Monster Abra A5 v19.2 mavi ekran veriyor

İşletim sistemi
Windows 11
Gördüğüm kadarıyla belleklerde bir problem var.

Aşağıdaki konuyu takip ederek Memtest86 ile RAM testi yapabilirsiniz.

Güncel Memtest86 indirmek için: https://www.memtest86.com/downloads/memtest86-usb.zip


Hata dökümleri:

Kod:
******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 00000000000004d2, physical page number
Arg3: 000002741c1dedb0, zero
Arg4: ffff88003fac6000, zero

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1343

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6050

    Key  : Analysis.IO.Other.Mb
    Value: 24

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 31

    Key  : Analysis.Init.CPU.mSec
    Value: 265

    Key  : Analysis.Init.Elapsed.mSec
    Value: 162525

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 153

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0x4d2

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0x87189803

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x1edb0

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0x37d7ce

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0x37d7cf

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x4592b6

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x12b

    Key  : Bugcheck.Code.Register
    Value: 0x12b

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  051123-19578-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 4d2

BUGCHECK_P3: 2741c1dedb0

BUGCHECK_P4: ffff88003fac6000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT:
fffff605`5764f1a8 fffff805`1a5b5baf     : 00000000`0000012b ffffffff`c00002c4 00000000`000004d2 00000274`1c1dedb0 : nt!KeBugCheckEx
fffff605`5764f1b0 fffff805`1a4698bb     : 00000000`00000200 00000000`00000003 ffffa189`3a8e7050 ffffa189`3aa0d0d8 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffff605`5764f200 fffff805`1a5b6b88     : 00000000`00000004 fffff805`1a5b01de 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x2c5
fffff605`5764f2d0 fffff805`1a5b77e8     : 00000000`00000001 00000000`0000161b ffffa189`3a8e7050 ffffa189`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffff605`5764f320 fffff805`1a5b6375     : 00000000`ffffffff ffffa189`47d4c000 fffff605`5764f400 ffffa189`482d4b90 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x1c4
fffff605`5764f3c0 fffff805`1a5afbdb     : fffff605`5764f5f9 00000000`00000001 00000000`00000000 ffffa189`482c6030 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc9
fffff605`5764f470 fffff805`1a5afab1     : ffffa189`3a8e7000 ffffa189`482d4b90 ffffa189`47d4c000 ffffa189`3a8e89c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x93
fffff605`5764f4f0 fffff805`1a24023a     : ffffa189`40f140f4 ffffa189`3a8e7000 00000000`00000000 ffffa189`47d4c000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffff605`5764f520 fffff805`1a46933e     : fffff805`1a5afa90 fffff605`5764f5c0 00000000`00000002 ffffa189`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffff605`5764f590 fffff805`1a5b1b58     : fffff605`00000000 ffffa189`253e21c8 00000000`000003ff ffffa189`482d4b90 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xd6
fffff605`5764f660 fffff805`1a5af2c3     : 00000000`000003ff 00000000`000003ff fffff605`5764f710 ffffa189`482d4b90 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x48
fffff605`5764f6b0 fffff805`1a468dd2     : 00000000`0000000c ffffa189`482d4b90 00000000`00000003 00000000`00000003 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0x1d7
fffff605`5764f740 fffff805`1a5b8e62     : ffffa189`407dd830 fffff605`5764f800 00000000`00000003 fffff605`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x1cc
fffff605`5764f7c0 fffff805`1a45517e     : ffffa189`2015bded 00000000`00000001 ffffa189`3d37c700 fffff805`1a232219 : nt!SmPageRead+0x42
fffff605`5764f800 fffff805`1a293397     : 00000000`00000002 fffff605`5764f940 ffffa189`407dd720 ffffa189`407dd720 : nt!MiIssueHardFaultIo+0x1c148e
fffff605`5764f850 fffff805`1a2eb4aa     : 00000000`c0033333 00000000`00000001 00000219`8917f7e8 00000000`00000000 : nt!MiIssueHardFault+0x207
fffff605`5764f900 fffff805`1a43c529     : ffffa189`40f14080 00000219`fb33e978 00000000`00000001 ffffffff`fff0bd01 : nt!MmAccessFault+0x31a
fffff605`5764fa20 00007ff8`89c22c00     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x369
00000065`ff1f59f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`89c22c00


