RTX 3060 sistemde mavi ekran hatası

Semre57

Kilopat
Katılım
2 Haziran 2017
Mesajlar
325
Daha fazla  
Cinsiyet
Erkek
Merhaba PCH F6 sistem epey gündem olmuştu. ben de satın alanlardan biriyim. sistemden memnunum fakat bazen kullanırken enteresan sorunlarla karşılaşıyorum bu 5. oldu.

Öncelikle sistemden dediğim gibi memnunum her şeyi açıyor hiç bir sorun yok. Yukarıda bahsettiğim 5 sorun ise şunlar;

1) Mavi ekran (4 Ekim)
2) Mavi ekran (22 Ekim)
3) Mavi ekran (25 Ekim)
4) Rocket League oynarken bir anda oyun dondu, ekranın kontrastı arttı sanki çizgi film gibi oldu ve bilgisayar kendi kendini yeniden başlattı. (Tarihi bilmiyorum)
5) Mavi ekran (13 Kasım)

Ben de bu sorunu çözmek istiyorum çünkü sıfır bilgisayar aldım temiz windows kurdum orijinal lisanslı kullanıyorum. Crack virüs vesaire yok. Yalnızca bilgisayar bana ilk geldiğinde BIOS güncel değildi, hala güncel değil. Elektrik gider uğraşırım diye onu güncellemedim direkt UEFI windows kurdum. Minidump dosyalarını aşağıya bırakıyorum 4 mavi ekranın 4'ü de aşağıda. Yardımlarınızı bekliyorum.

Bu arada bir not eklemek istiyorum, bilgisayarı Vatan'dan sıfır aldım montajlı şekilde, kasa camı dışında hiç bir ürünün jelatini üzerinde değildi. Bu iade edilmiş ürünlerle toplanmış bir sistem mi yoksa montajlı aldım diye mi bilmiyorum.)

Desktop.rar - Minidump
 
Son düzenleyen: Moderatör:
dism.exe /online /cleanup-image /restorehealth ve sfc/scannow işlemlerini yaptıysanız sorun büyük ihtimalle anakartdadır. Ayrıca yukarıda belirtdiğiniz gibi sorunsuz RAM sorunlu RAM'in bulunduğu slotda sıkıntı çıkarıyorsa zaten geriye tek şey kalıyor. Gönderin servise gitsin. Son bir şey soracağım. Sorunlu RAM sorunsuz RAM'in bulunduğu slotda arızalı görünüyor mu?

O işlemleri hiç yapmadım zaten sisteme temiz format attım 1-2 gün önce. Sorunlu RAM kendi slotunda sorunluydu, sorunsuz RAM hem kendi slotunda sorunsuz hem de sorunlu RAM'in olduğu slotta sorunsuz çıktı. Ama sorunlu RAM sorunsuz RAM'in slotunda sorunlu çıkar mı bilmiyorum. Bilmece gibi oldu, muhtemelen çıkar. RAM'lerden 1'i bozuk 1'i sağlam. Testlerime göre anakart da sağlam fakat hala mavi ekran hatası alabiliyorum RAM işaret eden.
 
Son düzenleyen: Moderatör:
Artık kaçıncı kez konu açtığımı ben bile bilmiyorum. RAM sağlam Memtest86 ile XMP açık kapalı her 2 slotta da test yaptım sorun yok. Windows RAM tanılama aracı ile test yaptım sorun yok ama aldığım hatalar hep RAM işaret ediyor. BIOS güncel, Windows güncel crack uygulama vesaire yok tertemiz. Sürekli mavi ekran hatası 2-3 günde 1 sistem açılışında.

Not: Sistemi aldığımdan beri durum devam ediyor yaklaşık 8 aydır. 1 tane RAM bozuktu, çıkardım şu an tek RAM kullanıyorum. Bu RAM sağlam ama yine de hata veriyor.

Yeni klasör - Google Drive (4 Adet minidump dosyası içeriyor)

Şöyle bir soru ekleyeyim, hazır sistemler sürekli çıkıyor. Yine son zamanlarda satılan bir hazır sistemi epeyi kişi aldı. Takip ettim, %90'ı aldıkları RAM'i 3600MHz'e çekince mavi ekran hatası almışlar. 3553'e çekip daha az hata almışlar. 3400 falan yapan sürekli uğraşan var.

Şimdi şuraya getirmek istiyorum meseleyi, son zamanlarda sıkça karşılaşan bu durum kronik mi? Anakart mi yetersiz kalıyor, RAM'ler mi dandik? Bir firmanın sattığı hazır sistemdeki RAM'lerin tamamı bozuk olamaz herhalde. Fakat sistemi alan hemen hemen herkes RAM ile sorun yaşıyor, mavi ekran hatalı alıyormuş. Aynı sistemi bir üst model anakart ile alanlarda ise sorun yokmuş.

Acaba bu durum yazılımsal olabilir mi? Çünkü X firmanın sattığı 100 sistemin 90 tanesindeki bileşenlerin sorunlu olması çok düşük ihtimal. 90 kişinin kurduğu driver vs. ile sorun yaşaması daha muhtemel diye düşünüyorum. Tabii temiz format atılmasına rağmen hala mavi ekran hatası alıyorum ben ama olsun.
 
Son düzenleyen: Moderatör:
  • XMP kapalı kullandın mı? XMP kapalı iken bu sorun oluyor mu?
  • İşlemci soğutucu nedir? Stok sanırım.
Sorun bana göre %99 belleklerle ilgili. Memtest hata vermese bile belleklerin çalışmasında sorun var. Bir süre XMP kapalı kullanın. Yine de mavi ekran alırsanız başka RAM ile deneyin.

