B360M ve i7 8700 sistem mavi ekran veriyor

muhammedkorkem

Femtopat
Katılım
29 Temmuz 2020
Mesajlar
16
Merhaba,

Benim PC bayağıdır mavi ekran veriyor. Çözüm aradım aradım, bulamadım.

Özellikler:
-MSI B360M GAMING Plus anakart.
-MSI NVIDIA GeForce GTX 1050 Ti 4 GB 4G DDR5 128Bit ekran kartı.
-Hi Level 16 GB 2400MHz RAM (1 tane var o da bu sadece)
-Hi Level 240 SSD.
-1 TB HDD.
-Intel Core i7 8700 12MB 12çekirdek işlemci.
-Xpower 650W 80Plus PSU.
 
Son düzenleyen: Moderatör:
i7-8700 ne zamandır beri 12 çekirdek? i9-10900K 10 çekirdek.

Minidump dosyalarını paylaşın.


@claus @Recep Baltaş @r.yasar10 @MayCrasH
 
i7-8700 ne zamandır beri 12 çekirdek? i9-10900K 10 çekirdek.

Minidump dosyalarını paylaşın.


@claus @Recep Baltaş @r.yasar10 @MayCrasH
 
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000011, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80512a4248f, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a.

BUGCHECK_P1: 11.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff80512a4248f.

READ_ADDRESS: fffff80512f733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000011.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

TRAP_FRAME: fffff40c5af57480 -- (.trap 0xfffff40c5af57480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000c0 rbx=0000000000000000 rcx=fffff78000000274.
rdx=00000000000e4000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8052ce8cbde rsp=fffff40c5af57610 rbp=00000000000e4000.
r8=ffffaa0cda4a9d00 r9=fffff40c5af57910 r10=fffff80512b25240.
r11=fffff40c5af57808 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po cy.
dxgmms2!FastZeroMemory+0x5e:
fffff805`2ce8cbde 660fe703 movntdq xmmword ptr [rbx],xmm0 ds:00000000`00000000=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff40c`5af565b8 fffff805`12bd41e9 : 00000000`0000000a 00000000`00000011 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff40c`5af565c0 fffff805`12bd0529 : fffff40c`5af567c0 00000000`00000020 00000000`00000020 fffff805`2e4d50ea : nt!KiBugCheckDispatch+0x69.
fffff40c`5af56700 fffff805`12a4248f : ffff858b`45dde080 fffff805`00054009 000000d2`a5709130 000000d3`10ba6330 : nt!KiPageFault+0x469.
fffff40c`5af56890 fffff805`12a3ece2 : 00000000`00303238 ffffbd00`09096a98 fffff40c`00000000 ff030000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f.
fffff40c`5af56970 fffff805`12a69b69 : fffffae1`00000010 000646c8`00000002 00000000`00000000 000646c8`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372.
fffff40c`5af56b90 fffff805`12a6995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199.
fffff40c`5af56c70 fffff805`12a5dde6 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000001 : nt!MiGetFreeOrZeroPageAnyColor+0x62.
fffff40c`5af56cb0 fffff805`12a5d4e1 : fffff805`12e6a440 ffff858b`00000093 00000000`00000093 00000000`00000000 : nt!MiGetPage+0x346.
fffff40c`5af56d90 fffff805`12a5b20a : fffff40c`5af57100 00000000`00000000 00000000`00000001 00000000`00000011 : nt!MiGetPageChain+0x181.
fffff40c`5af56f80 fffff805`12a5ace8 : ffffaa0c`da19cb30 fffff40c`00000000 ffff858b`4596fb10 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x14a.
fffff40c`5af570a0 fffff805`12a5a5b2 : fffffafd`40558db0 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218.
fffff40c`5af57190 fffff805`12a58579 : 00000000`00000111 00000000`00000004 00000000`c0000016 ffffc280`62ac6101 : nt!MiDispatchFault+0x982.
fffff40c`5af572e0 fffff805`12bd041e : ffff858b`45dde460 fffff805`12acebf8 fffff40c`5af57910 fffff805`12aa19c9 : nt!MmAccessFault+0x169.
fffff40c`5af57480 fffff805`2ce8cbde : fffff40c`5af579b0 00000000`00000000 00000000`04000000 00000000`00000000 : nt!KiPageFault+0x35e.
fffff40c`5af57610 fffff805`2ce8cb28 : ffffaa0c`d9de6910 ffffaa0c`d4331560 ffff858b`4596fb10 fffff40c`5af57650 : dxgmms2!FastZeroMemory+0x5e.
fffff40c`5af57660 fffff805`2ce79b5c : ffff858b`45edec00 00000000`00000000 00000000`00000000 ffff858b`45edec90 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::ZeroMultirangeMemory+0x88.
fffff40c`5af576d0 fffff805`2ce86979 : ffffaa0c`da19cb30 fffff805`00000000 ffffaa0c`da19cb30 ffff858b`4596fb10 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ZeroIfNeeded+0x17c.
fffff40c`5af57750 fffff805`2ce133f9 : ffffaa0c`d54c3010 ffffaa0c`d425bf30 fffff40c`5af57900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::Lock+0x1a9.
fffff40c`5af57810 fffff805`2bdb8397 : ffffffff`ffffffff fffff40c`5af57a80 00000000`00000001 ffffaa0c`d54c3010 : dxgmms2!VidMmLock+0x9.
fffff40c`5af57840 fffff805`12bd3c15 : 00000000`00001400 ffff858b`45dde080 00000042`a65fcd30 fffff40c`5af57a80 : dxgkrnl!DxgkLock2+0x7f7.
fffff40c`5af57a00 00007ff9`68104f64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000042`a65fcc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`68104f64.

SYMBOL_NAME: dxgmms2!FastZeroMemory+5e.

