0 ffffe00b`593d0c80 ffffe00b`59611080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffbc0e`dd7c4690 fffff801`4fdfeaaf : ffffe00b`6b2be6a0 ffffe00b`6b2be6a0 ffffe00b`6b2bc4e0 ffffe00b`61b83080 : nt!MiCleanVad+0x30
ffffbc0e`dd7c46c0 fffff801`4fe5c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe00b`61b83080 : nt!MmCleanProcessAddressSpace+0x137
ffffbc0e`dd7c4740 fffff801`4feb0bc6 : ffffe00b`61b83080 ffffc88b`761dd060 ffffbc0e`dd7c4990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffbc0e`dd7c47d0 fffff801`4fef54d8 : 01010101`00000000 fffff801`00000001 ffffbc0e`dd7c49e0 00000000`00de6000 : nt!PspExitThread+0x5f6
ffffbc0e`dd7c48d0 fffff801`4fa0ef67 : 00000000`40440088 00000000`00000000 00000000`00000000 ffffe00b`67bac5e0 : nt!KiSchedulerApcTerminate+0x38
ffffbc0e`dd7c4910 fffff801`4fbfb670 : 00000000`00000000 ffffbc0e`dd7c49c0 ffffbc0e`dd7c4b80 00000000`00000000 : nt!KiDeliverApc+0x487
ffffbc0e`dd7c49c0 fffff801`4fc08b5f : ffffe00b`59611080 ffffe00b`670cb260 ffffbc0e`dd7c4b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffbc0e`dd7c4b00 00000000`773e1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`04c0eb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773e1cfc
SYMBOL_NAME: PAGE_NOT_ZERO
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_NOT_ZERO_0x1a_402
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b43c5554-6539-be06-f87e-d63a3ecb455b}
Followup: MachineOwner
---------
*** Memory manager detected 7 instance(s) of page corruption, target is likely to have memory corruption.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa20929c05598, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80670e27248, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5186
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10320
Key : Analysis.Init.CPU.mSec
Value: 10374
Key : Analysis.Init.Elapsed.mSec
Value: 34853
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : Memory.System.Errors.BadPageCount
Value: 1
Key : Memory.System.Errors.ScrubErrors
Value: 1
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 112321-9562-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa20929c05598
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80670e27248
WRITE_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffa20929c05598
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: LeagueClientUx.exe
BAD_PAGES_DETECTED: 1
TRAP_FRAME: ffff8081f6012fb0 -- (.trap 0xffff8081f6012fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa20929c05598
rdx=00000003dd2aa921 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80670e27248 rsp=ffff8081f6013140 rbp=8000000000000000
r8=0000000020000006 r9=fffffd4841f5ad98 r10=ffffef8000007078
r11=0000000000762099 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReadyStandbyPageForActive+0xb8:
fffff806`70e27248 48891e mov qword ptr [rsi],rbx ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff8081`f6012e68 fffff806`71009269 : 00000000`0000000a ffffa209`29c05598 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8081`f6012e70 fffff806`71005569 : ffffec80`0b9780a0 fffff806`71852880 80000003`dd2ae921 00000000`00000004 : nt!KiBugCheckDispatch+0x69
ffff8081`f6012fb0 fffff806`70e27248 : ffffec80`0b977fe0 80000000`00000000 ffffa209`29c05598 ffffa20b`29c05598 : nt!KiPageFault+0x469
ffff8081`f6013140 fffff806`70e27116 : ffffec80`0b977fe0 00000000`0014a000 00000000`0000000d ffffec80`0b978080 : nt!MiReadyStandbyPageForActive+0xb8
ffff8081`f6013170 fffff806`70e30d22 : 00000000`00000000 ffffec80`08b40df0 00000000`00000001 ffffec80`0b978070 : nt!MiUnlinkStandbyBatch+0x186
ffff8081`f60131b0 fffff806`70e2ef5f : 00000000`00000680 00000000`00680000 00000000`00040000 ffffb402`f21b9800 : nt!MmCheckCachedPageStates+0x12f2
ffff8081`f6013380 fffff806`711fcbf0 : 00000000`00680000 00000000`00000000 00000000`00000001 ffff8081`f6013490 : nt!CcFetchDataForRead+0x8f
ffff8081`f60133e0 fffff806`70e2ecf9 : ffffb402`e80e6898 00000000`00680000 00000000`00040000 ffffb402`f3465001 : nt!CcMapAndCopyFromCache+0xe0
ffff8081`f6013480 fffff806`734a44ed : ffff8081`f60135e0 00000000`00000000 ffffa20b`0017ca33 00000000`0017ca33 : nt!CcCopyReadEx+0x139
ffff8081`f6013530 fffff806`6d3e738b : 00000000`00000000 ffff8081`f6013908 ffff8081`f60138c8 00000000`067f4020 : Ntfs!NtfsCopyReadA+0x2ed
ffff8081`f6013820 fffff806`6d3e42bf : ffff8081`f6013930 ffff8081`f60138c8 ffffb402`f89aa110 ffffb402`f89aa010 : FLTMGR!FltpPerformFastIoCall+0x16b
ffff8081`f6013880 fffff806`6d41bab5 : ffff8081`f6014000 ffff8081`f600e000 ffffb402`f3465080 fffff806`711f5cbe : FLTMGR!FltpPassThroughFastIo+0x25f
ffff8081`f6013900 fffff806`7128c60f : ffffb402`f7a43b60 00000000`00000000 00000000`00000000 ffffb402`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff8081`f60139b0 fffff806`71008cb8 : 00000000`00000890 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x37f
ffff8081`f6013a90 00000000`777f1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`063af0e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777f1cfc
SYMBOL_NAME: PAGE_NOT_ZERO
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: PAGE_NOT_ZERO_AV
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {91fefd05-7a2b-5d37-e27f-7af624353ffc}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.
[/CODE]