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+fb

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1702

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  fb

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffff0000001608
Arg3: 0000080000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1468

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7811

    Key  : Analysis.IO.Other.Mb
    Value: 20

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 160769

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 152

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : MemoryManagement.PFN
    Value: 80000000


FILE_IN_CAB:  050923-18515-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffff0000001608

BUGCHECK_P3: 80000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  asus_framework

STACK_TEXT:
ffffa885`3fa7ece8 fffff805`38b00197     : 00000000`0000001a 00000000`00041792 ffffff00`00001608 00000800`00000000 : nt!KeBugCheckEx
ffffa885`3fa7ecf0 fffff805`38aefb3d     : 00000000`00000000 ffffa885`3fa7f1f0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1597
ffffa885`3fa7edf0 fffff805`38aef93d     : ffffff00`00000000 00000000`00000000 00000000`00000000 ffff9806`78073740 : nt!MiWalkPageTablesRecursively+0xb2d
ffffa885`3fa7ee80 fffff805`38aef93d     : ffffff7f`00000000 00000000`00000000 00000000`00000001 ffff9806`78073740 : nt!MiWalkPageTablesRecursively+0x92d
ffffa885`3fa7ef10 fffff805`38aef93d     : ffffff7f`00000000 00000000`00000000 00000000`00000002 ffff9806`78073740 : nt!MiWalkPageTablesRecursively+0x92d
ffffa885`3fa7efa0 fffff805`38b12a01     : 00000000`00000000 00000000`00000000 00000000`00000003 ffff9806`78073740 : nt!MiWalkPageTablesRecursively+0x92d
ffffa885`3fa7f030 fffff805`38afe9e7     : ffffa885`3fa7f1f0 ffffa885`00000001 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x371
ffffa885`3fa7f130 fffff805`38a57ff2     : 00000000`00000000 fffff805`38a581bd ffffa885`3fa7f4f8 ffff9806`716dd080 : nt!MiDeletePagablePteRange+0x747
ffffa885`3fa7f460 fffff805`38ec17f8     : 00000000`00000000 ffffa885`00000001 ffff9806`780730c0 ffffa885`3fa7f530 : nt!MiDeleteVirtualAddresses+0x52
ffffa885`3fa7f4b0 fffff805`38f2b871     : ffff9806`780730c0 ffff9806`75b8a1e0 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
ffffa885`3fa7f570 fffff805`38f2b213     : ffff9806`75b8a1e0 00000000`00000000 ffff9806`716dd080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffa885`3fa7f5a0 fffff805`38f2ad8d     : ffff9806`5f390250 ffff9806`5f390250 ffff9806`5f390250 ffff9806`780730c0 : nt!MiCleanVad+0x2f
ffffa885`3fa7f5d0 fffff805`38fa590d     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9806`780730c0 : nt!MmCleanProcessAddressSpace+0x10d
ffffa885`3fa7f650 fffff805`38e93c54     : ffff9806`780730c0 ffffe480`36d06300 ffffa885`3fa7f879 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffffa885`3fa7f6e0 fffff805`38fe6d88     : 00000000`00000000 00000000`00000001 ffff9806`716dd0f4 00000000`02944000 : nt!PspExitThread+0x63c
ffffa885`3fa7f7e0 fffff805`38a0d497     : ffff9806`78073800 00000000`00000000 ffff9806`78073740 ffffd481`d43dc180 : nt!KiSchedulerApcTerminate+0x38
ffffa885`3fa7f820 fffff805`38c2f540     : ffff67dc`2d766401 ffffa885`3fa7f8e0 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x4a7
ffffa885`3fa7f8e0 fffff805`38c3e18f     : ffff9806`716dd080 00000000`00000000 00000000`00000000 ffff9806`00000001 : nt!KiInitiateUserApc+0x70
ffffa885`3fa7fa20 00000000`77001cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0ee6eba8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77001cf3


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8501848139d8, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80651c95147, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1780

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11087

    Key  : Analysis.IO.Other.Mb
    Value: 15

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 20

    Key  : Analysis.Init.CPU.mSec
    Value: 217

    Key  : Analysis.Init.Elapsed.mSec
    Value: 159243

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 155

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  050823-17515-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff8501848139d8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80651c95147