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys.

IMAGE_VERSION: 10.0.18362.1061.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 5e.

FAILURE_BUCKET_ID: AV_dxgmms2!FastZeroMemory.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {959047b1-e0a3-f6f1-368c-9f58687231a6}

Followup: MachineOwner.
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80717c125b7, Address of the instruction which caused the bugcheck.
Arg3: fffffd8e5f3f6030, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80717c125b7.

BUGCHECK_P3: fffffd8e5f3f6030.

BUGCHECK_P4: 0.

CONTEXT: fffffd8e5f3f6030 -- (.cxr 0xfffffd8e5f3f6030)
rax=ffffdd07c8657000 rbx=0000000000010000 rcx=ffff5d07cf543e3a.
rdx=0000000000000000 rsi=ffffdd07cf543dc0 rdi=0000000000000000.
rip=fffff80717c125b7 rsp=fffffd8e5f3f6a20 rbp=0000000000000000.
r8=ffffdd07cf543dc0 r9=0000000000000045 r10=0000000000000000.
r11=000000000000000b r12=0000000000000016 r13=0000000000000000.
r14=fffffd8e5f3f6b90 r15=0000000000000018.
iopl=0 nv up ei ng nz ac po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297.
Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67:
fffff807`17c125b7 440fb70c0a movzx r9d,word ptr [rdx+rcx] ds:002b:ffff5d07`cf543e3a=????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
fffffd8e`5f3f6a20 fffff807`17c05a26 : ffffdd07`cf543dc0 fffffd8e`5f3f6b90 ffffdd07`d2c6ca58 fffff807`11ca1d3d : Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67.
fffffd8e`5f3f6a70 fffff807`17cff0fb : ffffdd07`d2c6c7c0 ffffdd07`d2c6c7c0 fffffd8e`5f3f6db0 ffffdd07`d2c6c660 : Ntfs!FsLibLookupFirstMatchingElementGenericTableAvl+0x46.
fffffd8e`5f3f6aa0 fffff807`17d03f23 : fffffd8e`5f3f6f80 ffffdd07`d2c6c660 fffffd8e`5f3f6d98 fffffd8e`5f3f7001 : Ntfs!NtfsFindPrefix+0x17b.
fffffd8e`5f3f6c00 fffff807`17d04ae8 : ffffcc8a`1a091058 ffffcc8a`1a96eb10 ffffcc8a`1a96eb10 fffffd8e`5f3f6e08 : Ntfs!NtfsFindStartingNode+0x4b3.
fffffd8e`5f3f6cc0 fffff807`17d07ebe : ffffcc8a`1a091058 fffffd8e`5f3f6f80 ffffcc8a`1a091058 ffffcc8a`1a96eb10 : Ntfs!NtfsCommonCreate+0x478.
fffffd8e`5f3f6eb0 fffff807`11c99ed9 : ffffcc8a`1406e030 ffffcc8a`1a96eb10 ffffcc8a`0be07700 ffffcc8a`1405b090 : Ntfs!NtfsFsdCreate+0x1fe.
fffffd8e`5f3f70e0 fffff807`165355de : ffffcc8a`1a96eb10 ffffcc8a`1a96ef00 ffffcc8a`1a96eb10 ffffcc8a`1c461670 : nt!IofCallDriver+0x59.
fffffd8e`5f3f7120 fffff807`1656cd27 : fffffd8e`5f3f71e0 fffff807`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e.
fffffd8e`5f3f71a0 fffff807`11c99ed9 : ffffcc8a`1c461600 fffff807`12204345 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x307.
fffffd8e`5f3f7250 fffff807`11c98f94 : 00000000`00000000 00000000`00000000 ffffcc8a`1a96ef40 ffffcc8a`1a96eb10 : nt!IofCallDriver+0x59.
fffffd8e`5f3f7290 fffff807`12204a1b : fffffd8e`5f3f7550 fffff807`12204345 fffffd8e`5f3f74c0 fffffd8e`5f3f77a0 : nt!IoCallDriverWithTracing+0x34.
fffffd8e`5f3f72e0 fffff807`1220b9ef : ffffcc8a`13e0d8f0 ffffcc8a`13e0d845 ffffcc8a`1a8294b0 00000000`00000001 : nt!IopParseDevice+0x62b.
fffffd8e`5f3f7450 fffff807`12209e51 : ffffcc8a`1a829400 fffffd8e`5f3f7698 00000000`00000040 ffffcc8a`0a8f8560 : nt!ObpLookupObjectName+0x78f.
fffffd8e`5f3f7610 fffff807`12250ac4 : ffffcc8a`00000001 00000058`4b7fed20 00000000`00000028 00000058`4b7fecf0 : nt!ObOpenObjectByNameEx+0x201.
fffffd8e`5f3f7750 fffff807`11dd3c15 : ffffcc8a`00000000 00000058`00000001 ffffcc8a`1b1f4080 fffffd8e`5f3f7a80 : nt!NtQueryFullAttributesFile+0x1b4.
fffffd8e`5f3f7a00 00007ffd`aeabe864 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000058`4b7fec98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`aeabe864.

SYMBOL_NAME: Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+67.

MODULE_NAME: Ntfs.

IMAGE_NAME: Ntfs.sys.

IMAGE_VERSION: 10.0.18362.719.

STACK_COMMAND: .cxr 0xfffffd8e5f3f6030 ; kb.

BUCKET_ID_FUNC_OFFSET: 67.

FAILURE_BUCKET_ID: 0x3B_c0000005_Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {643b1572-10af-990e-3668-d5620c6d9754}

Followup: MachineOwner.
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb6467b8d7960, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80786482140, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 3.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 3.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffb6467b8d7960.

BUGCHECK_P2: 2.

BUGCHECK_P3: fffff80786482140.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff807819733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffb6467b8d7960.

MM_INTERNAL_CODE: 2.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: sppsvc.exe.

TRAP_FRAME: fffff60a49496f50 -- (.trap 0xfffff60a49496f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff807864880e0 rbx=0000000000000000 rcx=0000000000000023.
rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80786482140 rsp=fffff60a494970e8 rbp=0000000009733c1f.
r8=00000000aeee2865 r9=0000000066653d16 r10=00000000061a9eeb.
r11=0000000000bad64d r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
CI!Gv52a045+0x80:
fffff807`86482140 488904c7 mov qword ptr [rdi+rax*8],rax ds:ffffc03c`32440700=????????????????
Resetting default scope.

STACK_TEXT:
fffff60a`49496ca8 fffff807`815ecf0a : 00000000`00000050 ffffb646`7b8d7960 00000000`00000002 fffff60a`49496f50 : nt!KeBugCheckEx.
fffff60a`49496cb0 fffff807`8145875f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffb646`7b8d7960 : nt!MiSystemFault+0x1c5aaa.
fffff60a`49496db0 fffff807`815d041e : 00000000`00000000 00000000`00000000 00000000`00000001 ffff9e82`dd5cb7b0 : nt!MmAccessFault+0x34f.
fffff60a`49496f50 fffff807`86482140 : fffff807`864846bc fffff60a`49497110 fffff60a`49497250 00000000`00000000 : nt!KiPageFault+0x35e.
fffff60a`494970e8 fffff807`864846bc : fffff60a`49497110 fffff60a`49497250 00000000`00000000 e845998b`9733c1f0 : CI!Gv52a045+0x80.
fffff60a`494970f0 fffff807`864704b9 : 00000000`00000000 00000000`000027bb 00000000`00000005 00000000`00000000 : CI!Gvb3afc4+0x138.
fffff60a`49497450 fffff807`863d903f : c11b999c`187b4d0e 00000000`00000005 00000000`00000000 00000000`000027bb : CI!peauthvbn_StoreParameter+0x3d.
fffff60a`494974a0 fffff807`8644523b : 00000000`00000000 00000000`00000000 ffff808e`000112f0 ffff808e`000112f0 : CI!PEAuthStoreParameter+0x5f.
fffff60a`494974d0 fffff807`86445504 : 00000000`00001658 fffff60a`494975a9 ffff9e82`dd59bec0 ffff9e82`eb756080 : CI!I_PEUpdatePEHashBucket+0x157.
fffff60a`49497510 fffff807`819d1f48 : 00000000`00000000 00000000`00000000 00000000`0000ff00 ffff9e82`e9c4ac80 : CI!I_PEProcessNotify+0x34.
fffff60a`49497540 fffff807`81a30308 : ffff9e82`eb756000 ffff9e82`eb756080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x254.
fffff60a`49497610 fffff807`81a2662f : ffff9e82`eb753688 00000000`00000000 fffff60a`494977e9 00000000`00000000 : nt!PspExitProcess+0x70.
fffff60a`49497640 fffff807`81a23f23 : 00000000`00000000 a76c3505`612fbb01 0000007f`c2b54000 ffffc881`2a240180 : nt!PspExitThread+0x5c7.
fffff60a`49497750 fffff807`814a6441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33.
fffff60a`49497790 fffff807`815c6920 : ffffc881`2a240101 fffff60a`49497850 00000000`40b7fc89 00000000`00000000 : nt!KiDeliverApc+0x481.
fffff60a`49497850 fffff807`815d3cbf : 00000000`00000000 ffff9e82`da87d6c0 ffff9e82`eb753080 0000007f`c2eff578 : nt!KiInitiateUserApc+0x70.
fffff60a`49497990 00007ffe`8347cbc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
0000007f`c2eff558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8347cbc4.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !CI.
fffff80786482143 - CI!Gv52a045+83.
[ cf:c7 ]
1 error : !CI (fffff80786482143)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

MEMORY_CORRUPTOR: ONE_BIT.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: memory_corruption.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8077724248f, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a.

BUGCHECK_P1: 10.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff8077724248f.

READ_ADDRESS: fffff807777733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000010.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: explorer.exe.

TRAP_FRAME: ffff8d8b9331e8d0 -- (.trap 0xffff8d8b9331e8d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8077724248f rsp=ffff8d8b9331ea60 rbp=ffff8d8b9331ead9.
r8=00000000000000ab r9=00000000000000ab r10=0000000000000001.
r11=ffff8d8b9331eb38 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!MiInsertPageInFreeOrZeroedList+0x19f:
fffff807`7724248f 49034710 add rax,qword ptr [r15+10h] ds:00000000`00000010=????????????????
Resetting default scope.

