MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffffbc3efa6a1000
Arg3: 0000000000000009
Arg4: fffff88928a96ca0
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_61941
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: ShellExperienc
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: fffff88928a96ca0 -- (.trap 0xfffff88928a96ca0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc3fffffff01 rbx=0000000000000000 rcx=fffff88928a97410
rdx=ffffbc3efa6a1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046ee74406 rsp=fffff88928a96e30 rbp=ffffd7894a3109c0
r8=0000000000000000 r9=ffffbc5e2f0fbe98 r10=ffffbc5e2f178fff
r11=fffff88928a96f00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiComputePxeWalkAction+0x6:
fffff804`6ee74406 4c8b0a mov r9,qword ptr [rdx] ds:ffffbc3e`fa6a1000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8046f0020ee to fffff8046efc2990
STACK_TEXT:
fffff889`28a96af8 fffff804`6f0020ee : 00000000`0000001a 00000000`00061941 ffffbc3e`fa6a1000 00000000`00000009 : nt!KeBugCheckEx
fffff889`28a96b00 fffff804`6efd0a5e : 00000000`00000000 fffff804`6ee53975 ffffd789`4aa1d9c0 00000000`00000001 : nt!MmAccessFault+0x1a9b9e
fffff889`28a96ca0 fffff804`6ee74406 : ffffd7ea`c3721292 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KiPageFault+0x35e
fffff889`28a96e30 fffff804`6ee73320 : 00000000`00000000 fffff889`28a97410 ffffd789`4a3109c0 fffff804`6ee15fcd : nt!MiComputePxeWalkAction+0x6
fffff889`28a96e70 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`1f7d3508 : nt!MiWalkPageTablesRecursively+0x110
fffff889`28a96f30 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`2f0fbe98 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a96ff0 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`2f1787d8 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a970b0 fffff804`6ee7303c : fffff889`28a97410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a97170 fffff804`6ee72ac7 : fffff889`28a97410 fffff889`00000002 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff889`28a97270 fffff804`6ee72237 : ffffd789`49af4080 00000000`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
fffff889`28a97790 fffff804`6ee71b1a : ffffd789`4a3109c0 fffff889`28a97a50 00000000`00000000 00000000`000030d8 : nt!MiTrimOrAgeWorkingSet+0x3e7
fffff889`28a97880 fffff804`6ee70230 : fffff804`00000002 fffff804`00000000 fffff804`6f268340 ffffd789`3fa43530 : nt!MiProcessWorkingSets+0x1fa
fffff889`28a97a30 fffff804`6f0c99f6 : fffff804`6f373ac0 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
fffff889`28a97af0 fffff804`6ef8ccb5 : 00000000`00000004 00000000`ffffffff 00000000`00000001 00000000`000000a0 : nt!MmWorkingSetManager+0x12
fffff889`28a97b20 fffff804`6ef1e235 : ffffd789`3fae0080 00000000`00000080 fffff804`6ef8cb60 f86d6584`55f2add4 : nt!KeBalanceSetManager+0x155
fffff889`28a97c10 fffff804`6efc9f98 : fffff804`6d200180 ffffd789`3fae0080 fffff804`6ef1e1e0 a9b31472`6939c846 : nt!PspSystemThreadStartup+0x55
fffff889`28a97c60 00000000`00000000 : fffff889`28a98000 fffff889`28a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffd1837b6976a9-ffffd1837b6976ae 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
[ ff 15 01 e1 19 00:e8 f2 db 20 00 90 ]
ffffd1837b697729-ffffd1837b69772a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x80)
[ 48 ff:4c 8b ]
ffffd1837b697730-ffffd1837b697733 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
[ 0f 1f 44 00:e8 eb dc 20 ]
12 errors : !win32kbase (ffffd1837b6976a9-ffffd1837b697733)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff012c38a9000
Arg3: 0000000200000000
Arg4: 0000000000000000
Debugging Details:
------------------
MEMORY_CORRUPTOR: LARGE
BUGCHECK_STR: 0x1a_41792
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
STACK_TEXT:
fffff104`37bbec08 fffff807`14c0fb1a : 00000000`0000001a 00000000`00041792 fffff012`c38a9000 00000002`00000000 : nt!KeBugCheckEx
fffff104`37bbec10 fffff807`14a733f7 : ffffbc81`bda2d580 fffff012`c38a9000 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a92a
fffff104`37bbed20 fffff807`14a738b1 : fffff104`37bbf170 fffff078`0961c548 00000000`00000000 0a000000`6c0d6867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff104`37bbede0 fffff807`14a738b1 : fffff104`37bbf170 fffff078`3c04b0e0 00000000`00000000 0a000000`032d5867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbeea0 fffff807`14a738b1 : fffff104`37bbf170 fffff078`3c1e0258 fffff078`00000000 8a000001`799d4867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbef60 fffff807`14a7303c : fffff104`37bbf170 fffff078`3c12a408 fffff078`00000000 ffffbc81`bda2d580 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbf020 fffff807`14a714a8 : fffff104`37bbf170 00000000`00000002 ffffbc81`00000001 fffff807`00000000 : nt!MiWalkPageTables+0x36c
fffff104`37bbf120 fffff807`14a7f600 : ffffffff`ffffffff ffffbc81`bda2d3f8 ffffbc81`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff104`37bbf4c0 fffff807`14fdb8bd : ffffbc81`bfb7f2c0 00000000`00000000 ffffbc81`bddd9830 ffffbc81`bfb7f2c0 : nt!MiDeleteVad+0x860