Kod:
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffbd010c565000, Pointer to the store context or data manager
Arg2: ffffb98c70316730, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1921

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14572

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1443

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x154

    Key  : Bugcheck.Code.Register
    Value: 0x154

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  100422-4390-01.dmp

BUGCHECK_CODE:  154

BUGCHECK_P1: ffffbd010c565000

BUGCHECK_P2: ffffb98c70316730

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD:  ffffb98c703176b8 -- (.exr 0xffffb98c703176b8)
ExceptionAddress: fffff805193371de (nt!MetroHash64::Hash+0x0000000000000066)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000200000010
Attempt to read from address 0000000200000010

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000200000010

CONTEXT:  ffffb98c70316ef0 -- (.cxr 0xffffb98c70316ef0)
rax=ffffb98c70317928 rbx=52bc33fedbe4cbb5 rcx=0000000200000000
rdx=52bc33fedbe4cbb5 rsi=ffffb98c70317990 rdi=52bc33fedbe4cbb5
rip=fffff805193371de rsp=ffffb98c703178f0 rbp=0000000200000fe0
 r8=52bc33fedbe4cbb5  r9=52bc33fedbe4cbb5 r10=0000000200000000
r11=0000000200001000 r12=0000000000000000 r13=0000000000000001
r14=00000000a2aa033b r15=00000000d6d018f5
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!MetroHash64::Hash+0x66:
fffff805`193371de 49694a10c12f9962 imul    rcx,qword ptr [r10+10h],62992FC1h ds:002b:00000002`00000010=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

READ_ADDRESS: fffff80519cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000200000010

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffb98c`703178f0 fffff805`1930057a     : 00000000`00000001 00000000`00000000 00000000`00001000 fffff805`1921b838 : nt!MetroHash64::Hash+0x66
ffffb98c`70317930 fffff805`19339eb4     : 00000000`00000000 00000000`00000000 00000000`00000da3 00000000`00000000 : nt!SmHpBufferProtectEx+0xde
ffffb98c`70317990 fffff805`192fc1be     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb98c`70317a30 : nt!SmHpChunkHeapProtect+0x6c
ffffb98c`703179c0 fffff805`1935f41d     : ffffbd01`0c566670 ffffb98c`70317ad8 ffffb98c`70317a31 fffff805`1933b033 : nt!ST_STORE<SM_TRAITS>::StWorkItemProcess+0x1be
ffffb98c`70317a10 fffff805`192fba85     : ffffffff`fffdb610 ffffbd01`0c565000 ffffb98c`70317ad8 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StLazyWorkMgrRunExpiredWork+0xa1
ffffb98c`70317a60 fffff805`19361af1     : 00000000`00000102 ffffbd01`00000000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x5c1
ffffb98c`70317b20 fffff805`19271d25     : ffffbd01`0c565000 fffff805`19361ae0 ffffb98c`701372e8 000fe47f`bd9bbfff : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffb98c`70317b50 fffff805`19400628     : ffffa680`68d8d180 ffffbd01`0c599240 fffff805`19271cd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb98c`70317ba0 00000000`00000000     : ffffb98c`70318000 ffffb98c`70311000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MetroHash64::Hash+66

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2006

STACK_COMMAND:  .cxr 0xffffb98c70316ef0 ; kb

BUCKET_ID_FUNC_OFFSET:  66

FAILURE_BUCKET_ID:  0x154_c0000005_nt!MetroHash64::Hash

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c82d5b0e-8a27-200d-2b32-8c0b0db5570c}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd99f8f1e39d0, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8016e17af28, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2140

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 15446

    Key  : Analysis.IO.Other.Mb
    Value: 3

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 23

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10768

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  111322-12718-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffd99f8f1e39d0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8016e17af28

BUGCHECK_P4: 2

READ_ADDRESS: fffff8016a4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffd99f8f1e39d0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffffa81061372a0 -- (.trap 0xfffffa81061372a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd98f8f1e35a0 rbx=0000000000000000 rcx=ffffd99f8f1e3978
rdx=ffffc2888b6b3010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016e17af28 rsp=fffffa8106137430 rbp=0000000000000000
 r8=0000000000000002  r9=ffffc2887fe33030 r10=fffff8016e17ae80
r11=fffffa8106137568 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
Ntfs!NtfsFsdClose+0xa8:
fffff801`6e17af28 0fb64158        movzx   eax,byte ptr [rcx+58h] ds:ffffd99f`8f1e39d0=??
Resetting default scope