STACK_TEXT:
ffff8d8b`9331e788 fffff807`773d41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
ffff8d8b`9331e790 fffff807`773d0529 : 00000000`00000000 00000000`000000ff fffff807`77668c07 ffffef00`004a1cf0 : nt!KiBugCheckDispatch+0x69.
ffff8d8b`9331e8d0 fffff807`7724248f : 00000000`00000000 fffff807`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469.
ffff8d8b`9331ea60 fffff807`7723ece2 : 00000000`00018bab ffffef00`004a3028 ffffef00`00000000 ffffa20b`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f.
ffff8d8b`9331eb40 fffff807`77269b69 : 00000000`00000010 00000000`00000002 00000000`00000000 fffff807`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372.
ffff8d8b`9331ed60 fffff807`7726995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199.
ffff8d8b`9331ee40 fffff807`7725dde6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetFreeOrZeroPageAnyColor+0x62.
ffff8d8b`9331ee80 fffff807`772b549c : fffff807`7766a440 0a000000`000000aa fffff807`7766a440 ffffef00`00000000 : nt!MiGetPage+0x346.
ffff8d8b`9331ef60 fffff807`772b7771 : ffffb789`b9a7c010 ffffb789`c9ce89a0 00000000`00000000 00000000`00000000 : nt!MiMakePageAvoidRead+0x18c.
ffff8d8b`9331f130 fffff807`772b6b2b : ffffa20b`18fa4000 00000000`06b09040 ffff8d8b`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x281.
ffff8d8b`9331f210 fffff807`772b8905 : ffffb789`c9ce89a0 00000000`06b09040 ffff8d8b`9331f3f0 00000000`00080000 : nt!CcMapAndCopyInToCache+0x5fb.
ffff8d8b`9331f390 fffff807`7a6d9136 : ffffc98c`c8ef1840 00000000`00000000 ffffc98c`c8ef1840 ffffc98c`00100000 : nt!CcCopyWriteEx+0x105.
ffff8d8b`9331f410 fffff807`78f35f78 : 00000000`00000000 00000000`000002c0 ffffb789`cb20c5d0 00000000`00000000 : Ntfs!NtfsCopyWriteA+0x456.
ffff8d8b`9331f720 fffff807`78f32fa3 : ffff8d8b`9331f810 00000000`00000000 00000000`00000000 ffffb789`c9191460 : FLTMGR!FltpPerformFastIoCall+0x198.
ffff8d8b`9331f780 fffff807`78f6c5d5 : b789c8cc`56b0f26f 00000000`001f0003 00000000`00000000 ffffb789`cb20c5d0 : FLTMGR!FltpPassThroughFastIo+0xd3.
ffff8d8b`9331f7e0 fffff807`778c9708 : ffffb789`cb20c5d0 00000000`0ebec460 00000000`0ebec460 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165.
ffff8d8b`9331f890 fffff807`773d3c15 : 00000000`00000000 00000000`0000156c 00000000`00000000 00000000`145231f0 : nt!NtWriteFile+0x458.
ffff8d8b`9331f990 00007ffe`2475c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000000`0ebec3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2475c174.

SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+19f.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.18362.959.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: memory_corruption.

BUCKET_ID_FUNC_OFFSET: 19f.

FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}

Followup: MachineOwner.
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff9bffcac1590.
Arg3: 0200000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: fffff9bffcac1590.

BUGCHECK_P3: 200000000000000.

BUGCHECK_P4: 0.

MEMORY_CORRUPTOR: ONE_BIT.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
fffffd89`24bb9a68 fffff806`5460f55a : 00000000`0000001a 00000000`00041792 fffff9bf`fcac1590 02000000`00000000 : nt!KeBugCheckEx.
fffffd89`24bb9a70 fffff806`544732b7 : 00000000`00000000 fffff9bf`fcac1590 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a4aa.
fffffd89`24bb9b80 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`dffe5608 00000000`00000000 0a000002`549a2867 : nt!MiWalkPageTablesRecursively+0x1e7.
fffffd89`24bb9c40 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe6fff28 00000000`00000000 0a000002`544de867 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9d00 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe7f37f8 fffff9fc`00000000 8a000002`54578867 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9dc0 fffff806`54472efc : fffffd89`24bb9fd0 fffff9fc`fe7f3f98 fffffd89`00000000 fffffd89`24bb9f49 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9e80 fffff806`54471368 : fffffd89`24bb9fd0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c.
fffffd89`24bb9f80 fffff806`5447f4c0 : ffffffff`ffffffff ffff8306`c73443f8 fffffd89`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268.
fffffd89`24bba320 fffff806`549ce76d : ffff8306`c7839080 ffff8306`c7839080 ffff8306`c7038da0 ffff8306`c73443f0 : nt!MiDeleteVad+0x860.
fffffd89`24bba4e0 fffff806`549dd4a0 : ffff8306`c7038da0 ffff8306`c470ed60 ffff8306`c7839080 00000000`00000000 : nt!MiUnmapVad+0x49.
fffffd89`24bba510 fffff806`549dca0f : ffff8306`c8abcca0 ffff8306`c8abcca0 ffff8306`c7344080 fffff806`5486a440 : nt!MiCleanVad+0x30.
fffffd89`24bba540 fffff806`54a6d6b9 : ffffffff`00000000 ffffffff`ffffffff fffffd89`24bba701 ffff8306`c7344080 : nt!MmCleanProcessAddressSpace+0x137.
fffffd89`24bba5c0 fffff806`54a26673 : ffff8306`c7344080 ffffdb85`0ed9c060 fffffd89`24bba7e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139.
fffffd89`24bba640 fffff806`54a23f23 : ffff8306`00000000 00000000`00000001 00000050`8e7ba000 00000050`90fff920 : nt!PspExitThread+0x60b.
fffffd89`24bba750 fffff806`544a6441 : fffffd89`24bba940 00000050`90fff868 fffffd89`24bba968 fffff806`544a7000 : nt!KiSchedulerApcTerminate+0x33.
fffffd89`24bba790 fffff806`545c6920 : 00000050`90fff901 fffffd89`24bba850 00000000`000001f8 fffffd89`00000000 : nt!KiDeliverApc+0x481.
fffffd89`24bba850 fffff806`545d3cbf : ffff8306`c7839080 00000050`90fff848 fffffd89`24bba9a8 ffffdb85`0f114c40 : nt!KiInitiateUserApc+0x70.
fffffd89`24bba990 00007ff9`95efc194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
00000050`90fff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`95efc194.

SYMBOL_NAME: ONE_BIT.

MODULE_NAME: hardware.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner.
---------

RAM arızası gibi duruyor, Memtest86 ile bellek testi yapın.

 
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000011, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80512a4248f, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 82.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a.