fffff104`37bbf680 fffff807`14fdae0f : ffffbc81`bf7e53a0 ffffbc81`bf7e53a0 ffffbc81`bda2d080 fffff807`14e68340 : nt!MiCleanVad+0x4d
fffff104`37bbf6b0 fffff807`1506ba69 : ffffffff`00000000 ffffffff`ffffffff fffff104`37bbf901 ffffbc81`bda2d080 : nt!MmCleanProcessAddressSpace+0x137
fffff104`37bbf730 fffff807`15024a23 : ffffbc81`bda2d080 ffffac00`5ee240a0 fffff104`37bbf959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffff104`37bbf7b0 fffff807`150222d3 : 00000000`c0000005 ffffbc81`bfb7f201 00000097`44222000 00000000`0000000f : nt!PspExitThread+0x60b
fffff104`37bbf8c0 fffff807`14aa6321 : ffffbc81`bfb7f3c0 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33
fffff104`37bbf900 fffff807`14bc6ef0 : ffffbc81`bfb7f201 fffff104`37bbf9c0 ffffbc81`bfb7f2c0 ffff9680`00000000 : nt!KiDeliverApc+0x481
fffff104`37bbf9c0 fffff807`14bd42ff : ffffbc81`bfb7f2c0 00000000`00000000 00000000`00000000 fffff104`37bbfb80 : nt!KiInitiateUserApc+0x70
fffff104`37bbfb00 00007ffe`ec05f9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000097`4abff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ec05f9a4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80714a5a0f3-fffff80714a5a0f7 5 bytes - nt!MiDispatchFault+383
[ d7 be 7d fb f6:07 1e 3c 78 f0 ]
fffff80714a5a0fd-fffff80714a5a101 5 bytes - nt!MiDispatchFault+38d (+0x0a)
[ df be 7d fb f6:0f 1e 3c 78 f0 ]
fffff80714a5a107-fffff80714a5a10b 5 bytes - nt!MiDispatchFault+397 (+0x0a)
[ d0 be 7d fb f6:00 1e 3c 78 f0 ]
fffff80714a5a110-fffff80714a5a115 6 bytes - nt!MiDispatchFault+3a0 (+0x09)
[ 68 df be 7d fb f6:00 0f 1e 3c 78 f0 ]
fffff80714a5bdac-fffff80714a5bdb0 5 bytes - nt!MiCompletePrivateZeroFault+6ac (+0x1c9c)
[ d0 be 7d fb f6:00 1e 3c 78 f0 ]
fffff80714a5bdcd-fffff80714a5bdce 2 bytes - nt!MiCompletePrivateZeroFault+6cd (+0x21)
[ 80 f6:00 f0 ]
fffff80714a5bdec - nt!MiCompletePrivateZeroFault+6ec (+0x1f)
[ fa:a8 ]
fffff80714a73075-fffff80714a73076 2 bytes - nt!MiWalkPageTables+3a5 (+0x17289)
[ 80 f6:00 f0 ]
fffff80714a730f0-fffff80714a730f1 2 bytes - nt!MiWalkPageTables+420 (+0x7b)
[ 00 f7:80 f0 ]
fffff80714a73434-fffff80714a73435 2 bytes - nt!MiWalkPageTablesRecursively+224 (+0x344)
[ 80 f6:00 f0 ]
fffff80714a738df-fffff80714a738e3 5 bytes - nt!MiWalkPageTablesRecursively+6cf (+0x4ab)
[ d7 be 7d fb f6:07 1e 3c 78 f0 ]
fffff80714a7392a-fffff80714a7392b 2 bytes - nt!MiWalkPageTablesRecursively+71a (+0x4b)
[ 80 f6:00 f0 ]
fffff80714a7395e-fffff80714a73963 6 bytes - nt!MiWalkPageTablesRecursively+74e (+0x34)
[ 68 df be 7d fb f6:00 0f 1e 3c 78 f0 ]
fffff80714a7397d-fffff80714a73981 5 bytes - nt!MiWalkPageTablesRecursively+76d (+0x1f)
[ d0 be 7d fb f6:00 1e 3c 78 f0 ]
fffff80714a7399e-fffff80714a739a2 5 bytes - nt!MiWalkPageTablesRecursively+78e (+0x21)
[ d0 be 7d fb f6:00 1e 3c 78 f0 ]
fffff80714a7521d-fffff80714a75221 5 bytes - nt!MiDeleteVa+2d (+0x187f)
[ d0 be 7d fb f6:00 1e 3c 78 f0 ]
fffff80714a7522d-fffff80714a75231 5 bytes - nt!MiDeleteVa+3d (+0x10)
[ d7 be 7d fb f6:07 1e 3c 78 f0 ]
fffff80714a75284-fffff80714a75285 2 bytes - nt!MiDeleteVa+94 (+0x57)
[ 80 f6:00 f0 ]
fffff80714a752b2-fffff80714a752b4 3 bytes - nt!MiDeleteVa+c2 (+0x2e)
[ 40 fb f6:00 78 f0 ]
fffff80714c0fb72-fffff80714c0fb76 5 bytes - nt!MiDeleteVa+19a982 (+0x19a8c0)
[ df be 7d fb f6:0f 1e 3c 78 f0 ]
fffff80714c0fb8a-fffff80714c0fb8e 5 bytes - nt!MiDeleteVa+19a99a (+0x18)
[ d7 be 7d fb f6:07 1e 3c 78 f0 ]
83 errors : !nt (fffff80714a5a0f3-fffff80714c0fb8e)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8027aeab1e6, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 00000078fffffff8, Parameter 1 of the exception
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
00000078fffffff8
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba
FAULTING_IP:
nt!RtlpHpVsChunkSplit+5a6
fffff802`7aeab1e6 334ff8 xor ecx,dword ptr [rdi-8]
EXCEPTION_PARAMETER2: 00000078fffffff8
BUGCHECK_STR: 0x1E_c0000005_R
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
EXCEPTION_RECORD: ffffba5d2e974000 -- (.exr 0xffffba5d2e974000)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 1653426279
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Parameter[2]: 0000000000000000
Parameter[3]: 0000000000000000
Parameter[4]: 0000000000000000
Parameter[5]: 0000000000000000
Parameter[6]: 0000000000000000
Parameter[7]: 0000000000000000
Parameter[8]: 0000000000000000
Parameter[9]: 0000000000000000
Parameter[10]: 0000000000000000
Parameter[11]: 0000000000000000
Parameter[12]: 0000000000000000
Parameter[13]: 0000000000000000
Parameter[14]: 0000000000000000
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
LAST_CONTROL_TRANSFER: from fffff8027b019d71 to fffff8027afc2990
STACK_TEXT:
ffff9708`85af36f8 fffff802`7b019d71 : 00000000`0000001e ffffffff`c0000005 fffff802`7aeab1e6 00000000`00000000 : nt!KeBugCheckEx
ffff9708`85af3700 fffff802`7afd495d : ffffba5d`2e974000 ffff9708`85af3f90 ffff8000`00000000 00000078`fffffff8 : nt!KiDispatchException+0x18c871