BUGCHECK_P4: 2

READ_ADDRESS: fffff8065231c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff8501848139d8

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

TRAP_FRAME:  ffffe481327b7440 -- (.trap 0xffffe481327b7440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fff80017cf5c880 rbx=0000000000000000 rcx=7ffffffffffffffc
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80651c95147 rsp=ffffe481327b75d0 rbp=000000000000000b
 r8=0000000000000000  r9=8001aac1ca900000 r10=0000000000000d4b
r11=00000000ffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ExpAllocateHandleTableEntry+0x7b:
fffff806`51c95147 488b4708        mov     rax,qword ptr [rdi+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
ffffe481`327b7218 fffff806`51aa4d81     : 00000000`00000050 ffff8501`848139d8 00000000`00000000 ffffe481`327b7440 : nt!KeBugCheckEx
ffffe481`327b7220 fffff806`518eb4dc     : 001f0001`00000000 00000000`00000000 ffffe481`327b73d9 00000000`00000000 : nt!MiSystemFault+0x1bc7c1
ffffe481`327b7320 fffff806`51a39f29     : ffffd180`b2982810 00000000`00000000 ffffe481`327b7678 fffff806`518426dc : nt!MmAccessFault+0x29c
ffffe481`327b7440 fffff806`51c95147     : ffff8001`7cf5c580 ffffba0e`00000000 00000000`00000000 ffff8001`7cf5c880 : nt!KiPageFault+0x369
ffffe481`327b75d0 fffff806`51c95062     : ffffba0e`00000010 ffff8001`aac1ca60 ffffe481`327b7650 ffff8001`8f01b568 : nt!ExpAllocateHandleTableEntry+0x7b
ffffe481`327b7620 fffff806`51de4f4b     : ffff8001`aac1ca60 00000000`00000000 ffff8001`8f01b568 ffffe481`327b7890 : nt!ExCreateHandleEx+0x6a
ffffe481`327b7670 fffff806`51cb6388     : fffff806`51601800 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpAllocateMessageFunction+0x4b
ffffe481`327b76b0 fffff806`51d22ee5     : ffff4c3f`00000603 ffffe481`327b7770 ffffba0e`94402a00 ffffba0e`a48c8b00 : nt!AlpcpAllocateBlob+0xb8
ffffe481`327b76e0 fffff806`51d23620     : ffffba0e`94402ad0 ffffe481`327b7770 ffffba0e`a48c8ca0 ffffba0e`a48c8ca0 : nt!AlpcpAllocateMessage+0x41
ffffe481`327b7710 fffff806`51d231ee     : ffffe481`327b7830 ffffe481`327b7818 ffffe481`00020000 ffffffec`7faa1db0 : nt!AlpcpCreateClientPort+0x2d0
ffffe481`327b77b0 fffff806`51d21830     : 00000000`00000000 00000000`00000000 00007fff`76c732ec 00000000`00000014 : nt!AlpcpConnectPort+0x272
ffffe481`327b7930 fffff806`51a3e0e5     : ffffffff`fffffffa ffffba0e`86835080 00000013`8055dfd8 00000013`8055df38 : nt!NtAlpcConnectPortEx+0x70
ffffe481`327b79b0 00007fff`7884fb84     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000013`8055e128 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`7884fb84


SYMBOL_NAME:  nt!ExpAllocateHandleTableEntry+7b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1555

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  7b

FAILURE_BUCKET_ID:  AV_R_(null)_nt!ExpAllocateHandleTableEntry

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {057ca722-8246-3c91-57a3-2501ef38bce9}

Followup:     MachineOwner
---------


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff800e6e039e0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8007bf176ed, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Write

    Key  : Analysis.CPU.mSec
    Value: 1421

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7932

    Key  : Analysis.IO.Other.Mb
    Value: 20

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 24

    Key  : Analysis.Init.CPU.mSec
    Value: 249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 157457

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 144

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  051123-20281-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff800e6e039e0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8007bf176ed

BUGCHECK_P4: 0

READ_ADDRESS: fffff8007c51c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff800e6e039e0

MM_INTERNAL_CODE:  0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  HxTsr.exe