BUGCHECK_P1: 11.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff80512a4248f.

READ_ADDRESS: fffff80512f733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff80512e2a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000011.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

TRAP_FRAME: fffff40c5af57480 -- (.trap 0xfffff40c5af57480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000c0 rbx=0000000000000000 rcx=fffff78000000274.
rdx=00000000000e4000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8052ce8cbde rsp=fffff40c5af57610 rbp=00000000000e4000.
r8=ffffaa0cda4a9d00 r9=fffff40c5af57910 r10=fffff80512b25240.
r11=fffff40c5af57808 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po cy.
dxgmms2!FastZeroMemory+0x5e:
fffff805`2ce8cbde 660fe703 movntdq xmmword ptr [rbx],xmm0 ds:00000000`00000000=????????????????????????????????
Resetting default scope.

STACK_TEXT:
fffff40c`5af565b8 fffff805`12bd41e9 : 00000000`0000000a 00000000`00000011 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff40c`5af565c0 fffff805`12bd0529 : fffff40c`5af567c0 00000000`00000020 00000000`00000020 fffff805`2e4d50ea : nt!KiBugCheckDispatch+0x69.
fffff40c`5af56700 fffff805`12a4248f : ffff858b`45dde080 fffff805`00054009 000000d2`a5709130 000000d3`10ba6330 : nt!KiPageFault+0x469.
fffff40c`5af56890 fffff805`12a3ece2 : 00000000`00303238 ffffbd00`09096a98 fffff40c`00000000 ff030000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f.
fffff40c`5af56970 fffff805`12a69b69 : fffffae1`00000010 000646c8`00000002 00000000`00000000 000646c8`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372.
fffff40c`5af56b90 fffff805`12a6995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199.
fffff40c`5af56c70 fffff805`12a5dde6 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000001 : nt!MiGetFreeOrZeroPageAnyColor+0x62.
fffff40c`5af56cb0 fffff805`12a5d4e1 : fffff805`12e6a440 ffff858b`00000093 00000000`00000093 00000000`00000000 : nt!MiGetPage+0x346.
fffff40c`5af56d90 fffff805`12a5b20a : fffff40c`5af57100 00000000`00000000 00000000`00000001 00000000`00000011 : nt!MiGetPageChain+0x181.
fffff40c`5af56f80 fffff805`12a5ace8 : ffffaa0c`da19cb30 fffff40c`00000000 ffff858b`4596fb10 00000000`00000001 : nt!MiResolvePrivateZeroFault+0x14a.
fffff40c`5af570a0 fffff805`12a5a5b2 : fffffafd`40558db0 00000000`00000000 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x218.
fffff40c`5af57190 fffff805`12a58579 : 00000000`00000111 00000000`00000004 00000000`c0000016 ffffc280`62ac6101 : nt!MiDispatchFault+0x982.
fffff40c`5af572e0 fffff805`12bd041e : ffff858b`45dde460 fffff805`12acebf8 fffff40c`5af57910 fffff805`12aa19c9 : nt!MmAccessFault+0x169.
fffff40c`5af57480 fffff805`2ce8cbde : fffff40c`5af579b0 00000000`00000000 00000000`04000000 00000000`00000000 : nt!KiPageFault+0x35e.
fffff40c`5af57610 fffff805`2ce8cb28 : ffffaa0c`d9de6910 ffffaa0c`d4331560 ffff858b`4596fb10 fffff40c`5af57650 : dxgmms2!FastZeroMemory+0x5e.
fffff40c`5af57660 fffff805`2ce79b5c : ffff858b`45edec00 00000000`00000000 00000000`00000000 ffff858b`45edec90 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::ZeroMultirangeMemory+0x88.
fffff40c`5af576d0 fffff805`2ce86979 : ffffaa0c`da19cb30 fffff805`00000000 ffffaa0c`da19cb30 ffff858b`4596fb10 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ZeroIfNeeded+0x17c.
fffff40c`5af57750 fffff805`2ce133f9 : ffffaa0c`d54c3010 ffffaa0c`d425bf30 fffff40c`5af57900 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::Lock+0x1a9.
fffff40c`5af57810 fffff805`2bdb8397 : ffffffff`ffffffff fffff40c`5af57a80 00000000`00000001 ffffaa0c`d54c3010 : dxgmms2!VidMmLock+0x9.
fffff40c`5af57840 fffff805`12bd3c15 : 00000000`00001400 ffff858b`45dde080 00000042`a65fcd30 fffff40c`5af57a80 : dxgkrnl!DxgkLock2+0x7f7.
fffff40c`5af57a00 00007ff9`68104f64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000042`a65fcc38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`68104f64.

SYMBOL_NAME: dxgmms2!FastZeroMemory+5e.

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys.

IMAGE_VERSION: 10.0.18362.1061.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 5e.

FAILURE_BUCKET_ID: AV_dxgmms2!FastZeroMemory.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {959047b1-e0a3-f6f1-368c-9f58687231a6}

Followup: MachineOwner.
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff80717c125b7, Address of the instruction which caused the bugcheck.
Arg3: fffffd8e5f3f6030, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff80717c125b7.

BUGCHECK_P3: fffffd8e5f3f6030.

BUGCHECK_P4: 0.