STACK_TEXT: 
fffffa81`06136ff8 fffff801`69c31b9d     : 00000000`00000050 ffffd99f`8f1e39d0 00000000`00000000 fffffa81`061372a0 : nt!KeBugCheckEx
fffffa81`06137000 fffff801`69a399e0     : 00000000`00000000 00000000`00000000 fffffa81`06137320 00000000`00000000 : nt!MiSystemFault+0x1da18d
fffffa81`06137100 fffff801`69c0725e     : 00000000`00000000 fffff801`00000000 00000000`00000103 00000000`00000000 : nt!MmAccessFault+0x400
fffffa81`061372a0 fffff801`6e17af28     : fffffa81`061374d9 00000000`00000000 ffffc288`00000001 00000000`00000000 : nt!KiPageFault+0x35e
fffffa81`06137430 fffff801`69a2a6b5     : ffffc288`8b6b3010 ffffc288`8b6b3010 ffffc288`8b6b3010 fffff801`67e84fe1 : Ntfs!NtfsFsdClose+0xa8
fffffa81`06137570 fffff801`67e870cf     : 00000000`74530007 fffffa81`06137620 00000000`00000000 ffffd98f`3ca00100 : nt!IofCallDriver+0x55
fffffa81`061375b0 fffff801`67e84a03     : fffffa81`06137640 00000000`00000000 00000000`00000000 ffffc288`7f3aca80 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffffa81`06137620 fffff801`69a2a6b5     : ffffc288`9a443cd0 fffff801`69a2cec8 ffffc288`7fdf39d0 ffffc288`00000000 : FLTMGR!FltpDispatch+0xa3
fffffa81`06137680 fffff801`69e19b4f     : ffffc288`9a443cd0 ffffc288`7fdf39d0 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
fffffa81`061376c0 fffff801`69e13d50     : ffffc288`7ccf8220 ffffc288`9a18f490 ffffc288`9a443ca0 fffff801`6a1b2019 : nt!IopDeleteFile+0x14f
fffffa81`06137740 fffff801`69a0ec07     : 00000000`00000000 00000000`00000000 ffffd98f`8f0b1ad0 ffffc288`9a443cd0 : nt!ObpRemoveObjectRoutine+0x80
fffffa81`061377a0 fffff801`69a0eb2e     : 00000000`00000000 ffffc288`9a18f450 ffffc288`9a18f450 ffffc288`9a18f450 : nt!ObfDereferenceObjectWithTag+0xc7
fffffa81`061377e0 fffff801`69e90721     : 00000000`00088081 ffffc288`9a18f450 fffff801`6a450b40 00000000`00088081 : nt!HalPutDmaAdapter+0xe
fffffa81`06137810 fffff801`69b86025     : 00000000`00000001 00000000`00000000 fffffa81`061378e0 ffffc288`9a18f458 : nt!MiSegmentDelete+0x155
fffffa81`06137860 fffff801`69bbbf89     : 00000000`00000000 fffff801`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
fffffa81`06137920 fffff801`69a71d25     : ffffc288`7fdb4080 ffffc288`7fdb4080 00000000`00000080 fffff801`69bbbe60 : nt!MiDereferenceSegmentThread+0x129
fffffa81`06137b50 fffff801`69c00778     : ffff9900`a7700180 ffffc288`7fdb4080 fffff801`69a71cd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffffa81`06137ba0 00000000`00000000     : fffffa81`06138000 fffffa81`06131000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  Ntfs!NtfsFsdClose+a8

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.2132

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  a8

FAILURE_BUCKET_ID:  AV_R_(null)_Ntfs!NtfsFsdClose

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f04e2a2a-35a9-b8bf-fffc-7b077fd28d79}

Followup:     MachineOwner
---------
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000c9b, physical page number
Arg3: 000001d887691990, zero
Arg4: ffff920229560000, zero

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2483

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10056

    Key  : Analysis.IO.Other.Mb
    Value: 3

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 22

    Key  : Analysis.Init.CPU.mSec
    Value: 452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10202

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0xc9b

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0x7199b6dc

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x11990

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0x255fb7

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0x365ab6

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x1a4e5f

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x12b

    Key  : Bugcheck.Code.Register
    Value: 0x12b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  102522-6062-01.dmp

BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: c9b

BUGCHECK_P3: 1d887691990

BUGCHECK_P4: ffff920229560000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT: 
fffffa85`ed6e7138 fffff801`57997232     : 00000000`0000012b ffffffff`c00002c4 00000000`00000c9b 000001d8`87691990 : nt!KeBugCheckEx
fffffa85`ed6e7140 fffff801`5783a751     : 00000000`00000001 00000000`c00002c4 ffff9202`29560000 00000000`00040000 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
fffffa85`ed6e71a0 fffff801`57670c31     : 00000000`00000004 fffff801`5767079a 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1c9afd
fffffa85`ed6e7260 fffff801`57670500     : 00000000`00000001 00000000`00011990 00000000`00000000 ffffbd0a`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
fffffa85`ed6e72b0 fffff801`576710fc     : 00000000`ffffffff ffffbd0a`3816f000 fffffa85`ed6e7390 ffffbd0a`3c824410 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
fffffa85`ed6e7350 fffff801`57671371     : ffff9201`e8348730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
fffffa85`ed6e7400 fffff801`57671431     : ffffbd0a`31828000 ffffbd0a`3c824410 ffffbd0a`3816f000 ffffbd0a`318299c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffffa85`ed6e7480 fffff801`57689cb8     : ffffbd0a`4318b080 ffffbd0a`31828000 00000000`00000000 ffffbd0a`3f6cb730 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffffa85`ed6e74b0 fffff801`57747c07     : fffff801`57671410 fffffa85`ed6e7550 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffa85`ed6e7520 fffff801`576fb3d4     : fffffa85`ed6e7620 00000000`31526d73 00000000`000003ff fffff801`581239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
fffffa85`ed6e75f0 fffff801`576fae08     : 00000000`0000000c 00000000`000003ff fffffa85`ed6e76a0 fffff801`581239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
fffffa85`ed6e7640 fffff801`57746e67     : 00000000`0000000c 00000000`00000010 ffffbd0a`3c824410 ffffbd0a`3f6cb730 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
fffffa85`ed6e76d0 fffff801`5775cbeb     : ffffbd0a`00000010 ffffbd0a`3f6cb7f0 00000000`00000000 ffffbd0a`31828000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
fffffa85`ed6e7740 fffff801`576f1da0     : 0000007f`00000100 00000000`00000000 fffffa85`ed6e7998 fffff801`576ef870 : nt!SmPageRead+0x33
fffffa85`ed6e7790 fffff801`576ef3cd     : 00000000`00000002 fffffa85`ed6e7820 fffffa85`ed6e7998 ffffbd0a`3f6cb6e0 : nt!MiIssueHardFaultIo+0x10c
fffffa85`ed6e77e0 fffff801`57639a48     : 00000000`c0033333 00000000`00000001 00000000`02be9230 00000000`00000000 : nt!MiIssueHardFault+0x29d
fffffa85`ed6e78a0 fffff801`5780725e     : 00000000`00000006 00000000`00000000 00000000`00000000 ffffbd0a`00000000 : nt!MmAccessFault+0x468
fffffa85`ed6e7a40 00000000`72a5b21d     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0520dd4c 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x72a5b21d