TRAP_FRAME:  ffff97030f80eee0 -- (.trap 0xffff97030f80eee0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000136f1c rbx=0000000000000000 rcx=ffffe60112109100
rdx=0000000000000643 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007bf176ed rsp=ffff97030f80f070 rbp=ffff97030f80f0e1
 r8=0000000000000002  r9=0000000000000008 r10=0000000000000001
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!MiUpdateCfgSystemWideBitmapWorker+0x2cd:
fffff800`7bf176ed 490fab4500      bts     qword ptr [r13],rax ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffff9703`0f80ecb8 fffff800`7bca77a9     : 00000000`00000050 fffff800`e6e039e0 00000000`00000002 ffff9703`0f80eee0 : nt!KeBugCheckEx
ffff9703`0f80ecc0 fffff800`7baeb42c     : fffff800`e6de2000 00000000`00000002 ffff9703`0f80ee79 00000000`00000000 : nt!MiSystemFault+0x1bf299
ffff9703`0f80edc0 fffff800`7bc3c529     : 00000000`00000000 00000000`00005b80 fffff800`e6ddcc00 ffff9703`0f80f0a8 : nt!MmAccessFault+0x29c
ffff9703`0f80eee0 fffff800`7bf176ed     : 00000000`1fff4a6c ffffe601`098350e8 00000000`00000007 ffff8306`6ad19040 : nt!KiPageFault+0x369
ffff9703`0f80f070 fffff800`7bf1a9c1     : 00000000`00000000 00000000`00000000 00000000`00029bfe 00007fff`ffff0000 : nt!MiUpdateCfgSystemWideBitmapWorker+0x2cd
ffff9703`0f80f140 fffff800`7bf19ee4     : ffff8306`87431a10 fffffae2`c0e6ad50 00007ffd`29b30000 00000000`00000000 : nt!MiUpdateCfgSystemWideBitmap+0x61
ffff9703`0f80f180 fffff800`7bf19cf1     : ffffe601`35db0e38 ffff8306`87431a10 ffff8306`00000000 00000000`00000000 : nt!MiUpdateImageSystemWideBitmaps+0x18
ffff9703`0f80f1b0 fffff800`7bf19855     : 00007ffd`29b30000 ffff9703`0f80f460 ffff8306`6ad19040 00000000`00000000 : nt!MiRelocateImageAgain+0x125
ffff9703`0f80f240 fffff800`7bf15eb8     : 00000000`00000002 ffff9703`0f80f460 ffff8306`8d770eb0 ffffe601`35db0df0 : nt!MiValidateExistingImage+0x59
ffff9703`0f80f2c0 fffff800`7beafb8b     : 00000000`00000000 ffff9703`0f80f460 00000000`00000002 00000000`00000000 : nt!MiShareExistingControlArea+0xcc
ffff9703`0f80f2f0 fffff800`7beaf2a4     : ffff8306`87431a10 00000000`00000000 ffff8306`8d770eb0 00000000`00000000 : nt!MiCreateImageOrDataSection+0x1cb
ffff9703`0f80f3e0 fffff800`7bf16215     : 00000000`11000000 ffff9703`0f80f791 00000000`00000000 00000000`0000004a : nt!MiCreateSection+0xf4
ffff9703`0f80f560 fffff800`7bf15fac     : ffff9703`0f80f6f8 00000000`00000005 ffff9703`0f80f738 00000000`00000000 : nt!MiCreateSectionCommon+0x255
ffff9703`0f80f640 fffff800`7bf0f145     : 00000000`00000001 00000000`00000600 00000000`00000450 00000000`00000000 : nt!NtCreateSection+0x5c
ffff9703`0f80f6b0 fffff800`7bf0ebb6     : 00000000`0000006c ffff9703`0f80f8e0 ffffe601`1e27e340 ffffe601`1e277188 : nt!PfSnGetSectionObject+0x255
ffff9703`0f80f7e0 fffff800`7ba162c5     : ffff8306`6ace0970 ffff8306`6ad19040 ffff8306`6ace0970 fffff800`7c549ac0 : nt!PfSnPopulateReadList+0x2d6
ffff9703`0f80f940 fffff800`7ba0dc67     : ffff8306`6ad19040 00000000`0000052b ffff8306`6ad19040 fffff800`7ba16170 : nt!ExpWorkerThread+0x155
ffff9703`0f80fb30 fffff800`7bc30854     : ffffc581`9ab11180 ffff8306`6ad19040 fffff800`7ba0dc10 00000000`00000000 : nt!PspSystemThreadStartup+0x57
ffff9703`0f80fb80 00000000`00000000     : ffff9703`0f810000 ffff9703`0f809000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME:  nt!MiUpdateCfgSystemWideBitmapWorker+2cd