ffff9708`85af3db0 fffff802`7afd0b43 : 00000000`00003000 ffff9708`85af3fd0 ffffd287`f2800290 ffff980c`565089a8 : nt!KiExceptionDispatch+0x11d
ffff9708`85af3f90 fffff802`7aeab1e6 : ffffd288`062dcfe0 ffffd288`062dc430 00000000`00000000 ffffd288`062d8018 : nt!KiPageFault+0x443
ffff9708`85af4120 fffff802`7aeaab49 : ffffd288`062dcfe0 ffffd288`062dafe0 00000000`00000000 00000000`0000cfe0 : nt!RtlpHpVsChunkSplit+0x5a6
ffff9708`85af41f0 fffff802`7ae9a958 : 00000000`00000145 00000000`00001430 00000000`00001430 ffffd287`f2800000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffff9708`85af4260 fffff802`7b16e06d : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00001429 : nt!ExAllocateHeapPool+0x418
ffff9708`85af43a0 fffff802`7b4bc256 : 00000000`00000000 00000000`00009200 ffffd288`06723000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff9708`85af43f0 fffff802`7ae0536b : 00000000`00000000 ffff980c`5a133a10 00000000`00000000 00000000`00000000 : nt!PfSnScenarioAlloc+0x16
ffff9708`85af4420 fffff802`7b3c1b63 : 00000000`00001429 00000000`00000000 ffff9708`85af4510 ffff9708`85af4520 : nt!SmDecompressBuffer+0xcb
ffff9708`85af44c0 fffff802`7b3c3c95 : 00007ffe`e4e80000 00000000`00000003 ffff980c`5393d3a0 fffff802`7aea1c1d : nt!PfSnGetPrefetchInstructions+0x257
ffff9708`85af4600 fffff802`7b3c31b9 : ffff980c`5a56a080 ffff9708`85af4710 ffff9708`00000000 00000000`00000000 : nt!PfSnBeginScenario+0x1f5
ffff9708`85af46a0 fffff802`7b3c3015 : ffff980c`5ae6bdd0 ffff980c`5a56a080 ffff9708`85af4b80 ffff980c`5a56a080 : nt!PfSnBeginAppLaunch+0x169
ffff9708`85af48a0 fffff802`7b3cbeba : fffff802`75ba0180 ffff980c`5ae6bdd0 ffff980c`5393d080 ffff980c`00000000 : nt!PfProcessCreateNotification+0x5d
ffff9708`85af48d0 fffff802`7afca308 : fffff802`75ba0180 ffff980c`5393d080 ffff980c`53823080 00000000`00000000 : nt!PspUserThreadStartup+0x14a
ffff9708`85af49c0 fffff802`7afca270 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28
ffff9708`85af4b00 00007ffe`e4eece30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
000000ee`6d0dff98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e4eece30
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !hal
fffff8027ad5dd03 - hal!HalpApicRequestInterrupt+a3
[ 00:90 ]
fffff8027ad5dd71-fffff8027ad5dd76 6 bytes - hal!HalpApicRequestInterrupt+111 (+0x6e)
[ ff 15 99 7b 07 00:e8 2a 55 3f 00 90 ]
fffff8027ad5f285-fffff8027ad5f286 2 bytes - hal!HalpTimerClockIpiRoutine+15 (+0x1514)
[ 48 ff:4c 8b ]
fffff8027ad5f28c-fffff8027ad5f28f 4 bytes - hal!HalpTimerClockIpiRoutine+1c (+0x07)
[ 0f 1f 44 00:e8 bf 87 0e ]
fffff8027ad5f2e7-fffff8027ad5f2ec 6 bytes - hal!HalpTimerClockIpiRoutine+77 (+0x5b)
[ ff 15 23 66 07 00:e8 b4 3f 3f 00 90 ]
19 errors : !hal (fffff8027ad5dd03-fffff8027ad5f2ec)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff30000292008
Arg3: 0000009400000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41792
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Discord.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff8077dc0fb1a to fffff8077dbc2990
STACK_TEXT:
ffffec86`d6b24c08 fffff807`7dc0fb1a : 00000000`0000001a 00000000`00041792 fffff300`00292008 00000094`00000000 : nt!KeBugCheckEx
ffffec86`d6b24c10 fffff807`7da733f7 : ffffb607`3fc13580 fffff300`00292008 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a92a
ffffec86`d6b24d20 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`80001490 00000000`00000000 0a000000`6c0d4867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffec86`d6b24de0 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`bcc00008 00000000`00000000 0a000000`8f4cf867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b24ea0 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`bcde6000 fffff379`00000000 8a000000`368f0867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b24f60 fffff807`7da7303c : ffffec86`d6b25170 ffffa02d`40000000 ffffa02d`00000000 ffffb607`3fc13580 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b25020 fffff807`7da714a8 : ffffec86`d6b25170 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffec86`d6b25120 fffff807`7da7f600 : ffffffff`ffffffff ffffb607`3fc133f8 ffffb607`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffec86`d6b254c0 fffff807`7dfdb8bd : ffffb607`43721080 00000000`00000000 ffffb607`4888d430 ffffb607`43721080 : nt!MiDeleteVad+0x860
ffffec86`d6b25680 fffff807`7dfdae0f : ffffb607`4888d660 ffffb607`4888d660 ffffb607`3fc13080 fffff807`7de68340 : nt!MiCleanVad+0x4d
ffffec86`d6b256b0 fffff807`7e06ba69 : ffffffff`00000000 ffffffff`ffffffff ffffec86`d6b25901 ffffb607`3fc13080 : nt!MmCleanProcessAddressSpace+0x137
ffffec86`d6b25730 fffff807`7e024a23 : ffffb607`3fc13080 ffffcc83`553760a0 ffffec86`d6b25959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffec86`d6b257b0 fffff807`7e0222d3 : 00000000`c0000005 ffffb607`43721001 00000000`00224000 00000000`0000000f : nt!PspExitThread+0x60b
ffffec86`d6b258c0 fffff807`7daa6321 : ffffb607`43721180 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33
