Anlamsız Çökmeler

Osman Tuç

Hectopat
Katılım
6 Ağustos 2019
Mesajlar
1.946
Çözümler
7
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar önceden bir konu açmıştım, bununla alakalı fakat gittikçe çoğalmaya başladı ve ilk kez bu ekran karşıma çıktı.

1600599320047-670681374.jpg
 
Memtest86 ile RAM testi yapar mısınız? Valorant Anti Cheat şu anlık kaldırınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffffbc3efa6a1000
Arg3: 0000000000000009
Arg4: fffff88928a96ca0

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  ShellExperienc

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  fffff88928a96ca0 -- (.trap 0xfffff88928a96ca0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc3fffffff01 rbx=0000000000000000 rcx=fffff88928a97410
rdx=ffffbc3efa6a1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046ee74406 rsp=fffff88928a96e30 rbp=ffffd7894a3109c0
 r8=0000000000000000  r9=ffffbc5e2f0fbe98 r10=ffffbc5e2f178fff
r11=fffff88928a96f00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiComputePxeWalkAction+0x6:
fffff804`6ee74406 4c8b0a          mov     r9,qword ptr [rdx] ds:ffffbc3e`fa6a1000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8046f0020ee to fffff8046efc2990

STACK_TEXT: 
fffff889`28a96af8 fffff804`6f0020ee : 00000000`0000001a 00000000`00061941 ffffbc3e`fa6a1000 00000000`00000009 : nt!KeBugCheckEx
fffff889`28a96b00 fffff804`6efd0a5e : 00000000`00000000 fffff804`6ee53975 ffffd789`4aa1d9c0 00000000`00000001 : nt!MmAccessFault+0x1a9b9e
fffff889`28a96ca0 fffff804`6ee74406 : ffffd7ea`c3721292 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KiPageFault+0x35e
fffff889`28a96e30 fffff804`6ee73320 : 00000000`00000000 fffff889`28a97410 ffffd789`4a3109c0 fffff804`6ee15fcd : nt!MiComputePxeWalkAction+0x6
fffff889`28a96e70 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`1f7d3508 : nt!MiWalkPageTablesRecursively+0x110
fffff889`28a96f30 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`2f0fbe98 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a96ff0 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`2f1787d8 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a970b0 fffff804`6ee7303c : fffff889`28a97410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a97170 fffff804`6ee72ac7 : fffff889`28a97410 fffff889`00000002 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff889`28a97270 fffff804`6ee72237 : ffffd789`49af4080 00000000`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
fffff889`28a97790 fffff804`6ee71b1a : ffffd789`4a3109c0 fffff889`28a97a50 00000000`00000000 00000000`000030d8 : nt!MiTrimOrAgeWorkingSet+0x3e7
fffff889`28a97880 fffff804`6ee70230 : fffff804`00000002 fffff804`00000000 fffff804`6f268340 ffffd789`3fa43530 : nt!MiProcessWorkingSets+0x1fa
fffff889`28a97a30 fffff804`6f0c99f6 : fffff804`6f373ac0 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
fffff889`28a97af0 fffff804`6ef8ccb5 : 00000000`00000004 00000000`ffffffff 00000000`00000001 00000000`000000a0 : nt!MmWorkingSetManager+0x12
fffff889`28a97b20 fffff804`6ef1e235 : ffffd789`3fae0080 00000000`00000080 fffff804`6ef8cb60 f86d6584`55f2add4 : nt!KeBalanceSetManager+0x155
fffff889`28a97c10 fffff804`6efc9f98 : fffff804`6d200180 ffffd789`3fae0080 fffff804`6ef1e1e0 a9b31472`6939c846 : nt!PspSystemThreadStartup+0x55
fffff889`28a97c60 00000000`00000000 : fffff889`28a98000 fffff889`28a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffd1837b6976a9-ffffd1837b6976ae  6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
    [ ff 15 01 e1 19 00:e8 f2 db 20 00 90 ]
    ffffd1837b697729-ffffd1837b69772a  2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x80)
    [ 48 ff:4c 8b ]
    ffffd1837b697730-ffffd1837b697733  4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
    [ 0f 1f 44 00:e8 eb dc 20 ]
12 errors : !win32kbase (ffffd1837b6976a9-ffffd1837b697733)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff012c38a9000
Arg3: 0000000200000000
Arg4: 0000000000000000

Debugging Details:
------------------


MEMORY_CORRUPTOR:  LARGE

BUGCHECK_STR:  0x1a_41792

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

STACK_TEXT: 
fffff104`37bbec08 fffff807`14c0fb1a : 00000000`0000001a 00000000`00041792 fffff012`c38a9000 00000002`00000000 : nt!KeBugCheckEx
fffff104`37bbec10 fffff807`14a733f7 : ffffbc81`bda2d580 fffff012`c38a9000 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a92a
fffff104`37bbed20 fffff807`14a738b1 : fffff104`37bbf170 fffff078`0961c548 00000000`00000000 0a000000`6c0d6867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff104`37bbede0 fffff807`14a738b1 : fffff104`37bbf170 fffff078`3c04b0e0 00000000`00000000 0a000000`032d5867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbeea0 fffff807`14a738b1 : fffff104`37bbf170 fffff078`3c1e0258 fffff078`00000000 8a000001`799d4867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbef60 fffff807`14a7303c : fffff104`37bbf170 fffff078`3c12a408 fffff078`00000000 ffffbc81`bda2d580 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbf020 fffff807`14a714a8 : fffff104`37bbf170 00000000`00000002 ffffbc81`00000001 fffff807`00000000 : nt!MiWalkPageTables+0x36c
fffff104`37bbf120 fffff807`14a7f600 : ffffffff`ffffffff ffffbc81`bda2d3f8 ffffbc81`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff104`37bbf4c0 fffff807`14fdb8bd : ffffbc81`bfb7f2c0 00000000`00000000 ffffbc81`bddd9830 ffffbc81`bfb7f2c0 : nt!MiDeleteVad+0x860
fffff104`37bbf680 fffff807`14fdae0f : ffffbc81`bf7e53a0 ffffbc81`bf7e53a0 ffffbc81`bda2d080 fffff807`14e68340 : nt!MiCleanVad+0x4d
fffff104`37bbf6b0 fffff807`1506ba69 : ffffffff`00000000 ffffffff`ffffffff fffff104`37bbf901 ffffbc81`bda2d080 : nt!MmCleanProcessAddressSpace+0x137
fffff104`37bbf730 fffff807`15024a23 : ffffbc81`bda2d080 ffffac00`5ee240a0 fffff104`37bbf959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffff104`37bbf7b0 fffff807`150222d3 : 00000000`c0000005 ffffbc81`bfb7f201 00000097`44222000 00000000`0000000f : nt!PspExitThread+0x60b
fffff104`37bbf8c0 fffff807`14aa6321 : ffffbc81`bfb7f3c0 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33
fffff104`37bbf900 fffff807`14bc6ef0 : ffffbc81`bfb7f201 fffff104`37bbf9c0 ffffbc81`bfb7f2c0 ffff9680`00000000 : nt!KiDeliverApc+0x481
fffff104`37bbf9c0 fffff807`14bd42ff : ffffbc81`bfb7f2c0 00000000`00000000 00000000`00000000 fffff104`37bbfb80 : nt!KiInitiateUserApc+0x70
fffff104`37bbfb00 00007ffe`ec05f9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000097`4abff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ec05f9a4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80714a5a0f3-fffff80714a5a0f7  5 bytes - nt!MiDispatchFault+383
    [ d7 be 7d fb f6:07 1e 3c 78 f0 ]
    fffff80714a5a0fd-fffff80714a5a101  5 bytes - nt!MiDispatchFault+38d (+0x0a)
    [ df be 7d fb f6:0f 1e 3c 78 f0 ]
    fffff80714a5a107-fffff80714a5a10b  5 bytes - nt!MiDispatchFault+397 (+0x0a)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a5a110-fffff80714a5a115  6 bytes - nt!MiDispatchFault+3a0 (+0x09)
    [ 68 df be 7d fb f6:00 0f 1e 3c 78 f0 ]
    fffff80714a5bdac-fffff80714a5bdb0  5 bytes - nt!MiCompletePrivateZeroFault+6ac (+0x1c9c)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a5bdcd-fffff80714a5bdce  2 bytes - nt!MiCompletePrivateZeroFault+6cd (+0x21)
    [ 80 f6:00 f0 ]
    fffff80714a5bdec - nt!MiCompletePrivateZeroFault+6ec (+0x1f)
    [ fa:a8 ]
    fffff80714a73075-fffff80714a73076  2 bytes - nt!MiWalkPageTables+3a5 (+0x17289)
    [ 80 f6:00 f0 ]
    fffff80714a730f0-fffff80714a730f1  2 bytes - nt!MiWalkPageTables+420 (+0x7b)
    [ 00 f7:80 f0 ]
    fffff80714a73434-fffff80714a73435  2 bytes - nt!MiWalkPageTablesRecursively+224 (+0x344)
    [ 80 f6:00 f0 ]
    fffff80714a738df-fffff80714a738e3  5 bytes - nt!MiWalkPageTablesRecursively+6cf (+0x4ab)
    [ d7 be 7d fb f6:07 1e 3c 78 f0 ]
    fffff80714a7392a-fffff80714a7392b  2 bytes - nt!MiWalkPageTablesRecursively+71a (+0x4b)
    [ 80 f6:00 f0 ]
    fffff80714a7395e-fffff80714a73963  6 bytes - nt!MiWalkPageTablesRecursively+74e (+0x34)
    [ 68 df be 7d fb f6:00 0f 1e 3c 78 f0 ]
    fffff80714a7397d-fffff80714a73981  5 bytes - nt!MiWalkPageTablesRecursively+76d (+0x1f)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a7399e-fffff80714a739a2  5 bytes - nt!MiWalkPageTablesRecursively+78e (+0x21)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a7521d-fffff80714a75221  5 bytes - nt!MiDeleteVa+2d (+0x187f)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a7522d-fffff80714a75231  5 bytes - nt!MiDeleteVa+3d (+0x10)
    [ d7 be 7d fb f6:07 1e 3c 78 f0 ]
    fffff80714a75284-fffff80714a75285  2 bytes - nt!MiDeleteVa+94 (+0x57)
    [ 80 f6:00 f0 ]
    fffff80714a752b2-fffff80714a752b4  3 bytes - nt!MiDeleteVa+c2 (+0x2e)
    [ 40 fb f6:00 78 f0 ]
    fffff80714c0fb72-fffff80714c0fb76  5 bytes - nt!MiDeleteVa+19a982 (+0x19a8c0)
    [ df be 7d fb f6:0f 1e 3c 78 f0 ]
    fffff80714c0fb8a-fffff80714c0fb8e  5 bytes - nt!MiDeleteVa+19a99a (+0x18)
    [ d7 be 7d fb f6:07 1e 3c 78 f0 ]
83 errors : !nt (fffff80714a5a0f3-fffff80714c0fb8e)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8027aeab1e6, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 00000078fffffff8, Parameter 1 of the exception

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 00000078fffffff8

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!RtlpHpVsChunkSplit+5a6
fffff802`7aeab1e6 334ff8          xor     ecx,dword ptr [rdi-8]

EXCEPTION_PARAMETER2:  00000078fffffff8

BUGCHECK_STR:  0x1E_c0000005_R

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_RECORD:  ffffba5d2e974000 -- (.exr 0xffffba5d2e974000)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 1653426279
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
   Parameter[2]: 0000000000000000
   Parameter[3]: 0000000000000000
   Parameter[4]: 0000000000000000
   Parameter[5]: 0000000000000000
   Parameter[6]: 0000000000000000
   Parameter[7]: 0000000000000000
   Parameter[8]: 0000000000000000
   Parameter[9]: 0000000000000000
   Parameter[10]: 0000000000000000
   Parameter[11]: 0000000000000000
   Parameter[12]: 0000000000000000
   Parameter[13]: 0000000000000000
   Parameter[14]: 0000000000000000

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff8027b019d71 to fffff8027afc2990

STACK_TEXT: 
ffff9708`85af36f8 fffff802`7b019d71 : 00000000`0000001e ffffffff`c0000005 fffff802`7aeab1e6 00000000`00000000 : nt!KeBugCheckEx
ffff9708`85af3700 fffff802`7afd495d : ffffba5d`2e974000 ffff9708`85af3f90 ffff8000`00000000 00000078`fffffff8 : nt!KiDispatchException+0x18c871
ffff9708`85af3db0 fffff802`7afd0b43 : 00000000`00003000 ffff9708`85af3fd0 ffffd287`f2800290 ffff980c`565089a8 : nt!KiExceptionDispatch+0x11d
ffff9708`85af3f90 fffff802`7aeab1e6 : ffffd288`062dcfe0 ffffd288`062dc430 00000000`00000000 ffffd288`062d8018 : nt!KiPageFault+0x443
ffff9708`85af4120 fffff802`7aeaab49 : ffffd288`062dcfe0 ffffd288`062dafe0 00000000`00000000 00000000`0000cfe0 : nt!RtlpHpVsChunkSplit+0x5a6
ffff9708`85af41f0 fffff802`7ae9a958 : 00000000`00000145 00000000`00001430 00000000`00001430 ffffd287`f2800000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffff9708`85af4260 fffff802`7b16e06d : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00001429 : nt!ExAllocateHeapPool+0x418
ffff9708`85af43a0 fffff802`7b4bc256 : 00000000`00000000 00000000`00009200 ffffd288`06723000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff9708`85af43f0 fffff802`7ae0536b : 00000000`00000000 ffff980c`5a133a10 00000000`00000000 00000000`00000000 : nt!PfSnScenarioAlloc+0x16
ffff9708`85af4420 fffff802`7b3c1b63 : 00000000`00001429 00000000`00000000 ffff9708`85af4510 ffff9708`85af4520 : nt!SmDecompressBuffer+0xcb
ffff9708`85af44c0 fffff802`7b3c3c95 : 00007ffe`e4e80000 00000000`00000003 ffff980c`5393d3a0 fffff802`7aea1c1d : nt!PfSnGetPrefetchInstructions+0x257
ffff9708`85af4600 fffff802`7b3c31b9 : ffff980c`5a56a080 ffff9708`85af4710 ffff9708`00000000 00000000`00000000 : nt!PfSnBeginScenario+0x1f5
ffff9708`85af46a0 fffff802`7b3c3015 : ffff980c`5ae6bdd0 ffff980c`5a56a080 ffff9708`85af4b80 ffff980c`5a56a080 : nt!PfSnBeginAppLaunch+0x169
ffff9708`85af48a0 fffff802`7b3cbeba : fffff802`75ba0180 ffff980c`5ae6bdd0 ffff980c`5393d080 ffff980c`00000000 : nt!PfProcessCreateNotification+0x5d
ffff9708`85af48d0 fffff802`7afca308 : fffff802`75ba0180 ffff980c`5393d080 ffff980c`53823080 00000000`00000000 : nt!PspUserThreadStartup+0x14a
ffff9708`85af49c0 fffff802`7afca270 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28
ffff9708`85af4b00 00007ffe`e4eece30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
000000ee`6d0dff98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e4eece30


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !hal
    fffff8027ad5dd03 - hal!HalpApicRequestInterrupt+a3
    [ 00:90 ]
    fffff8027ad5dd71-fffff8027ad5dd76  6 bytes - hal!HalpApicRequestInterrupt+111 (+0x6e)
    [ ff 15 99 7b 07 00:e8 2a 55 3f 00 90 ]
    fffff8027ad5f285-fffff8027ad5f286  2 bytes - hal!HalpTimerClockIpiRoutine+15 (+0x1514)
    [ 48 ff:4c 8b ]
    fffff8027ad5f28c-fffff8027ad5f28f  4 bytes - hal!HalpTimerClockIpiRoutine+1c (+0x07)
    [ 0f 1f 44 00:e8 bf 87 0e ]
    fffff8027ad5f2e7-fffff8027ad5f2ec  6 bytes - hal!HalpTimerClockIpiRoutine+77 (+0x5b)
    [ ff 15 23 66 07 00:e8 b4 3f 3f 00 90 ]
19 errors : !hal (fffff8027ad5dd03-fffff8027ad5f2ec)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff30000292008
Arg3: 0000009400000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41792

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  Discord.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8077dc0fb1a to fffff8077dbc2990

STACK_TEXT: 
ffffec86`d6b24c08 fffff807`7dc0fb1a : 00000000`0000001a 00000000`00041792 fffff300`00292008 00000094`00000000 : nt!KeBugCheckEx
ffffec86`d6b24c10 fffff807`7da733f7 : ffffb607`3fc13580 fffff300`00292008 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a92a
ffffec86`d6b24d20 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`80001490 00000000`00000000 0a000000`6c0d4867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffec86`d6b24de0 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`bcc00008 00000000`00000000 0a000000`8f4cf867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b24ea0 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`bcde6000 fffff379`00000000 8a000000`368f0867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b24f60 fffff807`7da7303c : ffffec86`d6b25170 ffffa02d`40000000 ffffa02d`00000000 ffffb607`3fc13580 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b25020 fffff807`7da714a8 : ffffec86`d6b25170 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffec86`d6b25120 fffff807`7da7f600 : ffffffff`ffffffff ffffb607`3fc133f8 ffffb607`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffec86`d6b254c0 fffff807`7dfdb8bd : ffffb607`43721080 00000000`00000000 ffffb607`4888d430 ffffb607`43721080 : nt!MiDeleteVad+0x860
ffffec86`d6b25680 fffff807`7dfdae0f : ffffb607`4888d660 ffffb607`4888d660 ffffb607`3fc13080 fffff807`7de68340 : nt!MiCleanVad+0x4d
ffffec86`d6b256b0 fffff807`7e06ba69 : ffffffff`00000000 ffffffff`ffffffff ffffec86`d6b25901 ffffb607`3fc13080 : nt!MmCleanProcessAddressSpace+0x137
ffffec86`d6b25730 fffff807`7e024a23 : ffffb607`3fc13080 ffffcc83`553760a0 ffffec86`d6b25959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffec86`d6b257b0 fffff807`7e0222d3 : 00000000`c0000005 ffffb607`43721001 00000000`00224000 00000000`0000000f : nt!PspExitThread+0x60b
ffffec86`d6b258c0 fffff807`7daa6321 : ffffb607`43721180 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33
ffffec86`d6b25900 fffff807`7dbc6ef0 : ffffb607`43721001 ffffec86`d6b259c0 ffffb607`43721080 00000000`00000000 : nt!KiDeliverApc+0x481
ffffec86`d6b259c0 fffff807`7dbd42ff : ffffb607`43721080 00000000`00000000 00000000`00000000 ffffb607`45bd6d60 : nt!KiInitiateUserApc+0x70
ffffec86`d6b25b00 00000000`77841cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0e43f1b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77841cbc


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8077da73075-fffff8077da73076  2 bytes - nt!MiWalkPageTables+3a5
    [ 80 f6:00 f3 ]
    fffff8077da730f0-fffff8077da730f1  2 bytes - nt!MiWalkPageTables+420 (+0x7b)
    [ 00 f7:80 f3 ]
    fffff8077da73434-fffff8077da73435  2 bytes - nt!MiWalkPageTablesRecursively+224 (+0x344)
    [ 80 f6:00 f3 ]
    fffff8077da738df-fffff8077da738e3  5 bytes - nt!MiWalkPageTablesRecursively+6cf (+0x4ab)
    [ d7 be 7d fb f6:67 de bc 79 f3 ]
    fffff8077da7392a-fffff8077da7392b  2 bytes - nt!MiWalkPageTablesRecursively+71a (+0x4b)
    [ 80 f6:00 f3 ]
    fffff8077da7395e-fffff8077da73963  6 bytes - nt!MiWalkPageTablesRecursively+74e (+0x34)
    [ 68 df be 7d fb f6:30 6f de bc 79 f3 ]
    fffff8077da7397d-fffff8077da73981  5 bytes - nt!MiWalkPageTablesRecursively+76d (+0x1f)
    [ d0 be 7d fb f6:60 de bc 79 f3 ]
    fffff8077da7399e-fffff8077da739a2  5 bytes - nt!MiWalkPageTablesRecursively+78e (+0x21)
    [ d0 be 7d fb f6:60 de bc 79 f3 ]
    fffff8077da7521d-fffff8077da75221  5 bytes - nt!MiDeleteVa+2d (+0x187f)
    [ d0 be 7d fb f6:60 de bc 79 f3 ]
    fffff8077da7522d-fffff8077da75231  5 bytes - nt!MiDeleteVa+3d (+0x10)
    [ d7 be 7d fb f6:67 de bc 79 f3 ]
    fffff8077da75284-fffff8077da75285  2 bytes - nt!MiDeleteVa+94 (+0x57)
    [ 80 f6:00 f3 ]
    fffff8077da752b2-fffff8077da752b4  3 bytes - nt!MiDeleteVa+c2 (+0x2e)
    [ 40 fb f6:80 79 f3 ]
    fffff8077dc0fb72-fffff8077dc0fb76  5 bytes - nt!MiDeleteVa+19a982 (+0x19a8c0)
    [ df be 7d fb f6:6f de bc 79 f3 ]
    fffff8077dc0fb8a-fffff8077dc0fb8e  5 bytes - nt!MiDeleteVa+19a99a (+0x18)
    [ d7 be 7d fb f6:67 de bc 79 f3 ]
54 errors : !nt (fffff8077da73075-fffff8077dc0fb8e)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffffab398186a008
Arg3: 8000000b62df1867
Arg4: ffffad8869246600

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41201

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff802635ffab0 to fffff802635c2990

STACK_TEXT: 
ffff8900`b1f33548 fffff802`635ffab0 : 00000000`0000001a 00000000`00041201 ffffab39`8186a008 8000000b`62df1867 : nt!KeBugCheckEx
ffff8900`b1f33550 fffff802`63454731 : ffffab39`8186a010 8000000b`62df1867 fffff802`00000002 ffffab55`9cc0c350 : nt!MiGetPageProtection+0x1abdc0
ffff8900`b1f335c0 fffff802`634f4c40 : 00000000`00000000 00000000`00000000 00000000`00000282 fffff802`6349d1b4 : nt!MiQueryAddressState+0x5c1
ffff8900`b1f337e0 fffff802`639e5c47 : ffff8900`b1f33b80 00007303`0d400000 ffff8900`00000000 000000e6`00000001 : nt!MiQueryAddressSpan+0x140
ffff8900`b1f338a0 fffff802`639e56e5 : ffffab55`80b88ca0 ffffab55`aac05c40 ffffab55`aad56028 ffffad88`68282580 : nt!MmQueryVirtualMemory+0x557
ffff8900`b1f33a40 fffff802`635d4258 : 00000000`00000000 00000000`00000000 00000000`00000000 000000e6`cd5fe478 : nt!NtQueryVirtualMemory+0x25
ffff8900`b1f33a90 00007fff`6733c4d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e6`cd5fe808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6733c4d4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff802634547cb-fffff802634547cf  5 bytes - nt!MiQueryAddressState+65b
    [ d7 be 7d fb f6:67 d5 aa 55 ab ]
    fffff80263454806-fffff8026345480b  6 bytes - nt!MiQueryAddressState+696 (+0x3b)
    [ 68 df be 7d fb f6:b0 6a d5 aa 55 ab ]
    fffff80263454828-fffff8026345482c  5 bytes - nt!MiQueryAddressState+6b8 (+0x22)
    [ d0 be 7d fb f6:60 d5 aa 55 ab ]
    fffff8026345bdac-fffff8026345bdb0  5 bytes - nt!MiCompletePrivateZeroFault+6ac (+0x7584)
    [ d0 be 7d fb f6:60 d5 aa 55 ab ]
    fffff8026345bdcd-fffff8026345bdce  2 bytes - nt!MiCompletePrivateZeroFault+6cd (+0x21)
    [ 80 f6:00 ab ]
    fffff8026345bdec - nt!MiCompletePrivateZeroFault+6ec (+0x1f)
    [ fa:fb ]
    fffff802639e5d11-fffff802639e5d15  5 bytes - nt!MmQueryVirtualMemory+621
    [ ff e0 cc cc cc:e8 8a d3 d6 ff ]
29 errors : !nt (fffff802634547cb-fffff802639e5d15)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Memtest86 ile RAM testi yapar mısınız? Valorant Anti Cheat şu anlık kaldırınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffffbc3efa6a1000
Arg3: 0000000000000009
Arg4: fffff88928a96ca0

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_61941

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  ShellExperienc

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  fffff88928a96ca0 -- (.trap 0xfffff88928a96ca0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc3fffffff01 rbx=0000000000000000 rcx=fffff88928a97410
rdx=ffffbc3efa6a1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046ee74406 rsp=fffff88928a96e30 rbp=ffffd7894a3109c0
r8=0000000000000000  r9=ffffbc5e2f0fbe98 r10=ffffbc5e2f178fff
r11=fffff88928a96f00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!MiComputePxeWalkAction+0x6:
fffff804`6ee74406 4c8b0a          mov     r9,qword ptr [rdx] ds:ffffbc3e`fa6a1000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8046f0020ee to fffff8046efc2990

STACK_TEXT:
fffff889`28a96af8 fffff804`6f0020ee : 00000000`0000001a 00000000`00061941 ffffbc3e`fa6a1000 00000000`00000009 : nt!KeBugCheckEx
fffff889`28a96b00 fffff804`6efd0a5e : 00000000`00000000 fffff804`6ee53975 ffffd789`4aa1d9c0 00000000`00000001 : nt!MmAccessFault+0x1a9b9e
fffff889`28a96ca0 fffff804`6ee74406 : ffffd7ea`c3721292 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KiPageFault+0x35e
fffff889`28a96e30 fffff804`6ee73320 : 00000000`00000000 fffff889`28a97410 ffffd789`4a3109c0 fffff804`6ee15fcd : nt!MiComputePxeWalkAction+0x6
fffff889`28a96e70 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`1f7d3508 : nt!MiWalkPageTablesRecursively+0x110
fffff889`28a96f30 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`2f0fbe98 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a96ff0 fffff804`6ee738b1 : fffff889`28a97410 fffff889`28a97410 00000000`00000000 ffffbc5e`2f1787d8 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a970b0 fffff804`6ee7303c : fffff889`28a97410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff889`28a97170 fffff804`6ee72ac7 : fffff889`28a97410 fffff889`00000002 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff889`28a97270 fffff804`6ee72237 : ffffd789`49af4080 00000000`00000000 00000003`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
fffff889`28a97790 fffff804`6ee71b1a : ffffd789`4a3109c0 fffff889`28a97a50 00000000`00000000 00000000`000030d8 : nt!MiTrimOrAgeWorkingSet+0x3e7
fffff889`28a97880 fffff804`6ee70230 : fffff804`00000002 fffff804`00000000 fffff804`6f268340 ffffd789`3fa43530 : nt!MiProcessWorkingSets+0x1fa
fffff889`28a97a30 fffff804`6f0c99f6 : fffff804`6f373ac0 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
fffff889`28a97af0 fffff804`6ef8ccb5 : 00000000`00000004 00000000`ffffffff 00000000`00000001 00000000`000000a0 : nt!MmWorkingSetManager+0x12
fffff889`28a97b20 fffff804`6ef1e235 : ffffd789`3fae0080 00000000`00000080 fffff804`6ef8cb60 f86d6584`55f2add4 : nt!KeBalanceSetManager+0x155
fffff889`28a97c10 fffff804`6efc9f98 : fffff804`6d200180 ffffd789`3fae0080 fffff804`6ef1e1e0 a9b31472`6939c846 : nt!PspSystemThreadStartup+0x55
fffff889`28a97c60 00000000`00000000 : fffff889`28a98000 fffff889`28a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffd1837b6976a9-ffffd1837b6976ae  6 bytes - win32kbase!DirectComposition::CAnimationMarshaler::SetReferenceProperty+49
    [ ff 15 01 e1 19 00:e8 f2 db 20 00 90 ]
    ffffd1837b697729-ffffd1837b69772a  2 bytes - win32kbase!SfmSignalTokenEvent+19 (+0x80)
    [ 48 ff:4c 8b ]
    ffffd1837b697730-ffffd1837b697733  4 bytes - win32kbase!SfmSignalTokenEvent+20 (+0x07)
    [ 0f 1f 44 00:e8 eb dc 20 ]
12 errors : !win32kbase (ffffd1837b6976a9-ffffd1837b697733)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff012c38a9000
Arg3: 0000000200000000
Arg4: 0000000000000000

Debugging Details:
------------------


MEMORY_CORRUPTOR:  LARGE

BUGCHECK_STR:  0x1a_41792

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

STACK_TEXT:
fffff104`37bbec08 fffff807`14c0fb1a : 00000000`0000001a 00000000`00041792 fffff012`c38a9000 00000002`00000000 : nt!KeBugCheckEx
fffff104`37bbec10 fffff807`14a733f7 : ffffbc81`bda2d580 fffff012`c38a9000 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a92a
fffff104`37bbed20 fffff807`14a738b1 : fffff104`37bbf170 fffff078`0961c548 00000000`00000000 0a000000`6c0d6867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff104`37bbede0 fffff807`14a738b1 : fffff104`37bbf170 fffff078`3c04b0e0 00000000`00000000 0a000000`032d5867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbeea0 fffff807`14a738b1 : fffff104`37bbf170 fffff078`3c1e0258 fffff078`00000000 8a000001`799d4867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbef60 fffff807`14a7303c : fffff104`37bbf170 fffff078`3c12a408 fffff078`00000000 ffffbc81`bda2d580 : nt!MiWalkPageTablesRecursively+0x6a1
fffff104`37bbf020 fffff807`14a714a8 : fffff104`37bbf170 00000000`00000002 ffffbc81`00000001 fffff807`00000000 : nt!MiWalkPageTables+0x36c
fffff104`37bbf120 fffff807`14a7f600 : ffffffff`ffffffff ffffbc81`bda2d3f8 ffffbc81`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff104`37bbf4c0 fffff807`14fdb8bd : ffffbc81`bfb7f2c0 00000000`00000000 ffffbc81`bddd9830 ffffbc81`bfb7f2c0 : nt!MiDeleteVad+0x860
fffff104`37bbf680 fffff807`14fdae0f : ffffbc81`bf7e53a0 ffffbc81`bf7e53a0 ffffbc81`bda2d080 fffff807`14e68340 : nt!MiCleanVad+0x4d
fffff104`37bbf6b0 fffff807`1506ba69 : ffffffff`00000000 ffffffff`ffffffff fffff104`37bbf901 ffffbc81`bda2d080 : nt!MmCleanProcessAddressSpace+0x137
fffff104`37bbf730 fffff807`15024a23 : ffffbc81`bda2d080 ffffac00`5ee240a0 fffff104`37bbf959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffff104`37bbf7b0 fffff807`150222d3 : 00000000`c0000005 ffffbc81`bfb7f201 00000097`44222000 00000000`0000000f : nt!PspExitThread+0x60b
fffff104`37bbf8c0 fffff807`14aa6321 : ffffbc81`bfb7f3c0 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33
fffff104`37bbf900 fffff807`14bc6ef0 : ffffbc81`bfb7f201 fffff104`37bbf9c0 ffffbc81`bfb7f2c0 ffff9680`00000000 : nt!KiDeliverApc+0x481
fffff104`37bbf9c0 fffff807`14bd42ff : ffffbc81`bfb7f2c0 00000000`00000000 00000000`00000000 fffff104`37bbfb80 : nt!KiInitiateUserApc+0x70
fffff104`37bbfb00 00007ffe`ec05f9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000097`4abff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ec05f9a4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80714a5a0f3-fffff80714a5a0f7  5 bytes - nt!MiDispatchFault+383
    [ d7 be 7d fb f6:07 1e 3c 78 f0 ]
    fffff80714a5a0fd-fffff80714a5a101  5 bytes - nt!MiDispatchFault+38d (+0x0a)
    [ df be 7d fb f6:0f 1e 3c 78 f0 ]
    fffff80714a5a107-fffff80714a5a10b  5 bytes - nt!MiDispatchFault+397 (+0x0a)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a5a110-fffff80714a5a115  6 bytes - nt!MiDispatchFault+3a0 (+0x09)
    [ 68 df be 7d fb f6:00 0f 1e 3c 78 f0 ]
    fffff80714a5bdac-fffff80714a5bdb0  5 bytes - nt!MiCompletePrivateZeroFault+6ac (+0x1c9c)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a5bdcd-fffff80714a5bdce  2 bytes - nt!MiCompletePrivateZeroFault+6cd (+0x21)
    [ 80 f6:00 f0 ]
    fffff80714a5bdec - nt!MiCompletePrivateZeroFault+6ec (+0x1f)
    [ fa:a8 ]
    fffff80714a73075-fffff80714a73076  2 bytes - nt!MiWalkPageTables+3a5 (+0x17289)
    [ 80 f6:00 f0 ]
    fffff80714a730f0-fffff80714a730f1  2 bytes - nt!MiWalkPageTables+420 (+0x7b)
    [ 00 f7:80 f0 ]
    fffff80714a73434-fffff80714a73435  2 bytes - nt!MiWalkPageTablesRecursively+224 (+0x344)
    [ 80 f6:00 f0 ]
    fffff80714a738df-fffff80714a738e3  5 bytes - nt!MiWalkPageTablesRecursively+6cf (+0x4ab)
    [ d7 be 7d fb f6:07 1e 3c 78 f0 ]
    fffff80714a7392a-fffff80714a7392b  2 bytes - nt!MiWalkPageTablesRecursively+71a (+0x4b)
    [ 80 f6:00 f0 ]
    fffff80714a7395e-fffff80714a73963  6 bytes - nt!MiWalkPageTablesRecursively+74e (+0x34)
    [ 68 df be 7d fb f6:00 0f 1e 3c 78 f0 ]
    fffff80714a7397d-fffff80714a73981  5 bytes - nt!MiWalkPageTablesRecursively+76d (+0x1f)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a7399e-fffff80714a739a2  5 bytes - nt!MiWalkPageTablesRecursively+78e (+0x21)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a7521d-fffff80714a75221  5 bytes - nt!MiDeleteVa+2d (+0x187f)
    [ d0 be 7d fb f6:00 1e 3c 78 f0 ]
    fffff80714a7522d-fffff80714a75231  5 bytes - nt!MiDeleteVa+3d (+0x10)
    [ d7 be 7d fb f6:07 1e 3c 78 f0 ]
    fffff80714a75284-fffff80714a75285  2 bytes - nt!MiDeleteVa+94 (+0x57)
    [ 80 f6:00 f0 ]
    fffff80714a752b2-fffff80714a752b4  3 bytes - nt!MiDeleteVa+c2 (+0x2e)
    [ 40 fb f6:00 78 f0 ]
    fffff80714c0fb72-fffff80714c0fb76  5 bytes - nt!MiDeleteVa+19a982 (+0x19a8c0)
    [ df be 7d fb f6:0f 1e 3c 78 f0 ]
    fffff80714c0fb8a-fffff80714c0fb8e  5 bytes - nt!MiDeleteVa+19a99a (+0x18)
    [ d7 be 7d fb f6:07 1e 3c 78 f0 ]
83 errors : !nt (fffff80714a5a0f3-fffff80714c0fb8e)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8027aeab1e6, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 00000078fffffff8, Parameter 1 of the exception

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
00000078fffffff8

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!RtlpHpVsChunkSplit+5a6
fffff802`7aeab1e6 334ff8          xor     ecx,dword ptr [rdi-8]

EXCEPTION_PARAMETER2:  00000078fffffff8

BUGCHECK_STR:  0x1E_c0000005_R

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_RECORD:  ffffba5d2e974000 -- (.exr 0xffffba5d2e974000)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 1653426279
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
   Parameter[2]: 0000000000000000
   Parameter[3]: 0000000000000000
   Parameter[4]: 0000000000000000
   Parameter[5]: 0000000000000000
   Parameter[6]: 0000000000000000
   Parameter[7]: 0000000000000000
   Parameter[8]: 0000000000000000
   Parameter[9]: 0000000000000000
   Parameter[10]: 0000000000000000
   Parameter[11]: 0000000000000000
   Parameter[12]: 0000000000000000
   Parameter[13]: 0000000000000000
   Parameter[14]: 0000000000000000

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff8027b019d71 to fffff8027afc2990

STACK_TEXT:
ffff9708`85af36f8 fffff802`7b019d71 : 00000000`0000001e ffffffff`c0000005 fffff802`7aeab1e6 00000000`00000000 : nt!KeBugCheckEx
ffff9708`85af3700 fffff802`7afd495d : ffffba5d`2e974000 ffff9708`85af3f90 ffff8000`00000000 00000078`fffffff8 : nt!KiDispatchException+0x18c871
ffff9708`85af3db0 fffff802`7afd0b43 : 00000000`00003000 ffff9708`85af3fd0 ffffd287`f2800290 ffff980c`565089a8 : nt!KiExceptionDispatch+0x11d
ffff9708`85af3f90 fffff802`7aeab1e6 : ffffd288`062dcfe0 ffffd288`062dc430 00000000`00000000 ffffd288`062d8018 : nt!KiPageFault+0x443
ffff9708`85af4120 fffff802`7aeaab49 : ffffd288`062dcfe0 ffffd288`062dafe0 00000000`00000000 00000000`0000cfe0 : nt!RtlpHpVsChunkSplit+0x5a6
ffff9708`85af41f0 fffff802`7ae9a958 : 00000000`00000145 00000000`00001430 00000000`00001430 ffffd287`f2800000 : nt!RtlpHpVsContextAllocateInternal+0x3c9
ffff9708`85af4260 fffff802`7b16e06d : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00001429 : nt!ExAllocateHeapPool+0x418
ffff9708`85af43a0 fffff802`7b4bc256 : 00000000`00000000 00000000`00009200 ffffd288`06723000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
ffff9708`85af43f0 fffff802`7ae0536b : 00000000`00000000 ffff980c`5a133a10 00000000`00000000 00000000`00000000 : nt!PfSnScenarioAlloc+0x16
ffff9708`85af4420 fffff802`7b3c1b63 : 00000000`00001429 00000000`00000000 ffff9708`85af4510 ffff9708`85af4520 : nt!SmDecompressBuffer+0xcb
ffff9708`85af44c0 fffff802`7b3c3c95 : 00007ffe`e4e80000 00000000`00000003 ffff980c`5393d3a0 fffff802`7aea1c1d : nt!PfSnGetPrefetchInstructions+0x257
ffff9708`85af4600 fffff802`7b3c31b9 : ffff980c`5a56a080 ffff9708`85af4710 ffff9708`00000000 00000000`00000000 : nt!PfSnBeginScenario+0x1f5
ffff9708`85af46a0 fffff802`7b3c3015 : ffff980c`5ae6bdd0 ffff980c`5a56a080 ffff9708`85af4b80 ffff980c`5a56a080 : nt!PfSnBeginAppLaunch+0x169
ffff9708`85af48a0 fffff802`7b3cbeba : fffff802`75ba0180 ffff980c`5ae6bdd0 ffff980c`5393d080 ffff980c`00000000 : nt!PfProcessCreateNotification+0x5d
ffff9708`85af48d0 fffff802`7afca308 : fffff802`75ba0180 ffff980c`5393d080 ffff980c`53823080 00000000`00000000 : nt!PspUserThreadStartup+0x14a
ffff9708`85af49c0 fffff802`7afca270 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x28
ffff9708`85af4b00 00007ffe`e4eece30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
000000ee`6d0dff98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e4eece30


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !hal
    fffff8027ad5dd03 - hal!HalpApicRequestInterrupt+a3
    [ 00:90 ]
    fffff8027ad5dd71-fffff8027ad5dd76  6 bytes - hal!HalpApicRequestInterrupt+111 (+0x6e)
    [ ff 15 99 7b 07 00:e8 2a 55 3f 00 90 ]
    fffff8027ad5f285-fffff8027ad5f286  2 bytes - hal!HalpTimerClockIpiRoutine+15 (+0x1514)
    [ 48 ff:4c 8b ]
    fffff8027ad5f28c-fffff8027ad5f28f  4 bytes - hal!HalpTimerClockIpiRoutine+1c (+0x07)
    [ 0f 1f 44 00:e8 bf 87 0e ]
    fffff8027ad5f2e7-fffff8027ad5f2ec  6 bytes - hal!HalpTimerClockIpiRoutine+77 (+0x5b)
    [ ff 15 23 66 07 00:e8 b4 3f 3f 00 90 ]
19 errors : !hal (fffff8027ad5dd03-fffff8027ad5f2ec)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff30000292008
Arg3: 0000009400000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41792

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  Discord.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff8077dc0fb1a to fffff8077dbc2990

STACK_TEXT:
ffffec86`d6b24c08 fffff807`7dc0fb1a : 00000000`0000001a 00000000`00041792 fffff300`00292008 00000094`00000000 : nt!KeBugCheckEx
ffffec86`d6b24c10 fffff807`7da733f7 : ffffb607`3fc13580 fffff300`00292008 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x19a92a
ffffec86`d6b24d20 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`80001490 00000000`00000000 0a000000`6c0d4867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffec86`d6b24de0 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`bcc00008 00000000`00000000 0a000000`8f4cf867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b24ea0 fffff807`7da738b1 : ffffec86`d6b25170 fffff379`bcde6000 fffff379`00000000 8a000000`368f0867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b24f60 fffff807`7da7303c : ffffec86`d6b25170 ffffa02d`40000000 ffffa02d`00000000 ffffb607`3fc13580 : nt!MiWalkPageTablesRecursively+0x6a1
ffffec86`d6b25020 fffff807`7da714a8 : ffffec86`d6b25170 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffec86`d6b25120 fffff807`7da7f600 : ffffffff`ffffffff ffffb607`3fc133f8 ffffb607`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffec86`d6b254c0 fffff807`7dfdb8bd : ffffb607`43721080 00000000`00000000 ffffb607`4888d430 ffffb607`43721080 : nt!MiDeleteVad+0x860
ffffec86`d6b25680 fffff807`7dfdae0f : ffffb607`4888d660 ffffb607`4888d660 ffffb607`3fc13080 fffff807`7de68340 : nt!MiCleanVad+0x4d
ffffec86`d6b256b0 fffff807`7e06ba69 : ffffffff`00000000 ffffffff`ffffffff ffffec86`d6b25901 ffffb607`3fc13080 : nt!MmCleanProcessAddressSpace+0x137
ffffec86`d6b25730 fffff807`7e024a23 : ffffb607`3fc13080 ffffcc83`553760a0 ffffec86`d6b25959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffec86`d6b257b0 fffff807`7e0222d3 : 00000000`c0000005 ffffb607`43721001 00000000`00224000 00000000`0000000f : nt!PspExitThread+0x60b
ffffec86`d6b258c0 fffff807`7daa6321 : ffffb607`43721180 00000000`00000001 00000000`00000000 00000000`00000100 : nt!KiSchedulerApcTerminate+0x33
ffffec86`d6b25900 fffff807`7dbc6ef0 : ffffb607`43721001 ffffec86`d6b259c0 ffffb607`43721080 00000000`00000000 : nt!KiDeliverApc+0x481
ffffec86`d6b259c0 fffff807`7dbd42ff : ffffb607`43721080 00000000`00000000 00000000`00000000 ffffb607`45bd6d60 : nt!KiInitiateUserApc+0x70
ffffec86`d6b25b00 00000000`77841cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0e43f1b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77841cbc


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8077da73075-fffff8077da73076  2 bytes - nt!MiWalkPageTables+3a5
    [ 80 f6:00 f3 ]
    fffff8077da730f0-fffff8077da730f1  2 bytes - nt!MiWalkPageTables+420 (+0x7b)
    [ 00 f7:80 f3 ]
    fffff8077da73434-fffff8077da73435  2 bytes - nt!MiWalkPageTablesRecursively+224 (+0x344)
    [ 80 f6:00 f3 ]
    fffff8077da738df-fffff8077da738e3  5 bytes - nt!MiWalkPageTablesRecursively+6cf (+0x4ab)
    [ d7 be 7d fb f6:67 de bc 79 f3 ]
    fffff8077da7392a-fffff8077da7392b  2 bytes - nt!MiWalkPageTablesRecursively+71a (+0x4b)
    [ 80 f6:00 f3 ]
    fffff8077da7395e-fffff8077da73963  6 bytes - nt!MiWalkPageTablesRecursively+74e (+0x34)
    [ 68 df be 7d fb f6:30 6f de bc 79 f3 ]
    fffff8077da7397d-fffff8077da73981  5 bytes - nt!MiWalkPageTablesRecursively+76d (+0x1f)
    [ d0 be 7d fb f6:60 de bc 79 f3 ]
    fffff8077da7399e-fffff8077da739a2  5 bytes - nt!MiWalkPageTablesRecursively+78e (+0x21)
    [ d0 be 7d fb f6:60 de bc 79 f3 ]
    fffff8077da7521d-fffff8077da75221  5 bytes - nt!MiDeleteVa+2d (+0x187f)
    [ d0 be 7d fb f6:60 de bc 79 f3 ]
    fffff8077da7522d-fffff8077da75231  5 bytes - nt!MiDeleteVa+3d (+0x10)
    [ d7 be 7d fb f6:67 de bc 79 f3 ]
    fffff8077da75284-fffff8077da75285  2 bytes - nt!MiDeleteVa+94 (+0x57)
    [ 80 f6:00 f3 ]
    fffff8077da752b2-fffff8077da752b4  3 bytes - nt!MiDeleteVa+c2 (+0x2e)
    [ 40 fb f6:80 79 f3 ]
    fffff8077dc0fb72-fffff8077dc0fb76  5 bytes - nt!MiDeleteVa+19a982 (+0x19a8c0)
    [ df be 7d fb f6:6f de bc 79 f3 ]
    fffff8077dc0fb8a-fffff8077dc0fb8e  5 bytes - nt!MiDeleteVa+19a99a (+0x18)
    [ d7 be 7d fb f6:67 de bc 79 f3 ]
54 errors : !nt (fffff8077da73075-fffff8077dc0fb8e)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffffab398186a008
Arg3: 8000000b62df1867
Arg4: ffffad8869246600

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41201

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff802635ffab0 to fffff802635c2990

STACK_TEXT:
ffff8900`b1f33548 fffff802`635ffab0 : 00000000`0000001a 00000000`00041201 ffffab39`8186a008 8000000b`62df1867 : nt!KeBugCheckEx
ffff8900`b1f33550 fffff802`63454731 : ffffab39`8186a010 8000000b`62df1867 fffff802`00000002 ffffab55`9cc0c350 : nt!MiGetPageProtection+0x1abdc0
ffff8900`b1f335c0 fffff802`634f4c40 : 00000000`00000000 00000000`00000000 00000000`00000282 fffff802`6349d1b4 : nt!MiQueryAddressState+0x5c1
ffff8900`b1f337e0 fffff802`639e5c47 : ffff8900`b1f33b80 00007303`0d400000 ffff8900`00000000 000000e6`00000001 : nt!MiQueryAddressSpan+0x140
ffff8900`b1f338a0 fffff802`639e56e5 : ffffab55`80b88ca0 ffffab55`aac05c40 ffffab55`aad56028 ffffad88`68282580 : nt!MmQueryVirtualMemory+0x557
ffff8900`b1f33a40 fffff802`635d4258 : 00000000`00000000 00000000`00000000 00000000`00000000 000000e6`cd5fe478 : nt!NtQueryVirtualMemory+0x25
ffff8900`b1f33a90 00007fff`6733c4d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e6`cd5fe808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6733c4d4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff802634547cb-fffff802634547cf  5 bytes - nt!MiQueryAddressState+65b
    [ d7 be 7d fb f6:67 d5 aa 55 ab ]
    fffff80263454806-fffff8026345480b  6 bytes - nt!MiQueryAddressState+696 (+0x3b)
    [ 68 df be 7d fb f6:b0 6a d5 aa 55 ab ]
    fffff80263454828-fffff8026345482c  5 bytes - nt!MiQueryAddressState+6b8 (+0x22)
    [ d0 be 7d fb f6:60 d5 aa 55 ab ]
    fffff8026345bdac-fffff8026345bdb0  5 bytes - nt!MiCompletePrivateZeroFault+6ac (+0x7584)
    [ d0 be 7d fb f6:60 d5 aa 55 ab ]
    fffff8026345bdcd-fffff8026345bdce  2 bytes - nt!MiCompletePrivateZeroFault+6cd (+0x21)
    [ 80 f6:00 ab ]
    fffff8026345bdec - nt!MiCompletePrivateZeroFault+6ec (+0x1f)
    [ fa:fb ]
    fffff802639e5d11-fffff802639e5d15  5 bytes - nt!MmQueryVirtualMemory+621
    [ ff e0 cc cc cc:e8 8a d3 d6 ff ]
29 errors : !nt (fffff802634547cb-fffff802639e5d15)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Hocam uygun olduğumda yapacağım şuanlık dersim var ve bu kod lazım mı bana? Bir de 8GB RAM var kaç saat sürer ortalama.
 
Konuyu unuttunuz mu? Bellek testini ne zaman yapacaksınız :)? Sorununuz çözüldü mü?
Hocam üşendiğim için ve babamdan dolayı bilgisayarı açık bırakamadım ve MemTest yapamadım fakat Windows sürümünü 2004 yaptıktan sonra sadece Valorant adlı oyunda 5-6 saatle arayla oynadıktan sonra arada yük altına girince "cııızzzzzzz" diye ses geliyor fakat ekranda mavi ekran değil kırmızı renk oluyor bu da Valorant yüzünden sanırım. Bunla alışacağım fakat MemTest'i en yakında yapmaya çalışacağım.
 
Kırmızı ekranda bir yazı yazıyor mu? Yoksa sadece kırmızı mı? Sorununuz çözülmüş sanırım. Kırmızı ekranın sebebi Valorant. Artık konunun adı anlamlı çökmeler olsun :). Anlamsız çökme olmaz.
 

Yeni konular

Geri
Yukarı