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.1702

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  2cd

FAILURE_BUCKET_ID:  AV_W_(null)_nt!MiUpdateCfgSystemWideBitmapWorker

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {02a7597f-9712-578c-ff09-6380bac16fce}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa38b5896c651, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80267d29616, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5579

    Key  : Analysis.IO.Other.Mb
    Value: 24

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 31

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 155337

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 152

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  050823-20062-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa38b5896c651

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80267d29616

BUGCHECK_P4: 2

READ_ADDRESS: fffff8026831c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa38b5896c651

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SystemSettings

TRAP_FRAME:  ffffa68a7573f4d0 -- (.trap 0xffffa68a7573f4d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffab8b5913dc00 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80267d29616 rsp=ffffa68a7573f660 rbp=0000000000000011
 r8=0000000000000000  r9=ffffa68a7573f768 r10=ffffa68a7573f860
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!AlpcReferenceBlobByHandle+0x4a:
fffff802`67d29616 0fb647e1        movzx   eax,byte ptr [rdi-1Fh] ds:ffffffff`ffffffe1=??
Resetting default scope

STACK_TEXT:
ffffa68a`7573f2a8 fffff802`67aa4d81     : 00000000`00000050 ffffa38b`5896c651 00000000`00000000 ffffa68a`7573f4d0 : nt!KeBugCheckEx
ffffa68a`7573f2b0 fffff802`678eb4dc     : 00000002`0000000c 00000000`00000000 ffffa68a`7573f469 00000000`00000000 : nt!MiSystemFault+0x1bc7c1
ffffa68a`7573f3b0 fffff802`67a39f29     : 00000000`00000000 00000000`00000000 ffffab8b`57880b60 fffff75f`2289962e : nt!MmAccessFault+0x29c
ffffa68a`7573f4d0 fffff802`67d29616     : 00000000`00000011 00000080`00000001 00000000`00000000 fffff802`6783d985 : nt!KiPageFault+0x369
ffffa68a`7573f660 fffff802`67d286b8     : 00007ffb`eab63850 ffffa68a`7573f768 0000023b`3680fc70 fffff790`8001ed50 : nt!AlpcReferenceBlobByHandle+0x4a
ffffa68a`7573f6a0 fffff802`67d28616     : 0000023b`35243460 00000000`fe000000 00000000`0000006a 00000000`00000000 : nt!AlpcpCaptureSecurityAttributeInternal+0x60
ffffa68a`7573f6f0 fffff802`67cb52a2     : fffff802`6830bb40 fffff802`67848de1 00000000`00000000 00000000`00000011 : nt!AlpcpCaptureSecurityAttribute+0x8e
ffffa68a`7573f750 fffff802`67cb5c65     : ffff840b`d0c88b00 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpCaptureAttributes+0x352
ffffa68a`7573f7c0 fffff802`67cb713d     : ffffa68a`7573f950 0000023b`3680fc70 0000023b`35243458 00000080`eecff501 : nt!AlpcpSendMessage+0x715
ffffa68a`7573f8f0 fffff802`67a3e0e5     : ffff840b`d52ec0c0 ffffa68a`7573faa0 00000080`eecfed58 ffffa68a`7573f9c8 : nt!NtAlpcSendWaitReceivePort+0x21d
ffffa68a`7573f9b0 00007ffb`ebd4fdc4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000080`eecfed38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ebd4fdc4


SYMBOL_NAME:  nt!AlpcReferenceBlobByHandle+4a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1555

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  4a

FAILURE_BUCKET_ID:  AV_R_(null)_nt!AlpcReferenceBlobByHandle

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9cb55c0-513c-0966-155f-fe6f39861048}

Followup:     MachineOwner
---------
 

Technopat Haberler

Yeni konular

Geri
Yukarı