ffffec86`d6b25900 fffff807`7dbc6ef0 : ffffb607`43721001 ffffec86`d6b259c0 ffffb607`43721080 00000000`00000000 : nt!KiDeliverApc+0x481
ffffec86`d6b259c0 fffff807`7dbd42ff : ffffb607`43721080 00000000`00000000 00000000`00000000 ffffb607`45bd6d60 : nt!KiInitiateUserApc+0x70
ffffec86`d6b25b00 00000000`77841cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0e43f1b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77841cbc
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8077da73075-fffff8077da73076 2 bytes - nt!MiWalkPageTables+3a5
[ 80 f6:00 f3 ]
fffff8077da730f0-fffff8077da730f1 2 bytes - nt!MiWalkPageTables+420 (+0x7b)
[ 00 f7:80 f3 ]
fffff8077da73434-fffff8077da73435 2 bytes - nt!MiWalkPageTablesRecursively+224 (+0x344)
[ 80 f6:00 f3 ]
fffff8077da738df-fffff8077da738e3 5 bytes - nt!MiWalkPageTablesRecursively+6cf (+0x4ab)
[ d7 be 7d fb f6:67 de bc 79 f3 ]
fffff8077da7392a-fffff8077da7392b 2 bytes - nt!MiWalkPageTablesRecursively+71a (+0x4b)
[ 80 f6:00 f3 ]
fffff8077da7395e-fffff8077da73963 6 bytes - nt!MiWalkPageTablesRecursively+74e (+0x34)
[ 68 df be 7d fb f6:30 6f de bc 79 f3 ]
fffff8077da7397d-fffff8077da73981 5 bytes - nt!MiWalkPageTablesRecursively+76d (+0x1f)
[ d0 be 7d fb f6:60 de bc 79 f3 ]
fffff8077da7399e-fffff8077da739a2 5 bytes - nt!MiWalkPageTablesRecursively+78e (+0x21)
[ d0 be 7d fb f6:60 de bc 79 f3 ]
fffff8077da7521d-fffff8077da75221 5 bytes - nt!MiDeleteVa+2d (+0x187f)
[ d0 be 7d fb f6:60 de bc 79 f3 ]
fffff8077da7522d-fffff8077da75231 5 bytes - nt!MiDeleteVa+3d (+0x10)
[ d7 be 7d fb f6:67 de bc 79 f3 ]
fffff8077da75284-fffff8077da75285 2 bytes - nt!MiDeleteVa+94 (+0x57)
[ 80 f6:00 f3 ]
fffff8077da752b2-fffff8077da752b4 3 bytes - nt!MiDeleteVa+c2 (+0x2e)
[ 40 fb f6:80 79 f3 ]
fffff8077dc0fb72-fffff8077dc0fb76 5 bytes - nt!MiDeleteVa+19a982 (+0x19a8c0)
[ df be 7d fb f6:6f de bc 79 f3 ]
fffff8077dc0fb8a-fffff8077dc0fb8e 5 bytes - nt!MiDeleteVa+19a99a (+0x18)
[ d7 be 7d fb f6:67 de bc 79 f3 ]
54 errors : !nt (fffff8077da73075-fffff8077dc0fb8e)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffffab398186a008
Arg3: 8000000b62df1867
Arg4: ffffad8869246600
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41201
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
LAST_CONTROL_TRANSFER: from fffff802635ffab0 to fffff802635c2990
STACK_TEXT:
ffff8900`b1f33548 fffff802`635ffab0 : 00000000`0000001a 00000000`00041201 ffffab39`8186a008 8000000b`62df1867 : nt!KeBugCheckEx
ffff8900`b1f33550 fffff802`63454731 : ffffab39`8186a010 8000000b`62df1867 fffff802`00000002 ffffab55`9cc0c350 : nt!MiGetPageProtection+0x1abdc0
ffff8900`b1f335c0 fffff802`634f4c40 : 00000000`00000000 00000000`00000000 00000000`00000282 fffff802`6349d1b4 : nt!MiQueryAddressState+0x5c1
ffff8900`b1f337e0 fffff802`639e5c47 : ffff8900`b1f33b80 00007303`0d400000 ffff8900`00000000 000000e6`00000001 : nt!MiQueryAddressSpan+0x140
ffff8900`b1f338a0 fffff802`639e56e5 : ffffab55`80b88ca0 ffffab55`aac05c40 ffffab55`aad56028 ffffad88`68282580 : nt!MmQueryVirtualMemory+0x557
ffff8900`b1f33a40 fffff802`635d4258 : 00000000`00000000 00000000`00000000 00000000`00000000 000000e6`cd5fe478 : nt!NtQueryVirtualMemory+0x25
ffff8900`b1f33a90 00007fff`6733c4d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e6`cd5fe808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6733c4d4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff802634547cb-fffff802634547cf 5 bytes - nt!MiQueryAddressState+65b
[ d7 be 7d fb f6:67 d5 aa 55 ab ]
fffff80263454806-fffff8026345480b 6 bytes - nt!MiQueryAddressState+696 (+0x3b)
[ 68 df be 7d fb f6:b0 6a d5 aa 55 ab ]
fffff80263454828-fffff8026345482c 5 bytes - nt!MiQueryAddressState+6b8 (+0x22)
[ d0 be 7d fb f6:60 d5 aa 55 ab ]
fffff8026345bdac-fffff8026345bdb0 5 bytes - nt!MiCompletePrivateZeroFault+6ac (+0x7584)
[ d0 be 7d fb f6:60 d5 aa 55 ab ]
fffff8026345bdcd-fffff8026345bdce 2 bytes - nt!MiCompletePrivateZeroFault+6cd (+0x21)
[ 80 f6:00 ab ]
fffff8026345bdec - nt!MiCompletePrivateZeroFault+6ec (+0x1f)
[ fa:fb ]
fffff802639e5d11-fffff802639e5d15 5 bytes - nt!MmQueryVirtualMemory+621
[ ff e0 cc cc cc:e8 8a d3 d6 ff ]
29 errors : !nt (fffff802634547cb-fffff802639e5d15)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
Hocam uygun olduğumda yapacağım şuanlık dersim var ve bu kod lazım mı bana? Bir de 8GB RAM var kaç saat sürer ortalama.Memtest86 ile RAM testi yapar mısınız? Valorant Anti Cheat şu anlık kaldırınız.Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000061941, The subtype of the bugcheck. Arg2: ffffbc3efa6a1000 Arg3: 0000000000000009 Arg4: fffff88928a96ca0 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_61941 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: ShellExperienc CURRENT_IRQL: 2 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre TRAP_FRAME: fffff88928a96ca0 -- (.trap 0xfffff88928a96ca0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffbc3fffffff01 rbx=0000000000000000 rcx=fffff88928a97410 rdx=ffffbc3efa6a1000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8046ee74406 rsp=fffff88928a96e30 rbp=ffffd7894a3109c0 r8=0000000000000000 r9=ffffbc5e2f0fbe98 r10=ffffbc5e2f178fff r11=fffff88928a96f00 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!MiComputePxeWalkAction+0x6: fffff804`6ee74406 4c8b0a mov r9,qword ptr [rdx] ds:ffffbc3e`fa6a1000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8046f0020ee to fffff8046efc2990 STACK_TEXT: fffff889`28a96af8 fffff804`6f0020ee : 00000000`0000001a 00000000`00061941 ffffbc3e`fa6a1000 00000000`00000009 : nt!KeBugCheckEx fffff889`28a96b00 fffff804`6efd0a5e : 00000000`00000000 fffff804`6ee53975 ffffd789`4aa1d9c0 00000000`00000001 : nt!MmAccessFault+0x1a9b9e fffff889`28a96ca0 fffff804`6ee74406 : ffffd7ea`c3721292 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KiPageFault+0x35e fffff889`28a96e30 fffff804`6ee73320 : 00000000`00000000 fffff889`28a97410 ffffd789`4a3109c0 fffff804`6ee15fcd : nt!MiComputePxeWalkAction+0x6 fffff889`28a96e70 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`1f7d3508 : nt!MiWalkPageTablesRecursively+0x110 fffff889`28a96f30 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`2f0fbe98 : nt!MiWalkPageTablesRecursively+0x6a1 fffff889`28a96ff0 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`2f1787d8 : nt!MiWalkPageTablesRecursively+0x6a1 fffff889`28a970b0 fffff804`6ee7303c : fffff889`28a97410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1 fffff889`28a97170 fffff804`6ee72ac7 : fffff889`28a97410 fffff889`00000002 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c fffff889`28a97270 fffff804`6ee72237 : ffffd789`49af4080 00000000`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7 fffff889`28a97790 fffff804`6ee71b1a : ffffd789`4a3109c0 fffff889`28a97a50 00000000`00000000 00000000`000030d8 : nt!MiTrimOrAgeWorkingSet+0x3e7 fffff889`28a97880 fffff804`6ee70230 : fffff804`00000002 fffff804`00000000 fffff804`6f268340 ffffd789`3fa43530 : nt!MiProcessWorkingSets+0x1fa fffff889`28a97a30 fffff804`6f0c99f6 : fffff804`6f373ac0 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8 fffff889`28a97af0 fffff804`6ef8ccb5 : 00000000`00000004 00000000`ffffffff 00000000`00000001 00000000`000000a0 : nt!MmWorkingSetManager+0x12 fffff889`28a97b20 fffff804`6ef1e235 : ffffd789`3fae0080 00000000`00000080 fffff804`6ef8cb60 f86d6584`55f2add4 : nt!KeBalanceSetManager+0x155 fffff889`28a97c10 fffff804`6efc9f98 : fffff804`6d200180 ffffd789`3fae0080 fffff804`6ef1e1e0 a9b31472`6939c846 : nt!PspSystemThreadStartup+0x55 fffff889`28a97c60 00000000`00000000 : fffff889`28a98000 fffff889`28a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase ffffd1837b6976a9-ffffd1837b6976ae 6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49 [ ff 15 01 e1 19 00:e8 f2 db 20 00 90 ] ffffd1837b697729-ffffd1837b69772a 2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x80) [ 48 ff:4c 8b ] ffffd1837b697730-ffffd1837b697733 4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07) [ 0f 1f 44 00:e8 eb dc 20 ] 12 errors : !win32kbase (ffffd1837b6976a9-ffffd1837b697733) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff012c38a9000 Arg3: 0000000200000000 Arg4: 0000000000000000 Debugging Details: ------------------ MEMORY_CORRUPTOR: LARGE BUGCHECK_STR: 0x1a_41792 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre STACK_TEXT: fffff104`37bbec08 fffff807`14c0fb1a : 00000000`0000001a 00000000`00041792 fffff012`c38a9000 00000002`00000000 : nt!KeBugCheckEx fffff104`37bbec10 fffff807`14a733f7 : ffffbc81`bda2d580 fffff012`c38a9000 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a92a fffff104`37bbed20 fffff807`14a738b1 : fffff104`37bbf170 fffff078`0961c548 00000000`00000000 0a000000`6c0d6867 : nt!MiWalkPageTablesRecursively+0x1e7 fffff104`37bbede0 fffff807`14a738b1 : fffff104`37bbf170 fffff078`3c04b0e0 00000000`00000000 0a000000`032d5867 : nt!MiWalkPageTablesRecursively+0x6a1 fffff104`37bbeea0 fffff807`14a738b1 : fffff104`37bbf170 fffff078`3c1e0258 fffff078`00000000 8a000001`799d4867 : nt!MiWalkPageTablesRecursively+0x6a1 fffff104`37bbef60 fffff807`14a7303c : fffff104`37bbf170 fffff078`3c12a408 fffff078`00000000 ffffbc81`bda2d580 : nt!MiWalkPageTablesRecursively+0x6a1 fffff104`37bbf020 fffff807`14a714a8 : fffff104`37bbf170 00000000`00000002 ffffbc81`00000001 fffff807`00000000 : nt!MiWalkPageTables+0x36c fffff104`37bbf120 fffff807`14a7f600 : ffffffff`ffffffff ffffbc81`bda2d3f8 ffffbc81`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 fffff104`37bbf4c0 fffff807`14fdb8bd : ffffbc81`bfb7f2c0 00000000`00000000 ffffbc81`bddd9830 ffffbc81`bfb7f2c0 : nt!MiDeleteVad+0x860 fffff104`37bbf680 fffff807`14fdae0f : ffffbc81`bf7e53a0 ffffbc81`bf7e53a0 ffffbc81`bda2d080 fffff807`14e68340 : nt!MiCleanVad+0x4d fffff104`37bbf6b0 fffff807`1506ba69 : ffffffff`00000000 ffffffff`ffffffff fffff104`37bbf901 ffffbc81`bda2d080 : nt!MmCleanProcessAddressSpace+0x137 fffff104`37bbf730 fffff807`15024a23 : ffffbc81`bda2d080 ffffac00`5ee240a0 fffff104`37bbf959 00000000`00000000 : nt!PspRundownSingleProcess+0x139 fffff104`37bbf7b0 fffff807`150222d3 : 00000000`c0000005 ffffbc81`bfb7f201 00000097`44222000 00000000`0000000f : nt!PspExitThread+0x60b fffff104`37bbf8c0 fffff807`14aa6321 : ffffbc81`bfb7f3c0 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33 fffff104`37bbf900 fffff807`14bc6ef0 : ffffbc81`bfb7f201 fffff104`37bbf9c0 ffffbc81`bfb7f2c0 ffff9680`00000000 : nt!KiDeliverApc+0x481 fffff104`37bbf9c0 fffff807`14bd42ff : ffffbc81`bfb7f2c0 00000000`00000000 00000000`00000000 fffff104`37bbfb80 : nt!KiInitiateUserApc+0x70 fffff104`37bbfb00 00007ffe`ec05f9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000097`4abff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ec05f9a4 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff80714a5a0f3-fffff80714a5a0f7 5 bytes - nt!MiDispatchFault+383 [ d7 be 7d fb f6:07 1e 3c 78 f0 ] fffff80714a5a0fd-fffff80714a5a101 5 bytes - nt!MiDispatchFault+38d (+0x0a) [ df be 7d fb f6:0f 1e 3c 78 f0 ] fffff80714a5a107-fffff80714a5a10b 5 bytes - nt!MiDispatchFault+397 (+0x0a) [ d0 be 7d fb f6:00 1e 3c 78 f0 ] fffff80714a5a110-fffff80714a5a115 6 bytes - nt!MiDispatchFault+3a0 (+0x09) [ 68 df be 7d fb f6:00 0f 1e 3c 78 f0 ] fffff80714a5bdac-fffff80714a5bdb0 5 bytes - nt!MiCompletePrivateZeroFault+6ac (+0x1c9c) [ d0 be 7d fb f6:00 1e 3c 78 f0 ] fffff80714a5bdcd-fffff80714a5bdce 2 bytes - nt!MiCompletePrivateZeroFault+6cd (+0x21) [ 80 f6:00 f0 ] fffff80714a5bdec - nt!MiCompletePrivateZeroFault+6ec (+0x1f) [ fa:a8 ] fffff80714a73075-fffff80714a73076 2 bytes - nt!MiWalkPageTables+3a5 (+0x17289) [ 80 f6:00 f0 ] fffff80714a730f0-fffff80714a730f1 2 bytes - nt!MiWalkPageTables+420 (+0x7b) [ 00 f7:80 f0 ] fffff80714a73434-fffff80714a73435 2 bytes - nt!MiWalkPageTablesRecursively+224 (+0x344) [ 80 f6:00 f0 ] fffff80714a738df-fffff80714a738e3 5 bytes - nt!MiWalkPageTablesRecursively+6cf (+0x4ab) [ d7 be 7d fb f6:07 1e 3c 78 f0 ] fffff80714a7392a-fffff80714a7392b 2 bytes - nt!MiWalkPageTablesRecursively+71a (+0x4b) [ 80 f6:00 f0 ] fffff80714a7395e-fffff80714a73963 6 bytes - nt!MiWalkPageTablesRecursively+74e (+0x34) [ 68 df be 7d fb f6:00 0f 1e 3c 78 f0 ] fffff80714a7397d-fffff80714a73981 5 bytes - nt!MiWalkPageTablesRecursively+76d (+0x1f) [ d0 be 7d fb f6:00 1e 3c 78 f0 ] fffff80714a7399e-fffff80714a739a2 5 bytes - nt!MiWalkPageTablesRecursively+78e (+0x21) [ d0 be 7d fb f6:00 1e 3c 78 f0 ] fffff80714a7521d-fffff80714a75221 5 bytes - nt!MiDeleteVa+2d (+0x187f) [ d0 be 7d fb f6:00 1e 3c 78 f0 ] fffff80714a7522d-fffff80714a75231 5 bytes - nt!MiDeleteVa+3d (+0x10) [ d7 be 7d fb f6:07 1e 3c 78 f0 ] fffff80714a75284-fffff80714a75285 2 bytes - nt!MiDeleteVa+94 (+0x57) [ 80 f6:00 f0 ] fffff80714a752b2-fffff80714a752b4 3 bytes - nt!MiDeleteVa+c2 (+0x2e) [ 40 fb f6:00 78 f0 ] fffff80714c0fb72-fffff80714c0fb76 5 bytes - nt!MiDeleteVa+19a982 (+0x19a8c0) [ df be 7d fb f6:0f 1e 3c 78 f0 ] fffff80714c0fb8a-fffff80714c0fb8e 5 bytes - nt!MiDeleteVa+19a99a (+0x18) [ d7 be 7d fb f6:07 1e 3c 78 f0 ] 83 errors : !nt (fffff80714a5a0f3-fffff80714c0fb8e) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8027aeab1e6, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: 00000078fffffff8, Parameter 1 of the exception Debugging Details: ------------------ READ_ADDRESS: unable to get nt!MmSpecialPoolStart unable to get nt!MmSpecialPoolEnd unable to get nt!MmPagedPoolEnd unable to get nt!MmNonPagedPoolStart unable to get nt!MmSizeOfNonPagedPoolInBytes 00000078fffffff8 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba FAULTING_IP: nt!RtlpHpVsChunkSplit+5a6 fffff802`7aeab1e6 334ff8 xor ecx,dword ptr [rdi-8] EXCEPTION_PARAMETER2: 00000078fffffff8 BUGCHECK_STR: 0x1E_c0000005_R CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: WerFault.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre EXCEPTION_RECORD: ffffba5d2e974000 -- (.exr 0xffffba5d2e974000) ExceptionAddress: 0000000000000000 ExceptionCode: 00000000 ExceptionFlags: 00000000 NumberParameters: 1653426279 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000000 Parameter[2]: 0000000000000000 Parameter[3]: 0000000000000000 Parameter[4]: 0000000000000000 Parameter[5]: 0000000000000000 Parameter[6]: 0000000000000000 Parameter[7]: 0000000000000000 Parameter[8]: 0000000000000000 Parameter[9]: 0000000000000000 Parameter[10]: 0000000000000000 Parameter[11]: 0000000000000000 Parameter[12]: 0000000000000000 Parameter[13]: 0000000000000000 Parameter[14]: 0000000000000000 TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 LAST_CONTROL_TRANSFER: from fffff8027b019d71 to fffff8027afc2990 STACK_TEXT: ffff9708`85af36f8 fffff802`7b019d71 : 00000000`0000001e ffffffff`c0000005 fffff802`7aeab1e6 00000000`00000000 : nt!KeBugCheckEx ffff9708`85af3700 fffff802`7afd495d : ffffba5d`2e974000 ffff9708`85af3f90 ffff8000`00000000 00000078`fffffff8 : nt!KiDispatchException+0x18c871 ffff9708`85af3db0 fffff802`7afd0b43 : 00000000`00003000 ffff9708`85af3fd0 ffffd287`f2800290 ffff980c`565089a8 : nt!KiExceptionDispatch+0x11d ffff9708`85af3f90 fffff802`7aeab1e6 : ffffd288`062dcfe0 ffffd288`062dc430 00000000`00000000 ffffd288`062d8018 : nt!KiPageFault+0x443 ffff9708`85af4120 fffff802`7aeaab49 : ffffd288`062dcfe0 ffffd288`062dafe0 00000000`00000000 00000000`0000cfe0 : nt!RtlpHpVsChunkSplit+0x5a6 ffff9708`85af41f0 fffff802`7ae9a958 : 00000000`00000145 00000000`00001430 00000000`00001430 ffffd287`f2800000 : nt!RtlpHpVsContextAllocateInternal+0x3c9 ffff9708`85af4260 fffff802`7b16e06d : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00001429 : nt!ExAllocateHeapPool+0x418 ffff9708`85af43a0 fffff802`7b4bc256 : 00000000`00000000 00000000`00009200 ffffd288`06723000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d ffff9708`85af43f0 fffff802`7ae0536b : 00000000`00000000 ffff980c`5a133a10 00000000`00000000 00000000`00000000 : nt!PfSnScenarioAlloc+0x16 ffff9708`85af4420 fffff802`7b3c1b63 : 00000000`00001429 00000000`00000000 ffff9708`85af4510 ffff9708`85af4520 : nt!SmDecompressBuffer+0xcb ffff9708`85af44c0 fffff802`7b3c3c95 : 00007ffe`e4e80000 00000000`00000003 ffff980c`5393d3a0 fffff802`7aea1c1d : nt!PfSnGetPrefetchInstructions+0x257 ffff9708`85af4600 fffff802`7b3c31b9 : ffff980c`5a56a080 ffff9708`85af4710 ffff9708`00000000 00000000`00000000 : nt!PfSnBeginScenario+0x1f5 ffff9708`85af46a0 fffff802`7b3c3015 : ffff980c`5ae6bdd0 ffff980c`5a56a080 ffff9708`85af4b80 ffff980c`5a56a080 : nt!PfSnBeginAppLaunch+0x169 ffff9708`85af48a0 fffff802`7b3cbeba : fffff802`75ba0180 ffff980c`5ae6bdd0 ffff980c`5393d080 ffff980c`00000000 : nt!PfProcessCreateNotification+0x5d ffff9708`85af48d0 fffff802`7afca308 : fffff802`75ba0180 ffff980c`5393d080 ffff980c`53823080 00000000`00000000 : nt!PspUserThreadStartup+0x14a ffff9708`85af49c0 fffff802`7afca270 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28 ffff9708`85af4b00 00007ffe`e4eece30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn 000000ee`6d0dff98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e4eece30 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !hal fffff8027ad5dd03 - hal!HalpApicRequestInterrupt+a3 [ 00:90 ] fffff8027ad5dd71-fffff8027ad5dd76 6 bytes - hal!HalpApicRequestInterrupt+111 (+0x6e) [ ff 15 99 7b 07 00:e8 2a 55 3f 00 90 ] fffff8027ad5f285-fffff8027ad5f286 2 bytes - hal!HalpTimerClockIpiRoutine+15 (+0x1514) [ 48 ff:4c 8b ] fffff8027ad5f28c-fffff8027ad5f28f 4 bytes - hal!HalpTimerClockIpiRoutine+1c (+0x07) [ 0f 1f 44 00:e8 bf 87 0e ] fffff8027ad5f2e7-fffff8027ad5f2ec 6 bytes - hal!HalpTimerClockIpiRoutine+77 (+0x5b) [ ff 15 23 66 07 00:e8 b4 3f 3f 00 90 ] 19 errors : !hal (fffff8027ad5dd03-fffff8027ad5f2ec) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffff30000292008 Arg3: 0000009400000000 Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41792 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: Discord.exe CURRENT_IRQL: 2 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre LAST_CONTROL_TRANSFER: from fffff8077dc0fb1a to fffff8077dbc2990 STACK_TEXT: ffffec86`d6b24c08 fffff807`7dc0fb1a : 00000000`0000001a 00000000`00041792 fffff300`00292008 00000094`00000000 : nt!KeBugCheckEx ffffec86`d6b24c10 fffff807`7da733f7 : ffffb607`3fc13580 fffff300`00292008 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a92a ffffec86`d6b24d20 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`80001490 00000000`00000000 0a000000`6c0d4867 : nt!MiWalkPageTablesRecursively+0x1e7 ffffec86`d6b24de0 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`bcc00008 00000000`00000000 0a000000`8f4cf867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffec86`d6b24ea0 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`bcde6000 fffff379`00000000 8a000000`368f0867 : nt!MiWalkPageTablesRecursively+0x6a1 ffffec86`d6b24f60 fffff807`7da7303c : ffffec86`d6b25170 ffffa02d`40000000 ffffa02d`00000000 ffffb607`3fc13580 : nt!MiWalkPageTablesRecursively+0x6a1 ffffec86`d6b25020 fffff807`7da714a8 : ffffec86`d6b25170 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c ffffec86`d6b25120 fffff807`7da7f600 : ffffffff`ffffffff ffffb607`3fc133f8 ffffb607`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268 ffffec86`d6b254c0 fffff807`7dfdb8bd : ffffb607`43721080 00000000`00000000 ffffb607`4888d430 ffffb607`43721080 : nt!MiDeleteVad+0x860 ffffec86`d6b25680 fffff807`7dfdae0f : ffffb607`4888d660 ffffb607`4888d660 ffffb607`3fc13080 fffff807`7de68340 : nt!MiCleanVad+0x4d ffffec86`d6b256b0 fffff807`7e06ba69 : ffffffff`00000000 ffffffff`ffffffff ffffec86`d6b25901 ffffb607`3fc13080 : nt!MmCleanProcessAddressSpace+0x137 ffffec86`d6b25730 fffff807`7e024a23 : ffffb607`3fc13080 ffffcc83`553760a0 ffffec86`d6b25959 00000000`00000000 : nt!PspRundownSingleProcess+0x139 ffffec86`d6b257b0 fffff807`7e0222d3 : 00000000`c0000005 ffffb607`43721001 00000000`00224000 00000000`0000000f : nt!PspExitThread+0x60b ffffec86`d6b258c0 fffff807`7daa6321 : ffffb607`43721180 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33 