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+10a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2130

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10a

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------

CRITICAL_STRUCTURE_CORRUPTION (109)
This BugCheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fdedc5a78d70c, Reserved
Arg2: 0000000000000000, Reserved
Arg3: 2e699f5784380144, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2561

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16074

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 2

    Key  : Analysis.Init.CPU.mSec
    Value: 249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1712

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x109

    Key  : Bugcheck.Code.Register
    Value: 0x109

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  012923-8500-01.dmp

BUGCHECK_CODE:  109

BUGCHECK_P1: a39fdedc5a78d70c

BUGCHECK_P2: 0

BUGCHECK_P3: 2e699f5784380144

BUGCHECK_P4: 101

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
fffffe8e`a5ad6d68 00000000`00000000     : 00000000`00000109 a39fdedc`5a78d70c 00000000`00000000 2e699f57`84380144 : nt!KeBugCheckEx


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  BAD_STACK_0x109

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b4d7023a-05c3-49b2-3ea4-6240fe57d90e}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff9906a700400c, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80675bc27e8, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2281

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16132

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 280

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1603

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  012923-20140-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff9906a700400c

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80675bc27e8

BUGCHECK_P4: 2

READ_ADDRESS: fffff806708fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9906a700400c

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffbe8b81a87210 -- (.trap 0xffffbe8b81a87210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9986a7004040 rbx=0000000000000000 rcx=0000000000000001
rdx=fffff80675b23000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80675bc27e8 rsp=ffffbe8b81a873a0 rbp=ffff9986a7004170
 r8=ffff9906a7004040  r9=7fffd604c0458500 r10=7ffffffffffffffc
r11=000000000000026e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
Ntfs!NtfsDeleteScb+0x388:
fffff806`75bc27e8 418b4704        mov     eax,dword ptr [r15+4] ds:00000000`00000004=????????
Resetting default scope

STACK_TEXT: 
ffffbe8b`81a86f68 fffff806`70036e57     : 00000000`00000050 ffff9906`a700400c 00000000`00000000 ffffbe8b`81a87210 : nt!KeBugCheckEx
ffffbe8b`81a86f70 fffff806`6fe42250     : ffff9986`951019a0 00000000`00000000 ffffbe8b`81a87290 00000000`00000000 : nt!MiSystemFault+0x1d6bd7
ffffbe8b`81a87070 fffff806`70009cd8     : ffff9986`00000000 00000000`00000000 ffff9986`00000000 01b00030`00000640 : nt!MmAccessFault+0x400
ffffbe8b`81a87210 fffff806`75bc27e8     : ffffbe8b`81a87830 ffff9986`00000001 ffffbe8b`00000000 ffffbe8b`81a87830 : nt!KiPageFault+0x358
ffffbe8b`81a873a0 fffff806`75bc2366     : ffff9986`a7004170 ffff9986`20244508 ffff9986`00000000 ffffd604`c0458590 : Ntfs!NtfsDeleteScb+0x388
ffffbe8b`81a87440 fffff806`75aa97b5     : ffff9986`a7004010 ffff9986`a7004170 ffff9986`a7004170 ffff9986`a7004170 : Ntfs!NtfsRemoveScb+0x66
ffffbe8b`81a874a0 fffff806`75bc20fc     : ffffbe8b`81a87830 00000000`00000001 ffff9986`a7004010 ffffd604`c0457100 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffbe8b`81a874e0 fffff806`75aa8f76     : ffffbe8b`81a87830 ffff9986`a7004170 00000000`00000000 ffff9986`a7004010 : Ntfs!NtfsTeardownStructures+0x9c
ffffbe8b`81a87560 fffff806`75b84532     : ffffbe8b`81a87830 fffff806`75b98fc0 00000000`00000000 ffff9986`a7004000 : Ntfs!NtfsDecrementCloseCounts+0xf6
ffffbe8b`81a875c0 fffff806`75b9a364     : ffffbe8b`81a87830 ffff9986`a7004170 ffff9986`a7004010 ffffd604`c0457180 : Ntfs!NtfsCommonClose+0xac2
ffffbe8b`81a87690 fffff806`75b99048     : 00000000`0000001c fffff806`70925440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x244
ffffbe8b`81a877f0 fffff806`6fe5b3d5     : ffffd604`c65f5040 fffff806`75b98fc0 ffffd604`bb29b6a0 00000000`00000000 : Ntfs!NtfsFspClose+0x88
ffffbe8b`81a87ab0 fffff806`6ff030e5     : ffffd604`c65f5040 00000000`00000080 ffffd604`bb2ac200 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffbe8b`81a87b50 fffff806`70002e08     : ffffc581`aefd9180 ffffd604`c65f5040 fffff806`6ff03090 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffbe8b`81a87ba0 00000000`00000000     : ffffbe8b`81a88000 ffffbe8b`81a81000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  Ntfs!NtfsDeleteScb+388

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.2311

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  388

FAILURE_BUCKET_ID:  AV_R_(null)_Ntfs!NtfsDeleteScb

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a85b28bd-d8ef-2aaa-1d51-2345ecccca25}

Followup:     MachineOwner
---------

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000d59, physical page number
Arg3: 0000025db53d0ec0, zero
Arg4: ffff9401ff033000, zero

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1968

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13032

    Key  : Analysis.IO.Other.Mb
    Value: 2

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 22

    Key  : Analysis.Init.CPU.mSec
    Value: 405

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9253

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0xd59

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0xf0321517

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x10ec0

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0x330987

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0x340086

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x23e68f

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x12b

    Key  : Bugcheck.Code.Register
    Value: 0x12b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  102222-5187-01.dmp

BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: d59

BUGCHECK_P3: 25db53d0ec0

BUGCHECK_P4: ffff9401ff033000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT: 
ffffa904`502af138 fffff807`6a997232     : 00000000`0000012b ffffffff`c00002c4 00000000`00000d59 0000025d`b53d0ec0 : nt!KeBugCheckEx
ffffa904`502af140 fffff807`6a83a751     : 00000000`00000001 00000000`c00002c4 ffff9401`ff033000 00000000`001ff02f : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffffa904`502af1a0 fffff807`6a670c31     : 00000000`00000004 fffff807`6a67079a 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1c9afd
ffffa904`502af260 fffff807`6a670500     : 00000000`00000001 00000000`00010ec0 00000000`00000000 ffffab05`00004000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffa904`502af2b0 fffff807`6a6710fc     : fffff807`ffffffff ffffab05`b0bd5000 ffffa904`502af390 ffffab05`b0796d10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffa904`502af350 fffff807`6a671371     : ffff9401`fa1df730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffa904`502af400 fffff807`6a671431     : ffffab05`a5ba0000 ffffab05`b0796d10 ffffab05`b0bd5000 ffffab05`a5ba19c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffa904`502af480 fffff807`6a689cb8     : ffffab05`ae87b3c0 ffffab05`a5ba0000 00000000`00000000 ffffab05`acd568c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffa904`502af4b0 fffff807`6a747c07     : fffff807`6a671410 ffffa904`502af550 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa904`502af520 fffff807`6a6fb3d4     : ffffa904`502af620 00000000`31526d73 00000000`000003ff fffff807`6b1239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffa904`502af5f0 fffff807`6a6fae08     : 00000000`0000000c 00000000`000003ff ffffa904`502af6a0 fffff807`6b1239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffa904`502af640 fffff807`6a746e67     : 00000000`0000000c 00000000`00000004 ffffab05`b0796d10 ffffab05`acd568c0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffa904`502af6d0 fffff807`6a75cbeb     : ffffab05`00000004 ffffab05`acd56980 00000000`00000000 ffffab05`a5ba0000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffa904`502af740 fffff807`6a6f1da0     : 0000007f`00000100 00000000`00000000 ffffa904`502af998 fffff807`6a6ef870 : nt!SmPageRead+0x33
ffffa904`502af790 fffff807`6a6ef3cd     : 00000000`00000002 ffffa904`502af820 ffffa904`502af998 ffffab05`acd56870 : nt!MiIssueHardFaultIo+0x10c
ffffa904`502af7e0 fffff807`6a639a48     : 00000000`c0033333 00000000`00000001 00000219`33f29c66 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffa904`502af8a0 fffff807`6a80725e     : ffffab05`ae87b300 000000c7`e0b7a270 ffffa904`502afac0 ffffab05`00000000 : nt!MmAccessFault+0x468
ffffa904`502afa40 00007ffa`25ab0b7e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000c7`e0b7aa40 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`25ab0b7e


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+10a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2130

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10a

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This BugCheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000394, physical page number
Arg3: 000001df3dc4ea60, zero
Arg4: ffffcd80925ad000, zero

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1827

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16946

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1993

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0x394

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0x11f2e5f1

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0xea60

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0x190ed3

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0xffffffffffffffff

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x13ba54

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x12b

    Key  : Bugcheck.Code.Register
    Value: 0x12b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  032623-7703-01.dmp

BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 394

BUGCHECK_P3: 1df3dc4ea60

BUGCHECK_P4: ffffcd80925ad000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT: 
ffffa286`ade97138 fffff807`3a399572     : 00000000`0000012b ffffffff`c00002c4 00000000`00000394 000001df`3dc4ea60 : nt!KeBugCheckEx
ffffa286`ade97140 fffff807`3a248a85     : 00000000`00000001 00000000`c00002c4 ffffcd80`925ad000 00000000`00092590 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffffa286`ade971a0 fffff807`3a060819     : 00000000`00000004 fffff807`3a060bd2 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1e8249
ffffa286`ade97260 fffff807`3a061144     : 00000000`00000001 00000000`0000ea60 00000000`00000000 ffff928f`0000d000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffffa286`ade972b0 fffff807`3a060564     : 00000000`ffffffff ffff928f`5c620000 ffffa286`ade97390 ffff928f`5b19b0d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffffa286`ade97350 fffff807`3a060279     : ffffcd80`8a7eb730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffffa286`ade97400 fffff807`3a060131     : ffff928f`51e48000 ffff928f`5b19b0d0 ffff928f`5c620000 ffff928f`51e499c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffa286`ade97480 fffff807`3a0f9a48     : ffff928f`527eb080 ffff928f`51e48000 00000000`00000000 ffff928f`52aff0f0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffa286`ade974b0 fffff807`3a05dbab     : fffff807`3a060110 ffffa286`ade97550 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffa286`ade97520 fffff807`3a150d34     : ffffa286`ade97620 00000000`31526d73 00000000`000003ff fffff807`3ab239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffffa286`ade975f0 fffff807`3a150768     : 00000000`0000000c 00000000`000003ff ffffa286`ade976a0 fffff807`3ab239c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffffa286`ade97640 fffff807`3a05ebd7     : 00000000`0000000c 00000000`0000000d ffff928f`5b19b0d0 ffff928f`52aff0f0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffffa286`ade976d0 fffff807`3a04ee0b     : ffff928f`0000000d ffff928f`52aff1b0 00000000`00000000 ffff928f`51e48000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffa286`ade97740 fffff807`3a147700     : 0000007f`00000100 00000000`00000000 ffffa286`ade97998 fffff807`3a1451f0 : nt!SmPageRead+0x33
ffffa286`ade97790 fffff807`3a144d4d     : 00000000`00000002 ffffa286`ade97820 ffffa286`ade97998 ffff928f`52aff0a0 : nt!MiIssueHardFaultIo+0x10c
ffffa286`ade977e0 fffff807`3a0a4dd8     : 00000000`c0033333 00000000`00000001 000002c4`3edb201f 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffffa286`ade978a0 fffff807`3a209bd8     : 00000000`ffffffff 00000000`00000000 ffffa286`ade97ac0 00000000`00000000 : nt!MmAccessFault+0x468
ffffa286`ade97a40 00007ffc`3f75b8a0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
000000f2`19bfc340 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`3f75b8a0