CONTEXT: fffffd8e5f3f6030 -- (.cxr 0xfffffd8e5f3f6030)
rax=ffffdd07c8657000 rbx=0000000000010000 rcx=ffff5d07cf543e3a.
rdx=0000000000000000 rsi=ffffdd07cf543dc0 rdi=0000000000000000.
rip=fffff80717c125b7 rsp=fffffd8e5f3f6a20 rbp=0000000000000000.
r8=ffffdd07cf543dc0 r9=0000000000000045 r10=0000000000000000.
r11=000000000000000b r12=0000000000000016 r13=0000000000000000.
r14=fffffd8e5f3f6b90 r15=0000000000000018.
iopl=0 nv up ei ng nz ac po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297.
Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67:
fffff807`17c125b7 440fb70c0a movzx r9d,word ptr [rdx+rcx] ds:002b:ffff5d07`cf543e3a=????
Resetting default scope.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
fffffd8e`5f3f6a20 fffff807`17c05a26 : ffffdd07`cf543dc0 fffffd8e`5f3f6b90 ffffdd07`d2c6ca58 fffff807`11ca1d3d : Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+0x67.
fffffd8e`5f3f6a70 fffff807`17cff0fb : ffffdd07`d2c6c7c0 ffffdd07`d2c6c7c0 fffffd8e`5f3f6db0 ffffdd07`d2c6c660 : Ntfs!FsLibLookupFirstMatchingElementGenericTableAvl+0x46.
fffffd8e`5f3f6aa0 fffff807`17d03f23 : fffffd8e`5f3f6f80 ffffdd07`d2c6c660 fffffd8e`5f3f6d98 fffffd8e`5f3f7001 : Ntfs!NtfsFindPrefix+0x17b.
fffffd8e`5f3f6c00 fffff807`17d04ae8 : ffffcc8a`1a091058 ffffcc8a`1a96eb10 ffffcc8a`1a96eb10 fffffd8e`5f3f6e08 : Ntfs!NtfsFindStartingNode+0x4b3.
fffffd8e`5f3f6cc0 fffff807`17d07ebe : ffffcc8a`1a091058 fffffd8e`5f3f6f80 ffffcc8a`1a091058 ffffcc8a`1a96eb10 : Ntfs!NtfsCommonCreate+0x478.
fffffd8e`5f3f6eb0 fffff807`11c99ed9 : ffffcc8a`1406e030 ffffcc8a`1a96eb10 ffffcc8a`0be07700 ffffcc8a`1405b090 : Ntfs!NtfsFsdCreate+0x1fe.
fffffd8e`5f3f70e0 fffff807`165355de : ffffcc8a`1a96eb10 ffffcc8a`1a96ef00 ffffcc8a`1a96eb10 ffffcc8a`1c461670 : nt!IofCallDriver+0x59.
fffffd8e`5f3f7120 fffff807`1656cd27 : fffffd8e`5f3f71e0 fffff807`00000000 00000020`00000001 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e.
fffffd8e`5f3f71a0 fffff807`11c99ed9 : ffffcc8a`1c461600 fffff807`12204345 00000000`00000000 00000000`00000030 : FLTMGR!FltpCreate+0x307.
fffffd8e`5f3f7250 fffff807`11c98f94 : 00000000`00000000 00000000`00000000 ffffcc8a`1a96ef40 ffffcc8a`1a96eb10 : nt!IofCallDriver+0x59.
fffffd8e`5f3f7290 fffff807`12204a1b : fffffd8e`5f3f7550 fffff807`12204345 fffffd8e`5f3f74c0 fffffd8e`5f3f77a0 : nt!IoCallDriverWithTracing+0x34.
fffffd8e`5f3f72e0 fffff807`1220b9ef : ffffcc8a`13e0d8f0 ffffcc8a`13e0d845 ffffcc8a`1a8294b0 00000000`00000001 : nt!IopParseDevice+0x62b.
fffffd8e`5f3f7450 fffff807`12209e51 : ffffcc8a`1a829400 fffffd8e`5f3f7698 00000000`00000040 ffffcc8a`0a8f8560 : nt!ObpLookupObjectName+0x78f.
fffffd8e`5f3f7610 fffff807`12250ac4 : ffffcc8a`00000001 00000058`4b7fed20 00000000`00000028 00000058`4b7fecf0 : nt!ObOpenObjectByNameEx+0x201.
fffffd8e`5f3f7750 fffff807`11dd3c15 : ffffcc8a`00000000 00000058`00000001 ffffcc8a`1b1f4080 fffffd8e`5f3f7a80 : nt!NtQueryFullAttributesFile+0x1b4.
fffffd8e`5f3f7a00 00007ffd`aeabe864 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000058`4b7fec98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`aeabe864.

SYMBOL_NAME: Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive+67.

MODULE_NAME: Ntfs.

IMAGE_NAME: Ntfs.sys.

IMAGE_VERSION: 10.0.18362.719.

STACK_COMMAND: .cxr 0xfffffd8e5f3f6030 ; kb.

BUCKET_ID_FUNC_OFFSET: 67.

FAILURE_BUCKET_ID: 0x3B_c0000005_Ntfs!NtfsCompareLcbTableEntriesCaseInsensitive.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {643b1572-10af-990e-3668-d5620c6d9754}

Followup: MachineOwner.
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb6467b8d7960, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80786482140, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 3.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 3.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: 50.

BUGCHECK_P1: ffffb6467b8d7960.

BUGCHECK_P2: 2.

BUGCHECK_P3: fffff80786482140.

BUGCHECK_P4: 2.

READ_ADDRESS: fffff807819733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8078182a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffb6467b8d7960.

MM_INTERNAL_CODE: 2.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: sppsvc.exe.

TRAP_FRAME: fffff60a49496f50 -- (.trap 0xfffff60a49496f50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff807864880e0 rbx=0000000000000000 rcx=0000000000000023.
rdx=0000000000000034 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80786482140 rsp=fffff60a494970e8 rbp=0000000009733c1f.
r8=00000000aeee2865 r9=0000000066653d16 r10=00000000061a9eeb.
r11=0000000000bad64d r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na pe nc.
CI!Gv52a045+0x80:
fffff807`86482140 488904c7 mov qword ptr [rdi+rax*8],rax ds:ffffc03c`32440700=????????????????
Resetting default scope.

STACK_TEXT:
fffff60a`49496ca8 fffff807`815ecf0a : 00000000`00000050 ffffb646`7b8d7960 00000000`00000002 fffff60a`49496f50 : nt!KeBugCheckEx.
fffff60a`49496cb0 fffff807`8145875f : 00000000`00000000 00000000`00000002 00000000`00000000 ffffb646`7b8d7960 : nt!MiSystemFault+0x1c5aaa.
fffff60a`49496db0 fffff807`815d041e : 00000000`00000000 00000000`00000000 00000000`00000001 ffff9e82`dd5cb7b0 : nt!MmAccessFault+0x34f.
fffff60a`49496f50 fffff807`86482140 : fffff807`864846bc fffff60a`49497110 fffff60a`49497250 00000000`00000000 : nt!KiPageFault+0x35e.
fffff60a`494970e8 fffff807`864846bc : fffff60a`49497110 fffff60a`49497250 00000000`00000000 e845998b`9733c1f0 : CI!Gv52a045+0x80.
fffff60a`494970f0 fffff807`864704b9 : 00000000`00000000 00000000`000027bb 00000000`00000005 00000000`00000000 : CI!Gvb3afc4+0x138.
fffff60a`49497450 fffff807`863d903f : c11b999c`187b4d0e 00000000`00000005 00000000`00000000 00000000`000027bb : CI!peauthvbn_StoreParameter+0x3d.
fffff60a`494974a0 fffff807`8644523b : 00000000`00000000 00000000`00000000 ffff808e`000112f0 ffff808e`000112f0 : CI!PEAuthStoreParameter+0x5f.
fffff60a`494974d0 fffff807`86445504 : 00000000`00001658 fffff60a`494975a9 ffff9e82`dd59bec0 ffff9e82`eb756080 : CI!I_PEUpdatePEHashBucket+0x157.
fffff60a`49497510 fffff807`819d1f48 : 00000000`00000000 00000000`00000000 00000000`0000ff00 ffff9e82`e9c4ac80 : CI!I_PEProcessNotify+0x34.
fffff60a`49497540 fffff807`81a30308 : ffff9e82`eb756000 ffff9e82`eb756080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x254.
fffff60a`49497610 fffff807`81a2662f : ffff9e82`eb753688 00000000`00000000 fffff60a`494977e9 00000000`00000000 : nt!PspExitProcess+0x70.
fffff60a`49497640 fffff807`81a23f23 : 00000000`00000000 a76c3505`612fbb01 0000007f`c2b54000 ffffc881`2a240180 : nt!PspExitThread+0x5c7.
fffff60a`49497750 fffff807`814a6441 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33.
fffff60a`49497790 fffff807`815c6920 : ffffc881`2a240101 fffff60a`49497850 00000000`40b7fc89 00000000`00000000 : nt!KiDeliverApc+0x481.
fffff60a`49497850 fffff807`815d3cbf : 00000000`00000000 ffff9e82`da87d6c0 ffff9e82`eb753080 0000007f`c2eff578 : nt!KiInitiateUserApc+0x70.
fffff60a`49497990 00007ffe`8347cbc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
0000007f`c2eff558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8347cbc4.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !CI.
fffff80786482143 - CI!Gv52a045+83.
[ cf:c7 ]
1 error : !CI (fffff80786482143)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

MEMORY_CORRUPTOR: ONE_BIT.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: memory_corruption.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8077724248f, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 80.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: a.

BUGCHECK_P1: 10.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff8077724248f.

READ_ADDRESS: fffff807777733b8: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock.
fffff8077762a3c8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000010.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: explorer.exe.

TRAP_FRAME: ffff8d8b9331e8d0 -- (.trap 0xffff8d8b9331e8d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8077724248f rsp=ffff8d8b9331ea60 rbp=ffff8d8b9331ead9.
r8=00000000000000ab r9=00000000000000ab r10=0000000000000001.
r11=ffff8d8b9331eb38 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl nz na po nc.
nt!MiInsertPageInFreeOrZeroedList+0x19f:
fffff807`7724248f 49034710 add rax,qword ptr [r15+10h] ds:00000000`00000010=????????????????
Resetting default scope.