ffffec86`d6b25900 fffff807`7dbc6ef0 : ffffb607`43721001 ffffec86`d6b259c0 ffffb607`43721080 00000000`00000000 : nt!KiDeliverApc+0x481 ffffec86`d6b259c0 fffff807`7dbd42ff : ffffb607`43721080 00000000`00000000 00000000`00000000 ffffb607`45bd6d60 : nt!KiInitiateUserApc+0x70 ffffec86`d6b25b00 00000000`77841cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000000`0e43f1b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77841cbc STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff8077da73075-fffff8077da73076 2 bytes - nt!MiWalkPageTables+3a5 [ 80 f6:00 f3 ] fffff8077da730f0-fffff8077da730f1 2 bytes - nt!MiWalkPageTables+420 (+0x7b) [ 00 f7:80 f3 ] fffff8077da73434-fffff8077da73435 2 bytes - nt!MiWalkPageTablesRecursively+224 (+0x344) [ 80 f6:00 f3 ] fffff8077da738df-fffff8077da738e3 5 bytes - nt!MiWalkPageTablesRecursively+6cf (+0x4ab) [ d7 be 7d fb f6:67 de bc 79 f3 ] fffff8077da7392a-fffff8077da7392b 2 bytes - nt!MiWalkPageTablesRecursively+71a (+0x4b) [ 80 f6:00 f3 ] fffff8077da7395e-fffff8077da73963 6 bytes - nt!MiWalkPageTablesRecursively+74e (+0x34) [ 68 df be 7d fb f6:30 6f de bc 79 f3 ] fffff8077da7397d-fffff8077da73981 5 bytes - nt!MiWalkPageTablesRecursively+76d (+0x1f) [ d0 be 7d fb f6:60 de bc 79 f3 ] fffff8077da7399e-fffff8077da739a2 5 bytes - nt!MiWalkPageTablesRecursively+78e (+0x21) [ d0 be 7d fb f6:60 de bc 79 f3 ] fffff8077da7521d-fffff8077da75221 5 bytes - nt!MiDeleteVa+2d (+0x187f) [ d0 be 7d fb f6:60 de bc 79 f3 ] fffff8077da7522d-fffff8077da75231 5 bytes - nt!MiDeleteVa+3d (+0x10) [ d7 be 7d fb f6:67 de bc 79 f3 ] fffff8077da75284-fffff8077da75285 2 bytes - nt!MiDeleteVa+94 (+0x57) [ 80 f6:00 f3 ] fffff8077da752b2-fffff8077da752b4 3 bytes - nt!MiDeleteVa+c2 (+0x2e) [ 40 fb f6:80 79 f3 ] fffff8077dc0fb72-fffff8077dc0fb76 5 bytes - nt!MiDeleteVa+19a982 (+0x19a8c0) [ df be 7d fb f6:6f de bc 79 f3 ] fffff8077dc0fb8a-fffff8077dc0fb8e 5 bytes - nt!MiDeleteVa+19a99a (+0x18) [ d7 be 7d fb f6:67 de bc 79 f3 ] 54 errors : !nt (fffff8077da73075-fffff8077dc0fb8e) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041201, The subtype of the bugcheck. Arg2: ffffab398186a008 Arg3: 8000000b62df1867 Arg4: ffffad8869246600 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41201 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre LAST_CONTROL_TRANSFER: from fffff802635ffab0 to fffff802635c2990 STACK_TEXT: ffff8900`b1f33548 fffff802`635ffab0 : 00000000`0000001a 00000000`00041201 ffffab39`8186a008 8000000b`62df1867 : nt!KeBugCheckEx ffff8900`b1f33550 fffff802`63454731 : ffffab39`8186a010 8000000b`62df1867 fffff802`00000002 ffffab55`9cc0c350 : nt!MiGetPageProtection+0x1abdc0 ffff8900`b1f335c0 fffff802`634f4c40 : 00000000`00000000 00000000`00000000 00000000`00000282 fffff802`6349d1b4 : nt!MiQueryAddressState+0x5c1 ffff8900`b1f337e0 fffff802`639e5c47 : ffff8900`b1f33b80 00007303`0d400000 ffff8900`00000000 000000e6`00000001 : nt!MiQueryAddressSpan+0x140 ffff8900`b1f338a0 fffff802`639e56e5 : ffffab55`80b88ca0 ffffab55`aac05c40 ffffab55`aad56028 ffffad88`68282580 : nt!MmQueryVirtualMemory+0x557 ffff8900`b1f33a40 fffff802`635d4258 : 00000000`00000000 00000000`00000000 00000000`00000000 000000e6`cd5fe478 : nt!NtQueryVirtualMemory+0x25 ffff8900`b1f33a90 00007fff`6733c4d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000e6`cd5fe808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6733c4d4 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff802634547cb-fffff802634547cf 5 bytes - nt!MiQueryAddressState+65b [ d7 be 7d fb f6:67 d5 aa 55 ab ] fffff80263454806-fffff8026345480b 6 bytes - nt!MiQueryAddressState+696 (+0x3b) [ 68 df be 7d fb f6:b0 6a d5 aa 55 ab ] fffff80263454828-fffff8026345482c 5 bytes - nt!MiQueryAddressState+6b8 (+0x22) [ d0 be 7d fb f6:60 d5 aa 55 ab ] fffff8026345bdac-fffff8026345bdb0 5 bytes - nt!MiCompletePrivateZeroFault+6ac (+0x7584) [ d0 be 7d fb f6:60 d5 aa 55 ab ] fffff8026345bdcd-fffff8026345bdce 2 bytes - nt!MiCompletePrivateZeroFault+6cd (+0x21) [ 80 f6:00 ab ] fffff8026345bdec - nt!MiCompletePrivateZeroFault+6ec (+0x1f) [ fa:fb ] fffff802639e5d11-fffff802639e5d15 5 bytes - nt!MmQueryVirtualMemory+621 [ ff e0 cc cc cc:e8 8a d3 d6 ff ] 29 errors : !nt (fffff802634547cb-fffff802639e5d15) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption ---------
O kadar vakit bulabilirsem iyi olurdu muhtemelen yapamayacağım :/Kod lazım değil size. En fazla 8 saat sürer diye düşünüyorum.
Hocam üşendiğim için ve babamdan dolayı bilgisayarı açık bırakamadım ve MemTest yapamadım fakat Windows sürümünü 2004 yaptıktan sonra sadece Valorant adlı oyunda 5-6 saatle arayla oynadıktan sonra arada yük altına girince "cııızzzzzzz" diye ses geliyor fakat ekranda mavi ekran değil kırmızı renk oluyor bu da Valorant yüzünden sanırım. Bunla alışacağım fakat MemTest'i en yakında yapmaya çalışacağım.Konuyu unuttunuz mu? Bellek testini ne zaman yapacaksınız ? Sorununuz çözüldü mü?
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.