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+10a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.2728

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  10a

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff9c8da1fc3420, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff807494838d4, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for klif.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1859

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 33837

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3632

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  040823-7343-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff9c8da1fc3420

BUGCHECK_P2: 0

BUGCHECK_P3: fffff807494838d4

BUGCHECK_P4: 2

READ_ADDRESS: fffff80749afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9c8da1fc3420

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffe70e1bd9d750 -- (.trap 0xffffe70e1bd9d750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000007f rbx=0000000000000000 rcx=000000000000005c
rdx=ffff9c8f97668760 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807494838d4 rsp=ffffe70e1bd9d8e0 rbp=000000000000007f
 r8=ffff9c8f97668701  r9=ffff9c8fa6f64d60 r10=fffff80749483870
r11=fffffffdfb05e6c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!RtlCompareUnicodeString+0x64:
fffff807`494838d4 470fb7140b      movzx   r10d,word ptr [r11+r9] ds:ffff9c8d`a1fc3420=????
Resetting default scope

STACK_TEXT: 
ffffe70e`1bd9d4a8 fffff807`492744bf     : 00000000`00000050 ffff9c8d`a1fc3420 00000000`00000000 ffffe70e`1bd9d750 : nt!KeBugCheckEx
ffffe70e`1bd9d4b0 fffff807`490a4d70     : 00000000`00000000 00000000`00000000 ffffe70e`1bd9d7d0 00000000`00000000 : nt!MiSystemFault+0x1b171f
ffffe70e`1bd9d5b0 fffff807`49209bd8     : ffffc180`1769d180 fffff807`492027d2 ffffc180`1769d180 00000000`00000000 : nt!MmAccessFault+0x400
ffffe70e`1bd9d750 fffff807`494838d4     : fffff807`49b25440 00000000`00001700 fffff807`5fa84000 00000000`00000200 : nt!KiPageFault+0x358
ffffe70e`1bd9d8e0 fffff807`5fa059d7     : ffff9c8f`97668720 ffffe70e`1bd9d9a0 00000000`00000000 fffff807`5ff7c686 : nt!RtlCompareUnicodeString+0x64
ffffe70e`1bd9d920 ffff9c8f`97668720     : ffffe70e`1bd9d9a0 00000000`00000000 fffff807`5ff7c686 00000000`00000015 : klif+0x59d7
ffffe70e`1bd9d928 ffffe70e`1bd9d9a0     : 00000000`00000000 fffff807`5ff7c686 00000000`00000015 fffff807`4900f4e3 : 0xffff9c8f`97668720
ffffe70e`1bd9d930 00000000`00000000     : fffff807`5ff7c686 00000000`00000015 fffff807`4900f4e3 ffffe70e`00000031 : 0xffffe70e`1bd9d9a0


SYMBOL_NAME:  klif+59d7

MODULE_NAME: klif

IMAGE_NAME:  klif.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  59d7

FAILURE_BUCKET_ID:  AV_R_(null)_klif!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fe2655c9-ba90-0b76-1bfe-235a6a52f9f2}

Followup:     MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff9bffee32260
Arg3: 0000000400000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1374

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9288

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1856

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : MemoryManagement.PFN
    Value: 400000

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  040323-8421-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff9bffee32260

BUGCHECK_P3: 400000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RuntimeBroker.exe

STACK_TEXT: 
fffff088`b2bdf068 fffff803`1991ba3a     : 00000000`0000001a 00000000`00041792 fffff9bf`fee32260 00000004`00000000 : nt!KeBugCheckEx
fffff088`b2bdf070 fffff803`198a3df6     : 00000000`00000000 fffff088`b2bdf640 00000000`0000007f fffff9bf`fee32260 : nt!MiDeleteVa+0x153a
fffff088`b2bdf170 fffff803`198a3f0b     : fffff9fc`00000000 ffffd90a`beed0700 fffff088`00000000 fffff088`b2bdf5e0 : nt!MiWalkPageTablesRecursively+0x776
fffff088`b2bdf210 fffff803`198a3f0b     : fffff9fc`fe6fffb8 ffffd90a`beed0700 fffff088`00000001 fffff088`b2bdf5f0 : nt!MiWalkPageTablesRecursively+0x88b
fffff088`b2bdf2b0 fffff803`198a3f0b     : fffff9fc`fe6ff000 ffffd90a`beed0700 fffff088`00000002 fffff088`b2bdf600 : nt!MiWalkPageTablesRecursively+0x88b
fffff088`b2bdf350 fffff803`19876b3b     : 00000000`00000000 ffffd90a`beed0700 00000000`00000003 fffff088`b2bdf610 : nt!MiWalkPageTablesRecursively+0x88b
fffff088`b2bdf3f0 fffff803`1991a2d1     : fffff088`b2bdf590 ffffd90a`00000000 fffff9bf`00000002 fffff9fc`00000000 : nt!MiWalkPageTables+0x36b
fffff088`b2bdf4f0 fffff803`19924480     : 00000000`00000001 fffff088`00000000 ffffd90a`beed0550 ffffd90a`b3822040 : nt!MiDeletePagablePteRange+0x4f1
fffff088`b2bdf800 fffff803`19cfe339     : ffffd90a`c62a20f0 00000000`00000000 ffffd90a`00000000 ffffd90a`00000000 : nt!MiDeleteVad+0x360
fffff088`b2bdf910 fffff803`19cfdce4     : ffffd90a`c62a20f0 ffffd90a`b520ca20 ffffd90a`b3822040 00000000`00000000 : nt!MiUnmapVad+0x49
fffff088`b2bdf940 fffff803`19cfd783     : ffffd90a`c62a1bf0 ffffd90a`c62a1bf0 ffffd90a`c62a20f0 ffffd90a`beed0080 : nt!MiCleanVad+0x30
fffff088`b2bdf970 fffff803`19c6a3c8     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd90a`beed0080 : nt!MmCleanProcessAddressSpace+0x137
fffff088`b2bdf9f0 fffff803`19f0b322     : fffff803`1a325440 ffffd90a`beed0080 fffff803`19f0b2f0 00000000`00000200 : nt!PspRundownSingleProcess+0x20c
fffff088`b2bdfa80 fffff803`198bdef5     : ffffd90a`b3822040 fffff803`198ccb60 ffffd90a`a5c94a20 ffffd90a`00000000 : nt!PspProcessRundownWorkerSingle+0x32
fffff088`b2bdfab0 fffff803`19855485     : ffffd90a`b3822040 00000000`00000080 ffffd90a`a5d02080 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff088`b2bdfb50 fffff803`19a02d48     : ffff9e81`5a929180 ffffd90a`b3822040 fffff803`19855430 00000000`001e0000 : nt!PspSystemThreadStartup+0x55
fffff088`b2bdfba0 00000000`00000000     : fffff088`b2be0000 fffff088`b2bd9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff100c086bd58, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff8b88a6547790, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13539

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 593

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2037

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xbe

    Key  : Bugcheck.Code.Register
    Value: 0xbe

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  040423-7359-01.dmp

BUGCHECK_CODE:  be

BUGCHECK_P1: fffff100c086bd58

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffff8b88a6547790

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

TRAP_FRAME:  ffff8b88a6547790 -- (.trap 0xffff8b88a6547790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff10000000000 rbx=0000000000000000 rcx=000000000402ce9c
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802820d44c8 rsp=ffff8b88a6547920 rbp=ffff8b88a65479c9
 r8=8000000000000000  r9=ffff8b88a6547920 r10=0000000000000001
r11=ffff8b88a65478e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MmStoreProbeAndLockPages+0xcc:
fffff802`820d44c8 f0480fba6b183f  lock bts qword ptr [rbx+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope

STACK_TEXT: 
ffff8b88`a6547598 fffff802`82227534     : 00000000`000000be fffff100`c086bd58 8a000000`00200121 ffff8b88`a6547790 : nt!KeBugCheckEx
ffff8b88`a65475a0 fffff802`820a4e5f     : 8a000000`00200121 00000000`00000003 ffff8b88`a6547810 00000000`00000000 : nt!MiRaisedIrqlFault+0x20170c
ffff8b88`a65475f0 fffff802`82209bd8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
ffff8b88`a6547790 fffff802`820d44c8     : fffff100`00000000 fffff100`04a02d70 ffffdf8e`dfb20050 00000000`00000000 : nt!KiPageFault+0x358
ffff8b88`a6547920 fffff802`8205e769     : 00000000`00040000 fffff802`00000000 ffffdf8e`d9e0f8d8 00000000`00000000 : nt!MmStoreProbeAndLockPages+0xcc
ffff8b88`a6547a30 fffff802`8205e97c     : 00000000`00040000 ffff8b88`a6547aa0 ffff8b88`a6547aa0 ffffdf8e`d9e0f918 : nt!SmKmProbeAndLockAddress+0x5d
ffff8b88`a6547a60 fffff802`8205e851     : 00000000`00040000 00000000`00000004 000002b3`d5e50000 00000000`00020000 : nt!SmKmStoreHelperCommandProcess+0xac
ffff8b88`a6547ad0 fffff802`82055485     : ffffdf8e`d9e68080 00000000`00000080 fffff802`8205e7f0 000fe47f`bd9bbfff : nt!SmKmStoreHelperWorker+0x61
ffff8b88`a6547b50 fffff802`82202d48     : ffff9800`7288b180 ffffdf8e`d9e68080 fffff802`82055430 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8b88`a6547ba0 00000000`00000000     : ffff8b88`a6548000 ffff8b88`a6541000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiRaisedIrqlFault+20170c

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.2728

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  20170c

FAILURE_BUCKET_ID:  AV_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd3fb09a803e0
Arg3: 0000002000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1765

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7113

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 765

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1984

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : MemoryManagement.PFN
    Value: 2000000

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  112122-7593-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffd3fb09a803e0

BUGCHECK_P3: 2000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WmiPrvSE.exe

STACK_TEXT: 
fffffa0b`b052efe8 fffff803`4f8c5f2a     : 00000000`0000001a 00000000`00041792 ffffd3fb`09a803e0 00000020`00000000 : nt!KeBugCheckEx
fffffa0b`b052eff0 fffff803`4f838a66     : 00000000`00000000 00000000`00000000 00000000`00000092 ffffd3fb`09a803e0 : nt!MiDeleteVa+0x153a
fffffa0b`b052f0f0 fffff803`4f838b7b     : ffffd3e9`00000000 ffff8104`9a1a5700 fffffa0b`00000000 fffffa0b`b052f560 : nt!MiWalkPageTablesRecursively+0x776
fffffa0b`b052f190 fffff803`4f838b7b     : ffffd3e9`00000000 ffff8104`9a1a5700 fffffa0b`00000001 fffffa0b`b052f570 : nt!MiWalkPageTablesRecursively+0x88b
fffffa0b`b052f230 fffff803`4f838b7b     : ffffd3e9`f4fec000 ffff8104`9a1a5700 fffffa0b`00000002 fffffa0b`b052f580 : nt!MiWalkPageTablesRecursively+0x88b
fffffa0b`b052f2d0 fffff803`4f80b7db     : 00000000`00000000 ffff8104`9a1a5700 00000000`00000003 fffffa0b`b052f590 : nt!MiWalkPageTablesRecursively+0x88b
fffffa0b`b052f370 fffff803`4f8c47c1     : fffffa0b`b052f510 ffff8104`00000001 00000048`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffa0b`b052f470 fffff803`4fcad124     : 00000000`00000000 fffff803`4f923000 00000000`00000000 ffff8104`8bee11c0 : nt!MiDeletePagablePteRange+0x4f1
fffffa0b`b052f780 fffff803`4f90b1f4     : ffff8104`9a1a5080 00000000`0aabfc50 00000000`00000002 fffff803`00000000 : nt!MiDeleteVadBitmap+0x8c
fffffa0b`b052f810 fffff803`4fcacfa0     : ffff8104`9a1a5080 ffff8104`9a1a57c0 ffff8104`9a1a5700 ffff8104`9af985c0 : nt!MiDeleteFinalPageTables+0xc8
fffffa0b`b052f8d0 fffff803`4fcaa42f     : ffff8104`9a1a5080 fffffa0b`b052f990 ffff8104`9af985c0 ffff8104`9a1a54c8 : nt!MmDeleteProcessAddressSpace+0x64
fffffa0b`b052f920 fffff803`4fc16d50     : ffff8104`9a1a5050 ffff8104`9a1a5050 00000000`00000001 ffff8104`8bebbd20 : nt!PspProcessDelete+0x13f
fffffa0b`b052f9b0 fffff803`4fce42a4     : 00000000`00000000 ffff8104`9a1a5050 fffff803`4fce40a0 ffff8104`8beaacb0 : nt!ObpRemoveObjectRoutine+0x80
fffffa0b`b052fa10 fffff803`4f852b65     : ffff8104`9af985c0 fffff803`4fce40a0 ffff8104`8beaacb0 00000000`00000000 : nt!ObpProcessRemoveObjectQueue+0x204
fffffa0b`b052fab0 fffff803`4f871d25     : ffff8104`9af985c0 00000000`00000080 ffff8104`8bee11c0 00000000`00000000 : nt!ExpWorkerThread+0x105
fffffa0b`b052fb50 fffff803`4fa01f08     : ffffc180`ee54b180 ffff8104`9af985c0 fffff803`4f871cd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffffa0b`b052fba0 00000000`00000000     : fffffa0b`b0530000 fffffa0b`b0529000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
Öncelikle vakit ayırıp cevap yazdığınız için çok teşekkür ederim Recep Bey.

BIOS güncelledikten sonra XMP defaulta dönmüştü bir ara, ben bunu fark edip 3200 MHz yapar yapmaz mavi ekran almıştım. Tabii o zaman sistemde 2x8 kullanıyordum sanırım. Zaten 1 tanesi kesinlikle sorunlu. Diğeri de muhtemel sorunlu. Vatan Bilgisayar'a ikisini de garanti için yollayabilirim fakat 2. RAM'i onlar da test edip bozuk olmadığını söylerlerse ne yapmalıyım? Elimde minidump dışında bu RAM sorunlu diyebileceğim bir argüman yok şu an.

Edit: Soğutucu stok evet, ama işlemcim hiçbir zaman yüksek sıcaklıklara maruz kalmadı. Yoracak işlem yapmadım çünkü. Mavi ekran hatası da nadiren oyunlarda, sıklıkla sistem açılışından 1-2 dakika sonra oluyor. En son 8 Nisanda açılışta aldım hata, 7 gündür bir hata vermedi henüz. Ara ara yokluyor.
 
Biri bozuksa zaten ikisi birden değişir çünkü kit bellek bu. Soğutucuyu ısınma için sormadım. Cüsseli olsaydı işlemciyi aşırı sıkıp pinlerin temas noktalarından kaymasına sebe olma ihtimali vardı. Sen her türlü belleği garantiye yolla bakalım derim. Yeterince kanıtın var. İtiraz ederlerse de mesajımı gösterebilirsin.
 
Biri bozuksa zaten ikisi birden değişir çünkü kit bellek bu. Soğutucuyu ısınma için sormadım. Cüsseli olsaydı işlemciyi aşırı sıkıp pinlerin temas noktalarından kaymasına sebe olma ihtimali vardı. Sen her türlü belleği garantiye yolla bakalım derim. Yeterince kanıtın var. İtiraz ederlerse de mesajımı gösterebilirsin.
Teşekkür ederim, kit bilgisini aldığım iyi oldu. İkisini birden iade edeyim tüm aksesuarları ile. Çok teşekkürler. Bu konu da şimdilik kalsın burada, süreç sonrası yeni bellekler ile dener tecrübelerimi elimden geldiğince aktarırım. İyi ki varmış Technopat :)

Bir de, şöyle ilginç bir sorunum var. İlgilenmek isterseniz onu da bırakayım. Elinizden fazlaca ekran kartı geçtiği için durum hakkında bilginiz olabilir. Yine çok absürt bir sorun bulmuş beni. Bakmasanız da olur, iyi geceler dilerim.


041623-8421-01.dmp

Kasanın tuşuna basar basmaz mavi ekran hatası aldım. Page Fault In Nonpaged Area hatası, yine RAM kaynaklı 😳
 
Son düzenleme:

Yeni konular

Geri
Yukarı