STACK_TEXT:
ffff8d8b`9331e788 fffff807`773d41e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
ffff8d8b`9331e790 fffff807`773d0529 : 00000000`00000000 00000000`000000ff fffff807`77668c07 ffffef00`004a1cf0 : nt!KiBugCheckDispatch+0x69.
ffff8d8b`9331e8d0 fffff807`7724248f : 00000000`00000000 fffff807`00000000 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x469.
ffff8d8b`9331ea60 fffff807`7723ece2 : 00000000`00018bab ffffef00`004a3028 ffffef00`00000000 ffffa20b`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x19f.
ffff8d8b`9331eb40 fffff807`77269b69 : 00000000`00000010 00000000`00000002 00000000`00000000 fffff807`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x372.
ffff8d8b`9331ed60 fffff807`7726995e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDemoteLocalLargePage+0x199.
ffff8d8b`9331ee40 fffff807`7725dde6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiGetFreeOrZeroPageAnyColor+0x62.
ffff8d8b`9331ee80 fffff807`772b549c : fffff807`7766a440 0a000000`000000aa fffff807`7766a440 ffffef00`00000000 : nt!MiGetPage+0x346.
ffff8d8b`9331ef60 fffff807`772b7771 : ffffb789`b9a7c010 ffffb789`c9ce89a0 00000000`00000000 00000000`00000000 : nt!MiMakePageAvoidRead+0x18c.
ffff8d8b`9331f130 fffff807`772b6b2b : ffffa20b`18fa4000 00000000`06b09040 ffff8d8b`00000000 00000000`00001000 : nt!MmCopyToCachedPage+0x281.
ffff8d8b`9331f210 fffff807`772b8905 : ffffb789`c9ce89a0 00000000`06b09040 ffff8d8b`9331f3f0 00000000`00080000 : nt!CcMapAndCopyInToCache+0x5fb.
ffff8d8b`9331f390 fffff807`7a6d9136 : ffffc98c`c8ef1840 00000000`00000000 ffffc98c`c8ef1840 ffffc98c`00100000 : nt!CcCopyWriteEx+0x105.
ffff8d8b`9331f410 fffff807`78f35f78 : 00000000`00000000 00000000`000002c0 ffffb789`cb20c5d0 00000000`00000000 : Ntfs!NtfsCopyWriteA+0x456.
ffff8d8b`9331f720 fffff807`78f32fa3 : ffff8d8b`9331f810 00000000`00000000 00000000`00000000 ffffb789`c9191460 : FLTMGR!FltpPerformFastIoCall+0x198.
ffff8d8b`9331f780 fffff807`78f6c5d5 : b789c8cc`56b0f26f 00000000`001f0003 00000000`00000000 ffffb789`cb20c5d0 : FLTMGR!FltpPassThroughFastIo+0xd3.
ffff8d8b`9331f7e0 fffff807`778c9708 : ffffb789`cb20c5d0 00000000`0ebec460 00000000`0ebec460 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165.
ffff8d8b`9331f890 fffff807`773d3c15 : 00000000`00000000 00000000`0000156c 00000000`00000000 00000000`145231f0 : nt!NtWriteFile+0x458.
ffff8d8b`9331f990 00007ffe`2475c174 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25.
00000000`0ebec3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2475c174.

SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+19f.

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.18362.959.

STACK_COMMAND: .thread ; .cxr ; kb.

IMAGE_NAME: memory_corruption.

BUCKET_ID_FUNC_OFFSET: 19f.

FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}

Followup: MachineOwner.
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff9bffcac1590.
Arg3: 0200000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 2.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 2.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: fffff9bffcac1590.

BUGCHECK_P3: 200000000000000.

BUGCHECK_P4: 0.

MEMORY_CORRUPTOR: ONE_BIT.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: chrome.exe.

STACK_TEXT:
fffffd89`24bb9a68 fffff806`5460f55a : 00000000`0000001a 00000000`00041792 fffff9bf`fcac1590 02000000`00000000 : nt!KeBugCheckEx.
fffffd89`24bb9a70 fffff806`544732b7 : 00000000`00000000 fffff9bf`fcac1590 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a4aa.
fffffd89`24bb9b80 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`dffe5608 00000000`00000000 0a000002`549a2867 : nt!MiWalkPageTablesRecursively+0x1e7.
fffffd89`24bb9c40 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe6fff28 00000000`00000000 0a000002`544de867 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9d00 fffff806`54473771 : fffffd89`24bb9fd0 fffff9fc`fe7f37f8 fffff9fc`00000000 8a000002`54578867 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9dc0 fffff806`54472efc : fffffd89`24bb9fd0 fffff9fc`fe7f3f98 fffffd89`00000000 fffffd89`24bb9f49 : nt!MiWalkPageTablesRecursively+0x6a1.
fffffd89`24bb9e80 fffff806`54471368 : fffffd89`24bb9fd0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c.
fffffd89`24bb9f80 fffff806`5447f4c0 : ffffffff`ffffffff ffff8306`c73443f8 fffffd89`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268.
fffffd89`24bba320 fffff806`549ce76d : ffff8306`c7839080 ffff8306`c7839080 ffff8306`c7038da0 ffff8306`c73443f0 : nt!MiDeleteVad+0x860.
fffffd89`24bba4e0 fffff806`549dd4a0 : ffff8306`c7038da0 ffff8306`c470ed60 ffff8306`c7839080 00000000`00000000 : nt!MiUnmapVad+0x49.
fffffd89`24bba510 fffff806`549dca0f : ffff8306`c8abcca0 ffff8306`c8abcca0 ffff8306`c7344080 fffff806`5486a440 : nt!MiCleanVad+0x30.
fffffd89`24bba540 fffff806`54a6d6b9 : ffffffff`00000000 ffffffff`ffffffff fffffd89`24bba701 ffff8306`c7344080 : nt!MmCleanProcessAddressSpace+0x137.
fffffd89`24bba5c0 fffff806`54a26673 : ffff8306`c7344080 ffffdb85`0ed9c060 fffffd89`24bba7e9 00000000`00000000 : nt!PspRundownSingleProcess+0x139.
fffffd89`24bba640 fffff806`54a23f23 : ffff8306`00000000 00000000`00000001 00000050`8e7ba000 00000050`90fff920 : nt!PspExitThread+0x60b.
fffffd89`24bba750 fffff806`544a6441 : fffffd89`24bba940 00000050`90fff868 fffffd89`24bba968 fffff806`544a7000 : nt!KiSchedulerApcTerminate+0x33.
fffffd89`24bba790 fffff806`545c6920 : 00000050`90fff901 fffffd89`24bba850 00000000`000001f8 fffffd89`00000000 : nt!KiDeliverApc+0x481.
fffffd89`24bba850 fffff806`545d3cbf : ffff8306`c7839080 00000050`90fff848 fffffd89`24bba9a8 ffffdb85`0f114c40 : nt!KiInitiateUserApc+0x70.
fffffd89`24bba990 00007ff9`95efc194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f.
00000050`90fff828 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`95efc194.

SYMBOL_NAME: ONE_BIT.

MODULE_NAME: hardware.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner.
---------

RAM arızası gibi duruyor, Memtest86 ile bellek testi yapın.


Test yaptım ve sorun yok dedi.
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı