ATTEMPTED_WRITE_TO_READONLY_MEMORY mavi ekran hatası

Justpub

Hectopat
Katılım
13 Aralık 2019
Mesajlar
552
Arkadaşlar yaklaşık 2 hafta önce kadar masaüstü bilgisayar topladım.
Sistem şu şekilde;
  • Gigabyte B450M S2H
  • AMD R5 3600 (Stock soğutculu )
  • G.Skill 2x8 3000 MHz
  • Sapphire Pulse RX 5700
  • Coolmaster MB520 (650W 80+)
  • XPG SPECTRIX S40G
(Sistemde OC yoktur. İşlemci CPB kapalıdır. )

Aldığım günden beri birkaç defa mavi ekran hatasıyla karşılaştım. Yapılması gereken birkaç test olduğunu okudum ve bunları da atıyorum sorunun neden kaynaklı olduğu konusunda yardımcı olabilirseniz sevinirim.

(Son iki mavi ekran şöyle meydana geldi, bilgisayar açıldıktan 5 10 saniye sonra Rocket League ve Spotify açmaya çalıştım. Mavi ekran yedim. En son olan yani bugün PC açıldıktan yine 5 10 saniye sonra Chrome açtım en sonuncu mavi ekranı yedim. Bu herzaman olmuyor ama. )


Minidump Dosyası: Minidump

5b57278e-b553-4693-84f6-c9edb081af88.jpg
5c95e1fd-b33b-47d5-a16d-52034d24e695.jpg
3436ba87-4641-4182-9f58-cb2b63003e7a.jpg
c1a5d68d-3014-412d-af07-2c07c4009e3d.jpg
c4f37865-e791-46f3-b624-041c50ab56a3.jpg
Ek Açıklama 2019-12-23 122301.png
Ek Açıklama 2019-12-23 123330.png



Ekstra olarak sistemle ilgili MSI Afterburner sonuçları için açtığım bir konuda var.

MSI Afterburner oyun sonucları
 
RAM Slotlarını değiştirmeyi denedin mi, Normalde bende mavi slotta ikisi de sen siyah slota tak ayrı ayrı onları bir öyle dene bakalım. Belki RAM slotuyla alakalı bir problem olabilir.
 
Son düzenleyen: Moderatör:
Bellek sorunu/arızası. Memtest her zaman tespit edemeyebiliyor. Frekansı düşürün, sorun devam ederse garantiye gönderin.

Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff3799ffdd1d8, Virtual address for the attempted write.
Arg2: 1a000003bf927025, PTE contents.
Arg3: fffff387f58de580, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 9

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: be

BUGCHECK_P1: fffff3799ffdd1d8

BUGCHECK_P2: 1a000003bf927025

BUGCHECK_P3: fffff387f58de580

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME:  fffff387f58deab0 -- (.trap 0xfffff387f58deab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ff7477bff00 rbx=0000000000000000 rcx=0000000000005a4d
rdx=00007ff7477c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806344c27cd rsp=fffff387f58dec48 rbp=fffff387f58df360
r8=0000000000000000 r9=fffff387f58dec88 r10=0000000000000000
r11=fffff387f58deb70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlImageNtHeaderEx+0x2d:
fffff806`344c27cd 66390a cmp word ptr [rdx],cx ds:00007ff7`477c0000=????
Resetting default scope

STACK_TEXT:
fffff387`f58de398 fffff806`3464f0d5 : 00000000`000000be fffff379`9ffdd1d8 1a000003`bf927025 fffff387`f58de580 : nt!KeBugCheckEx
fffff387`f58de3a0 fffff806`3447302a : 1a000003`bf927025 00000000`00000003 fffff387`f58de4e0 00000000`00000000 : nt!MiRaisedIrqlFault+0x12eb35
fffff387`f58de3e0 fffff806`345cf520 : 00000000`00000001 fffff379`bccffee8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffff387`f58de580 fffff806`344c10de : ffff9900`0b3eb750 fffff379`802d1d40 00100000`00000000 ffffb80b`29dcd5c0 : nt!KiPageFault+0x360
fffff387`f58de710 fffff806`344739bc : fffff37f`ffffffff fffff300`00000000 fffff300`00000000 fffff379`9ffdd1d8 : nt!MiInPagePageTable+0x1ee
fffff387`f58de860 fffff806`34472cee : 00000000`00000000 00000000`00000000 00000000`00000001 ffffb80b`29dcdde8 : nt!MiUserFault+0x7dc
fffff387`f58de910 fffff806`345cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`349ff348 : nt!MmAccessFault+0x14e
fffff387`f58deab0 fffff806`344c27cd : fffff806`344c258e ffffb80b`00000000 00000000`00001000 fffff387`f58dedc0 : nt!KiPageFault+0x360
fffff387`f58dec48 fffff806`344c258e : ffffb80b`00000000 00000000`00001000 fffff387`f58dedc0 ffffb80b`00000000 : nt!RtlImageNtHeaderEx+0x2d
fffff387`f58dec50 fffff806`34a10da1 : 00007ff7`477c0000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!RtlImageNtHeader+0x1e
fffff387`f58dec80 fffff806`34a356de : 00000000`000022aa fffff387`f58df360 00000000`000022a0 00000000`00000000 : nt!MmCreatePeb+0x325
fffff387`f58dee50 fffff806`34a2f937 : 00000000`2f0e6000 fffff387`f58df360 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x10b6
fffff387`f58df2e0 fffff806`345d2d18 : 00000000`00000002 00000000`00000d4c 00000000`00000000 00000000`00000001 : nt!NtCreateUserProcess+0x6f7
fffff387`f58dfa90 00007ff9`4cd5d934 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d3`2cdfd6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4cd5d934


SYMBOL_NAME: nt!MiRaisedIrqlFault+12eb35

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 12eb35

FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup: MachineOwner
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffc000b494560
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 6

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffc000b494560

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.exe

STACK_TEXT:
fffff080`77defe88 fffff802`4fe25424 : 00000000`0000001a 00000000`00041790 fffffc00`0b494560 00000000`00000000 : nt!KeBugCheckEx
fffff080`77defe90 fffff802`4fcac9e7 : 00000000`00000000 ffffed9a`205ba3c0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c44
fffff080`77deffa0 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`cd102dd0 00000000`00000000 0a000003`c3172867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff080`77df0060 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`fb668810 00000000`00000000 0a000003`c3171867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df0120 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`fb7db340 ffffedf6`00000000 0a000003`c3170867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df01e0 fffff802`4fcac62c : fffff080`77df03f0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df02a0 fffff802`4fcaaa98 : fffff080`77df03f0 fffffc00`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff080`77df03a0 fffff802`4fcb8bf0 : ffffffff`ffffffff ffff800f`f9ace3f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff080`77df0740 fffff802`4fc591da : 00000003`440b747f ffff800f`fa689080 00000000`00000000 fffff802`4fcb3bca : nt!MiDeleteVad+0x860
fffff080`77df0900 fffff802`5025b820 : 00000000`00000000 00000000`00000000 fffff080`77df0a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff080`77df0960 fffff802`5025b45b : 00000000`00000000 0000003a`c80fc888 0000014d`00001000 00007ff8`00000004 : nt!MmFreeVirtualMemory+0x390
fffff080`77df0aa0 fffff802`4fdd2d18 : ffff800f`fa689080 0000003a`c80fcc00 00007ecf`61fc0000 ffff800f`f9dc3ee0 : nt!NtFreeVirtualMemory+0x8b
fffff080`77df0b00 00007ff8`6631c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003a`c80fc808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6631c484


SYMBOL_NAME: nt!MiDeleteVa+176c44

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 176c44

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVa

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {9b5ebc95-f4cf-8c11-5593-7f5337165669}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80159639c37, Address of the instruction which caused the bugcheck
Arg3: ffffc00c4ceffc60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 14

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80159639c37

BUGCHECK_P3: ffffc00c4ceffc60

BUGCHECK_P4: 0

CONTEXT:  ffffc00c4ceffc60 -- (.cxr 0xffffc00c4ceffc60)
rax=0000000000000000 rbx=ffff978d050ae158 rcx=ffff978d050ae0c0
rdx=ffbfd3084f052a20 rsi=ffbfd3084f052a20 rdi=ffff978d050ae440
rip=fffff80159639c37 rsp=ffffc00c4cf00650 rbp=0000000000450004
r8=ffffc00c4cf00698 r9=0000000000000000 r10=0000fffff8015956
r11=ffff978d050ae0c0 r12=0000000000000000 r13=00000000000001c0
r14=0000000000450014 r15=ffffc00c4cf00870
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExAcquirePushLockExclusiveEx+0x107:
fffff801`59639c37 f0480fba2e00 lock bts qword ptr [rsi],0 ds:002b:ffbfd308`4f052a20=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: lsass.exe

STACK_TEXT:
ffffc00c`4cf00650 fffff801`59c09e3c : ffbfd308`4f052a30 00000000`00000000 00000000`00000001 00000000`00000fc0 : nt!ExAcquirePushLockExclusiveEx+0x107
ffffc00c`4cf00690 fffff801`59c0767a : 00000000`ffffffff ffff978d`050ae001 00000000`00000000 00000000`00450014 : nt!AlpcpLockForCachedReferenceBlob+0x14
ffffc00c`4cf006d0 fffff801`59bd2e76 : 00000000`00002002 00000000`00450004 00000000`00000fc0 000001aa`17d77210 : nt!AlpcpReleaseViewAttribute+0x12
ffffc00c`4cf00700 fffff801`5964002e : 00000000`00000000 000001aa`17d77210 00000000`00000000 00000000`000f0001 : nt!AlpcpSendMessage+0x8e6
ffffc00c`4cf00830 fffff801`5963ec9d : ffff978d`056f1d90 ffffc00c`4cf00b80 ffff978d`050ae0c0 0000004c`6fbff578 : nt!ExpWorkerFactoryStartDeferredWork+0x11e
ffffc00c`4cf008f0 fffff801`597d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x22d
ffffc00c`4cf00a90 00007ff8`05cbfa54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004c`6fbff658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`05cbfa54


SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+107

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.535

STACK_COMMAND: .cxr 0xffffc00c4ceffc60 ; kb

BUCKET_ID_FUNC_OFFSET: 107

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4fe31d77-fb81-4dc1-5992-c924ac6e709a}

Followup: MachineOwner
---------

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000009b5c, Incorrect checksum
Arg4: 0000000000002e32, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 69

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump

BUGCHECK_CODE: a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: 9b5c

BUGCHECK_P4: 2e32

CUSTOMER_CRASH_COUNT: 1

STACK_TEXT:
ffffe28b`c3b64648 fffff803`2e5a6fa6 : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00009b5c : nt!KeBugCheckEx
ffffe28b`c3b64650 fffff803`2e5af194 : 00000000`00000001 ffffd08a`f7f52230 00000000`43f5e000 ffffd08b`1368b000 : nt!PopHiberChecksumHiberFileData+0xaa26
ffffe28b`c3b646b0 fffff803`2e5a64a1 : 00000001`85bfc000 ffff800c`3a521f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x78
ffffe28b`c3b64720 fffff803`2e59af9e : 00004054`20a8ab9b ffff800c`3a521f38 00000000`00000000 fffff803`2eab7848 : nt!PopRestoreHiberContext+0xb161
ffffe28b`c3b647b0 fffff803`2e59acea : fffff803`2e469f90 ffffe28b`c3b64930 fffff803`2e469f90 ffffd08a`f7f52230 : nt!PopHandleNextState+0x20e
ffffe28b`c3b64800 fffff803`2e59aa5f : 00000000`00000100 00000000`00989680 ffffd08a`f7f52230 ffffd08a`f7f52230 : nt!PopIssueNextState+0x1a
ffffe28b`c3b64830 fffff803`2e59b2ec : 00000000`0000000c ffffca80`000077c0 00000000`00000000 fffff803`2e093474 : nt!PopInvokeSystemStateHandler+0x35b
ffffe28b`c3b64a30 fffff803`2e59f6aa : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffffe28b`c3b64af0 fffff803`2e59f3e5 : 00000000`00000000 00000000`00000000 0000002e`00000001 ffffd08a`00000001 : nt!MmDuplicateMemory+0x26e
ffffe28b`c3b64b80 fffff803`2e12a7a5 : ffffd08b`06e55000 ffffd08b`06e55040 fffff803`2e59f2c0 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffffe28b`c3b64c10 fffff803`2e1c8b2a : ffffaf81`dbd40180 ffffd08b`06e55040 fffff803`2e12a750 00000000`0000029e : nt!PspSystemThreadStartup+0x55
ffffe28b`c3b64c60 00000000`00000000 : ffffe28b`c3b65000 ffffe28b`c3b5f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+aa26

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.535

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: aa26

FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff92000b493630
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 5

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff92000b493630

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ForzaHorizon4.exe

STACK_TEXT: 
fffff48d`1446ee88 fffff807`41a25424 : 00000000`0000001a 00000000`00041790 ffff9200`0b493630 00000000`00000000 : nt!KeBugCheckEx
fffff48d`1446ee90 fffff807`418ac9e7 : 00000000`00000000 ffffaa80`ac794d28 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c44
fffff48d`1446efa0 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`40563ca0 00000000`00000000 0a000003`c3121867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff48d`1446f060 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`6aa02b18 00000000`00000000 0a000002`32f3c867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f120 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`6ab55010 ffffaad5`00000000 0a000002`f35a4867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f1e0 fffff807`418ac62c : fffff48d`1446f3f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f2a0 fffff807`418aaa98 : fffff48d`1446f3f0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff48d`1446f3a0 fffff807`418b8bf0 : ffffffff`ffffffff ffff8002`e62583f8 00000158`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff48d`1446f740 fffff807`418591da : 00000000`158f89a7 ffff8002`eacb8080 00000000`00000000 fffff807`418b3bca : nt!MiDeleteVad+0x860
fffff48d`1446f900 fffff807`41e5b820 : 00000000`00000000 00000000`00000000 fffff48d`1446fa60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff48d`1446f960 fffff807`41e5b45b : ffff8002`ea382080 ffff9a81`0d4a3180 00000158`6601b300 ffffffff`ffffeb00 : nt!MmFreeVirtualMemory+0x390
fffff48d`1446faa0 fffff807`419d2d18 : ffff8002`eacb8080 ffff8002`ea382080 00000000`00000000 00000000`00000020 : nt!NtFreeVirtualMemory+0x8b
fffff48d`1446fb00 00007ffe`5417c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000c`ea5fdd98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5417c484


SYMBOL_NAME:  nt!MiDeleteVa+176c44

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  176c44

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeleteVa

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9b5ebc95-f4cf-8c11-5593-7f5337165669}

Followup:     MachineOwner
---------
 
RAM Slotlarını değiştirmeyi denedin mi, Normalde bende mavi slotta ikisi de sen siyah slota tak ayrı ayrı onları bir öyle dene bakalım. Belki RAM slotuyla alakalı bir problem olabilir.

Anakartta 2 slot bulunmakta.

Bellek sorunu/arızası. Memtest her zaman tespit edemeyebiliyor. Frekansı düşürün, sorun devam ederse garantiye gönderin.

Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff3799ffdd1d8, Virtual address for the attempted write.
Arg2: 1a000003bf927025, PTE contents.
Arg3: fffff387f58de580, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 9

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: be

BUGCHECK_P1: fffff3799ffdd1d8

BUGCHECK_P2: 1a000003bf927025

BUGCHECK_P3: fffff387f58de580

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME:  fffff387f58deab0 -- (.trap 0xfffff387f58deab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ff7477bff00 rbx=0000000000000000 rcx=0000000000005a4d
rdx=00007ff7477c0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806344c27cd rsp=fffff387f58dec48 rbp=fffff387f58df360
r8=0000000000000000 r9=fffff387f58dec88 r10=0000000000000000
r11=fffff387f58deb70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlImageNtHeaderEx+0x2d:
fffff806`344c27cd 66390a cmp word ptr [rdx],cx ds:00007ff7`477c0000=????
Resetting default scope

STACK_TEXT:
fffff387`f58de398 fffff806`3464f0d5 : 00000000`000000be fffff379`9ffdd1d8 1a000003`bf927025 fffff387`f58de580 : nt!KeBugCheckEx
fffff387`f58de3a0 fffff806`3447302a : 1a000003`bf927025 00000000`00000003 fffff387`f58de4e0 00000000`00000000 : nt!MiRaisedIrqlFault+0x12eb35
fffff387`f58de3e0 fffff806`345cf520 : 00000000`00000001 fffff379`bccffee8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x48a
fffff387`f58de580 fffff806`344c10de : ffff9900`0b3eb750 fffff379`802d1d40 00100000`00000000 ffffb80b`29dcd5c0 : nt!KiPageFault+0x360
fffff387`f58de710 fffff806`344739bc : fffff37f`ffffffff fffff300`00000000 fffff300`00000000 fffff379`9ffdd1d8 : nt!MiInPagePageTable+0x1ee
fffff387`f58de860 fffff806`34472cee : 00000000`00000000 00000000`00000000 00000000`00000001 ffffb80b`29dcdde8 : nt!MiUserFault+0x7dc
fffff387`f58de910 fffff806`345cf520 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`349ff348 : nt!MmAccessFault+0x14e
fffff387`f58deab0 fffff806`344c27cd : fffff806`344c258e ffffb80b`00000000 00000000`00001000 fffff387`f58dedc0 : nt!KiPageFault+0x360
fffff387`f58dec48 fffff806`344c258e : ffffb80b`00000000 00000000`00001000 fffff387`f58dedc0 ffffb80b`00000000 : nt!RtlImageNtHeaderEx+0x2d
fffff387`f58dec50 fffff806`34a10da1 : 00007ff7`477c0000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!RtlImageNtHeader+0x1e
fffff387`f58dec80 fffff806`34a356de : 00000000`000022aa fffff387`f58df360 00000000`000022a0 00000000`00000000 : nt!MmCreatePeb+0x325
fffff387`f58dee50 fffff806`34a2f937 : 00000000`2f0e6000 fffff387`f58df360 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x10b6
fffff387`f58df2e0 fffff806`345d2d18 : 00000000`00000002 00000000`00000d4c 00000000`00000000 00000000`00000001 : nt!NtCreateUserProcess+0x6f7
fffff387`f58dfa90 00007ff9`4cd5d934 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d3`2cdfd6a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4cd5d934


SYMBOL_NAME: nt!MiRaisedIrqlFault+12eb35

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 12eb35

FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup: MachineOwner
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffc000b494560
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 6

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffffc000b494560

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.exe

STACK_TEXT:
fffff080`77defe88 fffff802`4fe25424 : 00000000`0000001a 00000000`00041790 fffffc00`0b494560 00000000`00000000 : nt!KeBugCheckEx
fffff080`77defe90 fffff802`4fcac9e7 : 00000000`00000000 ffffed9a`205ba3c0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c44
fffff080`77deffa0 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`cd102dd0 00000000`00000000 0a000003`c3172867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff080`77df0060 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`fb668810 00000000`00000000 0a000003`c3171867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df0120 fffff802`4fcacea1 : fffff080`77df03f0 ffffedf6`fb7db340 ffffedf6`00000000 0a000003`c3170867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df01e0 fffff802`4fcac62c : fffff080`77df03f0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x6a1
fffff080`77df02a0 fffff802`4fcaaa98 : fffff080`77df03f0 fffffc00`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff080`77df03a0 fffff802`4fcb8bf0 : ffffffff`ffffffff ffff800f`f9ace3f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff080`77df0740 fffff802`4fc591da : 00000003`440b747f ffff800f`fa689080 00000000`00000000 fffff802`4fcb3bca : nt!MiDeleteVad+0x860
fffff080`77df0900 fffff802`5025b820 : 00000000`00000000 00000000`00000000 fffff080`77df0a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff080`77df0960 fffff802`5025b45b : 00000000`00000000 0000003a`c80fc888 0000014d`00001000 00007ff8`00000004 : nt!MmFreeVirtualMemory+0x390
fffff080`77df0aa0 fffff802`4fdd2d18 : ffff800f`fa689080 0000003a`c80fcc00 00007ecf`61fc0000 ffff800f`f9dc3ee0 : nt!NtFreeVirtualMemory+0x8b
fffff080`77df0b00 00007ff8`6631c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003a`c80fc808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6631c484


SYMBOL_NAME: nt!MiDeleteVa+176c44

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 176c44

FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVa

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {9b5ebc95-f4cf-8c11-5593-7f5337165669}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80159639c37, Address of the instruction which caused the bugcheck
Arg3: ffffc00c4ceffc60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 14

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80159639c37

BUGCHECK_P3: ffffc00c4ceffc60

BUGCHECK_P4: 0

CONTEXT:  ffffc00c4ceffc60 -- (.cxr 0xffffc00c4ceffc60)
rax=0000000000000000 rbx=ffff978d050ae158 rcx=ffff978d050ae0c0
rdx=ffbfd3084f052a20 rsi=ffbfd3084f052a20 rdi=ffff978d050ae440
rip=fffff80159639c37 rsp=ffffc00c4cf00650 rbp=0000000000450004
r8=ffffc00c4cf00698 r9=0000000000000000 r10=0000fffff8015956
r11=ffff978d050ae0c0 r12=0000000000000000 r13=00000000000001c0
r14=0000000000450014 r15=ffffc00c4cf00870
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExAcquirePushLockExclusiveEx+0x107:
fffff801`59639c37 f0480fba2e00 lock bts qword ptr [rsi],0 ds:002b:ffbfd308`4f052a20=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: lsass.exe

STACK_TEXT:
ffffc00c`4cf00650 fffff801`59c09e3c : ffbfd308`4f052a30 00000000`00000000 00000000`00000001 00000000`00000fc0 : nt!ExAcquirePushLockExclusiveEx+0x107
ffffc00c`4cf00690 fffff801`59c0767a : 00000000`ffffffff ffff978d`050ae001 00000000`00000000 00000000`00450014 : nt!AlpcpLockForCachedReferenceBlob+0x14
ffffc00c`4cf006d0 fffff801`59bd2e76 : 00000000`00002002 00000000`00450004 00000000`00000fc0 000001aa`17d77210 : nt!AlpcpReleaseViewAttribute+0x12
ffffc00c`4cf00700 fffff801`5964002e : 00000000`00000000 000001aa`17d77210 00000000`00000000 00000000`000f0001 : nt!AlpcpSendMessage+0x8e6
ffffc00c`4cf00830 fffff801`5963ec9d : ffff978d`056f1d90 ffffc00c`4cf00b80 ffff978d`050ae0c0 0000004c`6fbff578 : nt!ExpWorkerFactoryStartDeferredWork+0x11e
ffffc00c`4cf008f0 fffff801`597d2d18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x22d
ffffc00c`4cf00a90 00007ff8`05cbfa54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004c`6fbff658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`05cbfa54


SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+107

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.535

STACK_COMMAND: .cxr 0xffffc00c4ceffc60 ; kb

BUCKET_ID_FUNC_OFFSET: 107

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExAcquirePushLockExclusiveEx

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {4fe31d77-fb81-4dc1-5992-c924ac6e709a}

Followup: MachineOwner
---------

INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 0000000000009b5c, Incorrect checksum
Arg4: 0000000000002e32, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 69

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump

BUGCHECK_CODE: a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: 9b5c

BUGCHECK_P4: 2e32

CUSTOMER_CRASH_COUNT: 1

STACK_TEXT:
ffffe28b`c3b64648 fffff803`2e5a6fa6 : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`00009b5c : nt!KeBugCheckEx
ffffe28b`c3b64650 fffff803`2e5af194 : 00000000`00000001 ffffd08a`f7f52230 00000000`43f5e000 ffffd08b`1368b000 : nt!PopHiberChecksumHiberFileData+0xaa26
ffffe28b`c3b646b0 fffff803`2e5a64a1 : 00000001`85bfc000 ffff800c`3a521f38 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x78
ffffe28b`c3b64720 fffff803`2e59af9e : 00004054`20a8ab9b ffff800c`3a521f38 00000000`00000000 fffff803`2eab7848 : nt!PopRestoreHiberContext+0xb161
ffffe28b`c3b647b0 fffff803`2e59acea : fffff803`2e469f90 ffffe28b`c3b64930 fffff803`2e469f90 ffffd08a`f7f52230 : nt!PopHandleNextState+0x20e
ffffe28b`c3b64800 fffff803`2e59aa5f : 00000000`00000100 00000000`00989680 ffffd08a`f7f52230 ffffd08a`f7f52230 : nt!PopIssueNextState+0x1a
ffffe28b`c3b64830 fffff803`2e59b2ec : 00000000`0000000c ffffca80`000077c0 00000000`00000000 fffff803`2e093474 : nt!PopInvokeSystemStateHandler+0x35b
ffffe28b`c3b64a30 fffff803`2e59f6aa : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000014 00000000`00000000 : nt!PopEndMirroring+0x1ec
ffffe28b`c3b64af0 fffff803`2e59f3e5 : 00000000`00000000 00000000`00000000 0000002e`00000001 ffffd08a`00000001 : nt!MmDuplicateMemory+0x26e
ffffe28b`c3b64b80 fffff803`2e12a7a5 : ffffd08b`06e55000 ffffd08b`06e55040 fffff803`2e59f2c0 00000000`00000001 : nt!PopTransitionToSleep+0x125
ffffe28b`c3b64c10 fffff803`2e1c8b2a : ffffaf81`dbd40180 ffffd08b`06e55040 fffff803`2e12a750 00000000`0000029e : nt!PspSystemThreadStartup+0x55
ffffe28b`c3b64c60 00000000`00000000 : ffffe28b`c3b65000 ffffe28b`c3b5f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+aa26

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.535

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: aa26

FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff92000b493630
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 5

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff92000b493630

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  ForzaHorizon4.exe

STACK_TEXT:
fffff48d`1446ee88 fffff807`41a25424 : 00000000`0000001a 00000000`00041790 ffff9200`0b493630 00000000`00000000 : nt!KeBugCheckEx
fffff48d`1446ee90 fffff807`418ac9e7 : 00000000`00000000 ffffaa80`ac794d28 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c44
fffff48d`1446efa0 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`40563ca0 00000000`00000000 0a000003`c3121867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff48d`1446f060 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`6aa02b18 00000000`00000000 0a000002`32f3c867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f120 fffff807`418acea1 : fffff48d`1446f3f0 ffffaad5`6ab55010 ffffaad5`00000000 0a000002`f35a4867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f1e0 fffff807`418ac62c : fffff48d`1446f3f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
fffff48d`1446f2a0 fffff807`418aaa98 : fffff48d`1446f3f0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff48d`1446f3a0 fffff807`418b8bf0 : ffffffff`ffffffff ffff8002`e62583f8 00000158`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff48d`1446f740 fffff807`418591da : 00000000`158f89a7 ffff8002`eacb8080 00000000`00000000 fffff807`418b3bca : nt!MiDeleteVad+0x860
fffff48d`1446f900 fffff807`41e5b820 : 00000000`00000000 00000000`00000000 fffff48d`1446fa60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
fffff48d`1446f960 fffff807`41e5b45b : ffff8002`ea382080 ffff9a81`0d4a3180 00000158`6601b300 ffffffff`ffffeb00 : nt!MmFreeVirtualMemory+0x390
fffff48d`1446faa0 fffff807`419d2d18 : ffff8002`eacb8080 ffff8002`ea382080 00000000`00000000 00000000`00000020 : nt!NtFreeVirtualMemory+0x8b
fffff48d`1446fb00 00007ffe`5417c484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000c`ea5fdd98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5417c484


SYMBOL_NAME:  nt!MiDeleteVa+176c44

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  176c44

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeleteVa

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9b5ebc95-f4cf-8c11-5593-7f5337165669}

Followup:     MachineOwner
---------

Kaça düşürmeliyim Recep Bey ve bu performansı çok etkiler mi ? Garantiye yollasam bir sorun yok derler mi ?
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı