ATTEMPTED_WRITE_TO_READONLY_MEMORY Mavi ekran hatası

Memtest86 ile USB üzerinden RAM hata testi yapar mısın? Bir de ne olur ne olmaz HDD Sentinel ile bad sector testi yapıp sağlığına falan bak diskin.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb903d9005a10, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80533c25a18, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 37

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb903d9005a10

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80533c25a18

BUGCHECK_P4: 2

READ_ADDRESS: fffff805346fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053460f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8053460f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffb903d9005a10

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff18b4ca29790 -- (.trap 0xfffff18b4ca29790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffce0c12b6b040
rdx=ffffb903d9005a10 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80533c25a18 rsp=fffff18b4ca29920 rbp=0000000000000000
 r8=fffff18b4ca29970  r9=0000000000000022 r10=00000000ffffffff
r11=0000000000000088 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExAcquirePushLockExclusiveEx+0x108:
fffff805`33c25a18 f0480fba2e00    lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
fffff18b`4ca294e8 fffff805`33e35c1d : 00000000`00000050 ffffb903`d9005a10 00000000`00000002 fffff18b`4ca29790 : nt!KeBugCheckEx
fffff18b`4ca294f0 fffff805`33c12ce0 : fffff18b`4ca296dc 00000000`00000002 fffff18b`4ca29810 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff18b`4ca295f0 fffff805`33debb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff18b`4ca29790 fffff805`33c25a18 : ffffce0c`12b6b040 ffffb903`d9005a10 ffffce0c`12b6b040 00000000`00000000 : nt!KiPageFault+0x35e
fffff18b`4ca29920 fffff805`33c689c6 : ffffb903`d9005a00 ffffce0c`00000000 00000000`00000000 ffffbb03`e7f76000 : nt!ExAcquirePushLockExclusiveEx+0x108
fffff18b`4ca29960 fffff805`33c66e44 : 00000000`00000001 ffff8180`427a4ad0 ffffce0c`1b19cb80 ffffce0c`1adfd640 : nt!RtlpHpAcquireLockExclusive+0x2a
fffff18b`4ca29990 fffff805`33c40a72 : ffffbb03`d9000340 00000000`400000ff 00000000`00000000 fffff18b`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244
fffff18b`4ca29a40 fffff805`343c1019 : ffffce0c`00000000 ffffce0c`1b19cb80 00000000`2a807471 01000000`00100000 : nt!ExFreeHeapPool+0x362
fffff18b`4ca29b20 fffff805`381397d7 : fffff805`3812c920 fffff805`38133000 ffffbb03`e69a3910 00000000`00000000 : nt!ExFreePool+0x9
fffff18b`4ca29b50 fffff805`3812c920 : fffff805`38133000 ffffbb03`e69a3910 00000000`00000000 ffffbb03`e7f86058 : WdFilter+0x197d7
fffff18b`4ca29b58 fffff805`38133000 : ffffbb03`e69a3910 00000000`00000000 ffffbb03`e7f86058 fffff805`381395b3 : WdFilter+0xc920
fffff18b`4ca29b60 ffffbb03`e69a3910 : 00000000`00000000 ffffbb03`e7f86058 fffff805`381395b3 ffffce0c`12b6a880 : WdFilter+0x13000
fffff18b`4ca29b68 00000000`00000000 : ffffbb03`e7f86058 fffff805`381395b3 ffffce0c`12b6a880 00000000`00000001 : 0xffffbb03`e69a3910


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.264

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_INVALID_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7a7d19a2-c846-89a6-4e1c-40c2337eab13}

Followup:     Pool_corruption
---------
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc4680202050, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8043dc25a18, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 9

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffffc4680202050

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8043dc25a18

BUGCHECK_P4: 2

READ_ADDRESS: fffff8043e6fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8043e60f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8043e60f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 fffffc4680202050

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Origin.exe

TRAP_FRAME:  fffff889d7c91440 -- (.trap 0xfffff889d7c91440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd78facdc9080
rdx=fffffc4680202050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043dc25a18 rsp=fffff889d7c915d0 rbp=0000000000000000
 r8=fffff889d7c91620  r9=0000000000000002 r10=00000000ffffffff
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExAcquirePushLockExclusiveEx+0x108:
fffff804`3dc25a18 f0480fba2e00    lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
fffff889`d7c91198 fffff804`3de35c1d : 00000000`00000050 fffffc46`80202050 00000000`00000002 fffff889`d7c91440 : nt!KeBugCheckEx
fffff889`d7c911a0 fffff804`3dc12ce0 : ffffd78f`acdc9080 00000000`00000002 fffff889`d7c914c0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff889`d7c912a0 fffff804`3ddebb1e : ffffd78f`ac9e0000 00000000`3bf9e428 fffff804`3dd51a00 fffff804`3dce73cf : nt!MmAccessFault+0x400
fffff889`d7c91440 fffff804`3dc25a18 : ffffd78f`acdc9080 fffffc46`80202050 00000000`00000032 00000000`00000000 : nt!KiPageFault+0x35e
fffff889`d7c915d0 fffff804`3dc689c6 : fffffc46`80202040 00000000`00000001 ffffd78f`00000000 fffffe46`86830000 : nt!ExAcquirePushLockExclusiveEx+0x108
fffff889`d7c91610 fffff804`3dc66e44 : fffff889`d7c91749 fffff804`00000000 fffff804`3dc34810 00000000`00000001 : nt!RtlpHpAcquireLockExclusive+0x2a
fffff889`d7c91640 fffff804`3dc40a72 : fffffe46`80200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244
fffff889`d7c916f0 fffff804`3e3c1019 : fffffe46`00000000 fffffe26`c83e16b8 fffffe26`c88b9030 01000000`00100000 : nt!ExFreeHeapPool+0x362
fffff889`d7c917d0 fffffe26`c88b9082 : fffffe46`84336010 00000000`00000000 ffffd78f`acdc9000 fffff889`d7c91710 : nt!ExFreePool+0x9
fffff889`d7c91800 fffffe26`c819c487 : 00000000`00000000 fffffe46`868305c0 fffffe46`868305c0 fffffe46`86898610 : win32kfull!Win32FreePoolImpl+0x52
fffff889`d7c91830 fffffe26`c88861a3 : fffffe46`86898610 fffffe46`86898bc0 00000000`80006010 fffffe46`86898610 : win32kbase!Win32FreePool+0x37
fffff889`d7c91860 fffffe26`c888a6e8 : fffffe46`86220b90 fffffe26`c83e16b8 00000000`00000000 fffffe46`86220b90 : win32kfull!xxxProcessNotifyWinEvent+0x35f
fffff889`d7c91900 fffffe26`c888b5dc : fffffe46`86872500 00000000`00000000 fffffe46`86872500 00000000`00000000 : win32kfull!xxxProcessEventMessage+0x2e0
fffff889`d7c91c30 fffffe26`c888fbe6 : fffffe46`84336010 fffff889`d7c929d8 00000000`00000000 00000000`00000000 : win32kfull!xxxScanSysQueue+0x83c
fffff889`d7c924e0 fffffe26`c888ec98 : fffff889`d7c929d8 00000000`00000000 00000000`00000000 fffff889`d7c92aa8 : win32kfull!xxxRealInternalGetMessage+0xee6
fffff889`d7c92980 fffffe26`c7e671ad : ffffd78f`acdc9080 00000000`005cde48 fffff889`d7c92aa8 00000000`00685000 : win32kfull!NtUserPeekMessage+0x158
fffff889`d7c92a40 fffff804`3ddef378 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtUserPeekMessage+0x29
fffff889`d7c92a90 00007ff9`17a0ff64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`005cde28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`17a0ff64


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.264

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_INVALID_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7a7d19a2-c846-89a6-4e1c-40c2337eab13}

Followup:     Pool_corruption
---------
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff928605b64ec8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff980201096dd0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff928605b64ec8

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffff980201096dd0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffff980201096dd0 -- (.trap 0xffff980201096dd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff928605b64eb0
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80009efedd9 rsp=ffff980201096f60 rbp=ffffc901646b8c90
 r8=000000000001c6c1  r9=ffffc901646b8c90 r10=0000000000000000
r11=ffffc90000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff800`09efedd9 f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffff9286`05b64ec8=????????????????
Resetting default scope

STACK_TEXT: 
ffff9802`01096bd8 fffff800`0a087340 : 00000000`000000be ffff9286`05b64ec8 8a000000`00200121 ffff9802`01096dd0 : nt!KeBugCheckEx
ffff9802`01096be0 fffff800`09e12dcf : 8a000000`00200121 00000000`00000003 ffff9802`01096e50 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec
ffff9802`01096c30 fffff800`09febb1e : ffffc964`9fff6b78 00000000`00000000 ffff9802`010974b8 00000000`00000000 : nt!MmAccessFault+0x4ef
ffff9802`01096dd0 fffff800`09efedd9 : ffffb902`d6859700 0000000f`ffffffff 000002c8`d7192000 00000000`00000003 : nt!KiPageFault+0x35e
ffff9802`01096f60 fffff800`09ec421f : ffff9286`05b64eb0 ffff9280`00000000 ffff9286`05b64eb0 ffffb902`c984b090 : nt!MiLockSetPfnPriority+0x11
ffff9802`01096f90 fffff800`09ec39b4 : ffff9286`05b64eb0 00000000`00000000 000002c8`d7192000 ffffffff`ffffffff : nt!MiAgePteWorker+0x3ef
ffff9802`01096ff0 fffff800`09e119d1 : 00000000`00000000 ffff9802`01097560 00000000`00000000 00000000`00000004 : nt!MiAgePte+0x134
ffff9802`01097080 fffff800`09e11cf0 : 00000000`00000000 ffffb902`d6859700 ffffc964`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffff9802`01097110 fffff800`09e11cf0 : 00000000`00000000 ffffb902`d6859700 ffffc964`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`010971a0 fffff800`09e11cf0 : ffff9802`01097560 ffffb902`d6859700 ffffc964`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`01097230 fffff800`09e0e5fb : 00000000`00000000 ffffb902`d6859700 ffff9802`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`010972c0 fffff800`09e0dee1 : ffff9802`01097560 00000000`00000000 00000000`00000002 fffff800`00000000 : nt!MiWalkPageTables+0x36b
ffff9802`010973c0 fffff800`09e0d5e9 : 00000000`00000000 00000000`00000000 ffffa680`6afc71c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffff9802`010978d0 fffff800`09e0cd97 : 00000000`00000000 ffff9802`01097a80 ffff9802`01097a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffff9802`010979c0 fffff800`09ee61b8 : fffff800`0a850a00 ffff9802`01097a80 00000000`00000171 fffff800`00020200 : nt!MiProcessWorkingSets+0x227
ffff9802`01097a60 fffff800`09fa34c7 : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff800`06241180 : nt!MiWorkingSetManager+0xb8
ffff9802`01097b20 fffff800`09f46715 : ffffb902`c9935080 00000000`00000080 fffff800`09fa3370 33480039`7992058b : nt!KeBalanceSetManager+0x157
ffff9802`01097c10 fffff800`09fe5078 : ffffa680`69aa1180 ffffb902`c9935080 fffff800`09f466c0 48247489`48602444 : nt!PspSystemThreadStartup+0x55
ffff9802`01097c60 00000000`00000000 : ffff9802`01098000 ffff9802`01092000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiRaisedIrqlFault+14baec

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  14baec

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff858605ed7678, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa00314896dd0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff858605ed7678

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffffa00314896dd0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

TRAP_FRAME:  ffffa00314896dd0 -- (.trap 0xffffa00314896dd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff858605ed7660
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801616fedd9 rsp=ffffa00314896f60 rbp=ffff8c80ec014c90
 r8=0000000000005ff1  r9=ffff8c80ec014c90 r10=0000000000000000
r11=ffff8c8000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff801`616fedd9 f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffff8586`05ed7678=????????????????
Resetting default scope

STACK_TEXT: 
ffffa003`14896bd8 fffff801`61887340 : 00000000`000000be ffff8586`05ed7678 8a000000`00200121 ffffa003`14896dd0 : nt!KeBugCheckEx
ffffa003`14896be0 fffff801`61612dcf : 8a000000`00200121 00000000`00000003 ffffa003`14896e50 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec
ffffa003`14896c30 fffff801`617ebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffa003`14896dd0 fffff801`616fedd9 : ffffb38a`981df940 0000000f`ffffffff 000001d8`02992000 00000000`00000003 : nt!KiPageFault+0x35e
ffffa003`14896f60 fffff801`616c421f : ffff8586`05ed7660 ffff8580`00000000 ffff8586`05ed7660 ffffb38a`8ae4b090 : nt!MiLockSetPfnPriority+0x11
ffffa003`14896f90 fffff801`616c39b4 : ffff8586`05ed7660 00000000`00000000 000001d8`02992000 ffffffff`ffffffff : nt!MiAgePteWorker+0x3ef
ffffa003`14896ff0 fffff801`616119d1 : 00000000`00000000 ffffa003`14897560 00000000`00000000 00000000`00000003 : nt!MiAgePte+0x134
ffffa003`14897080 fffff801`61611cf0 : 00000000`00000000 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffffa003`14897110 fffff801`61611cf0 : 00000000`00000000 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`148971a0 fffff801`61611cf0 : ffffa003`14897560 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`14897230 fffff801`6160e5fb : 00000000`00000000 ffffb38a`981df940 ffffa003`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`148972c0 fffff801`6160dee1 : ffffa003`14897560 00000000`00000000 00000000`00000002 fffff801`00000000 : nt!MiWalkPageTables+0x36b
ffffa003`148973c0 fffff801`6160d5e9 : 00000000`00000000 fffff801`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa003`148978d0 fffff801`6160cd97 : 00000000`00000000 ffffa003`14897a80 ffffa003`14897a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa003`148979c0 fffff801`616e61b8 : fffff801`62050a00 ffffa003`14897a80 00000000`00000089 ffffa181`00000200 : nt!MiProcessWorkingSets+0x227
ffffa003`14897a60 fffff801`617a34c7 : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff801`5e1bd180 : nt!MiWorkingSetManager+0xb8
ffffa003`14897b20 fffff801`61746715 : ffffb38a`8af24080 00000000`00000080 fffff801`617a3370 33480039`7992058b : nt!KeBalanceSetManager+0x157
ffffa003`14897c10 fffff801`617e5078 : ffffa181`d46a1180 ffffb38a`8af24080 fffff801`617466c0 48247489`48602444 : nt!PspSystemThreadStartup+0x55
ffffa003`14897c60 00000000`00000000 : ffffa003`14898000 ffffa003`14892000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiRaisedIrqlFault+14baec

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  14baec

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the bugcheck.
Arg2: 00000000201b7cee
Arg3: 0000000000000001
Arg4: 00000000201b7cee

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 16

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61948

BUGCHECK_P2: 201b7cee

BUGCHECK_P3: 1

BUGCHECK_P4: 201b7cee

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffffa86`5cd8ddf8 fffff804`65479de0 : 00000000`0000001a 00000000`00061948 00000000`201b7cee 00000000`00000001 : nt!KeBugCheckEx
fffffa86`5cd8de00 fffff804`652abdd3 : 00000000`002a1a02 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x15c798
fffffa86`5cd8de90 fffff804`652c1568 : fffffa86`5cd8e190 ffffa753`80838058 fffffa86`5cd8e240 00000000`00000000 : nt!MiDeletePteRun+0xff3
fffffa86`5cd8e0c0 fffff804`652c217b : fffffa86`5cd8e1f0 ffffd404`ef869700 ffffa701`0700bc78 fffffa86`5cd8e1f0 : nt!MiDeleteVaTail+0x78
fffffa86`5cd8e0f0 fffff804`652a787f : 00000000`00000000 00000000`00000060 ffffd404`ef8697c0 ffffd404`ef83c080 : nt!MiDeletePagablePteRange+0x33b
fffffa86`5cd8e570 fffff804`65666a13 : ffffd404`ef869080 00000000`00000000 ffffd404`00000000 ffffd404`00000001 : nt!MiDeleteVad+0x41f
fffffa86`5cd8e6a0 fffff804`656678b3 : ffffd404`ef7c3ac0 ffffd404`ef7c3ac0 ffffd404`ec4d07f0 ffffd404`ef869080 : nt!MiCleanVad+0x43
fffffa86`5cd8e6d0 fffff804`656b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd404`ef869080 : nt!MmCleanProcessAddressSpace+0x137
fffffa86`5cd8e750 fffff804`655e8c32 : ffffd404`ef869080 ffff8000`dc11c060 fffffa86`5cd8e990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffffa86`5cd8e7d0 fffff804`656f4c98 : ffffd404`c0000374 00000000`00000001 fffffa86`5cd8e9e0 0000004d`6d4ae000 : nt!PspExitThread+0x5f6
fffffa86`5cd8e8d0 fffff804`6522a4e7 : 00000000`40d00088 00000000`00000000 00000000`00000000 fffff804`65214bb6 : nt!KiSchedulerApcTerminate+0x38
fffffa86`5cd8e910 fffff804`653e1fc0 : 0000004d`6f5ff568 fffffa86`5cd8e9c0 fffffa86`5cd8eb80 7fffffff`00000000 : nt!KiDeliverApc+0x487
fffffa86`5cd8e9c0 fffff804`653ef41f : ffffd404`ef83c080 ffffd404`ec910e60 fffffa86`5cd8eb18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
fffffa86`5cd8eb00 00007ffe`5dacae14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000004d`6f5ff538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5dacae14


SYMBOL_NAME:  nt!MiDereferenceIoPages+15c798

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  15c798

FAILURE_BUCKET_ID:  0x1a_61948_nt!MiDereferenceIoPages

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {16899f95-043e-78ea-0aba-e664d76c4fc5}

Followup:     MachineOwner
---------
Kod:
 
Memtest86 ile USB üzerinden RAM hata testi yapar mısın? Bir de ne olur ne olmaz HDD Sentinel ile bad sector testi yapıp sağlığına falan bak diskin.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb903d9005a10, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80533c25a18, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 37

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffb903d9005a10

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80533c25a18

BUGCHECK_P4: 2

READ_ADDRESS: fffff805346fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053460f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8053460f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb903d9005a10

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff18b4ca29790 -- (.trap 0xfffff18b4ca29790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffce0c12b6b040
rdx=ffffb903d9005a10 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80533c25a18 rsp=fffff18b4ca29920 rbp=0000000000000000
r8=fffff18b4ca29970  r9=0000000000000022 r10=00000000ffffffff
r11=0000000000000088 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExAcquirePushLockExclusiveEx+0x108:
fffff805`33c25a18 f0480fba2e00    lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffff18b`4ca294e8 fffff805`33e35c1d : 00000000`00000050 ffffb903`d9005a10 00000000`00000002 fffff18b`4ca29790 : nt!KeBugCheckEx
fffff18b`4ca294f0 fffff805`33c12ce0 : fffff18b`4ca296dc 00000000`00000002 fffff18b`4ca29810 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff18b`4ca295f0 fffff805`33debb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff18b`4ca29790 fffff805`33c25a18 : ffffce0c`12b6b040 ffffb903`d9005a10 ffffce0c`12b6b040 00000000`00000000 : nt!KiPageFault+0x35e
fffff18b`4ca29920 fffff805`33c689c6 : ffffb903`d9005a00 ffffce0c`00000000 00000000`00000000 ffffbb03`e7f76000 : nt!ExAcquirePushLockExclusiveEx+0x108
fffff18b`4ca29960 fffff805`33c66e44 : 00000000`00000001 ffff8180`427a4ad0 ffffce0c`1b19cb80 ffffce0c`1adfd640 : nt!RtlpHpAcquireLockExclusive+0x2a
fffff18b`4ca29990 fffff805`33c40a72 : ffffbb03`d9000340 00000000`400000ff 00000000`00000000 fffff18b`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244
fffff18b`4ca29a40 fffff805`343c1019 : ffffce0c`00000000 ffffce0c`1b19cb80 00000000`2a807471 01000000`00100000 : nt!ExFreeHeapPool+0x362
fffff18b`4ca29b20 fffff805`381397d7 : fffff805`3812c920 fffff805`38133000 ffffbb03`e69a3910 00000000`00000000 : nt!ExFreePool+0x9
fffff18b`4ca29b50 fffff805`3812c920 : fffff805`38133000 ffffbb03`e69a3910 00000000`00000000 ffffbb03`e7f86058 : WdFilter+0x197d7
fffff18b`4ca29b58 fffff805`38133000 : ffffbb03`e69a3910 00000000`00000000 ffffbb03`e7f86058 fffff805`381395b3 : WdFilter+0xc920
fffff18b`4ca29b60 ffffbb03`e69a3910 : 00000000`00000000 ffffbb03`e7f86058 fffff805`381395b3 ffffce0c`12b6a880 : WdFilter+0x13000
fffff18b`4ca29b68 00000000`00000000 : ffffbb03`e7f86058 fffff805`381395b3 ffffce0c`12b6a880 00000000`00000001 : 0xffffbb03`e69a3910


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.264

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_INVALID_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7a7d19a2-c846-89a6-4e1c-40c2337eab13}

Followup:     Pool_corruption
---------
Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc4680202050, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8043dc25a18, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 9

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffffc4680202050

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8043dc25a18

BUGCHECK_P4: 2

READ_ADDRESS: fffff8043e6fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8043e60f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8043e60f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffffc4680202050

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Origin.exe

TRAP_FRAME:  fffff889d7c91440 -- (.trap 0xfffff889d7c91440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd78facdc9080
rdx=fffffc4680202050 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043dc25a18 rsp=fffff889d7c915d0 rbp=0000000000000000
r8=fffff889d7c91620  r9=0000000000000002 r10=00000000ffffffff
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExAcquirePushLockExclusiveEx+0x108:
fffff804`3dc25a18 f0480fba2e00    lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffff889`d7c91198 fffff804`3de35c1d : 00000000`00000050 fffffc46`80202050 00000000`00000002 fffff889`d7c91440 : nt!KeBugCheckEx
fffff889`d7c911a0 fffff804`3dc12ce0 : ffffd78f`acdc9080 00000000`00000002 fffff889`d7c914c0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff889`d7c912a0 fffff804`3ddebb1e : ffffd78f`ac9e0000 00000000`3bf9e428 fffff804`3dd51a00 fffff804`3dce73cf : nt!MmAccessFault+0x400
fffff889`d7c91440 fffff804`3dc25a18 : ffffd78f`acdc9080 fffffc46`80202050 00000000`00000032 00000000`00000000 : nt!KiPageFault+0x35e
fffff889`d7c915d0 fffff804`3dc689c6 : fffffc46`80202040 00000000`00000001 ffffd78f`00000000 fffffe46`86830000 : nt!ExAcquirePushLockExclusiveEx+0x108
fffff889`d7c91610 fffff804`3dc66e44 : fffff889`d7c91749 fffff804`00000000 fffff804`3dc34810 00000000`00000001 : nt!RtlpHpAcquireLockExclusive+0x2a
fffff889`d7c91640 fffff804`3dc40a72 : fffffe46`80200340 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhSubsegmentFreeBlock+0x244
fffff889`d7c916f0 fffff804`3e3c1019 : fffffe46`00000000 fffffe26`c83e16b8 fffffe26`c88b9030 01000000`00100000 : nt!ExFreeHeapPool+0x362
fffff889`d7c917d0 fffffe26`c88b9082 : fffffe46`84336010 00000000`00000000 ffffd78f`acdc9000 fffff889`d7c91710 : nt!ExFreePool+0x9
fffff889`d7c91800 fffffe26`c819c487 : 00000000`00000000 fffffe46`868305c0 fffffe46`868305c0 fffffe46`86898610 : win32kfull!Win32FreePoolImpl+0x52
fffff889`d7c91830 fffffe26`c88861a3 : fffffe46`86898610 fffffe46`86898bc0 00000000`80006010 fffffe46`86898610 : win32kbase!Win32FreePool+0x37
fffff889`d7c91860 fffffe26`c888a6e8 : fffffe46`86220b90 fffffe26`c83e16b8 00000000`00000000 fffffe46`86220b90 : win32kfull!xxxProcessNotifyWinEvent+0x35f
fffff889`d7c91900 fffffe26`c888b5dc : fffffe46`86872500 00000000`00000000 fffffe46`86872500 00000000`00000000 : win32kfull!xxxProcessEventMessage+0x2e0
fffff889`d7c91c30 fffffe26`c888fbe6 : fffffe46`84336010 fffff889`d7c929d8 00000000`00000000 00000000`00000000 : win32kfull!xxxScanSysQueue+0x83c
fffff889`d7c924e0 fffffe26`c888ec98 : fffff889`d7c929d8 00000000`00000000 00000000`00000000 fffff889`d7c92aa8 : win32kfull!xxxRealInternalGetMessage+0xee6
fffff889`d7c92980 fffffe26`c7e671ad : ffffd78f`acdc9080 00000000`005cde48 fffff889`d7c92aa8 00000000`00685000 : win32kfull!NtUserPeekMessage+0x158
fffff889`d7c92a40 fffff804`3ddef378 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtUserPeekMessage+0x29
fffff889`d7c92a90 00007ff9`17a0ff64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`005cde28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`17a0ff64


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.264

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  AV_INVALID_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7a7d19a2-c846-89a6-4e1c-40c2337eab13}

Followup:     Pool_corruption
---------
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff928605b64ec8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff980201096dd0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff928605b64ec8

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffff980201096dd0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffff980201096dd0 -- (.trap 0xffff980201096dd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff928605b64eb0
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80009efedd9 rsp=ffff980201096f60 rbp=ffffc901646b8c90
r8=000000000001c6c1  r9=ffffc901646b8c90 r10=0000000000000000
r11=ffffc90000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff800`09efedd9 f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffff9286`05b64ec8=????????????????
Resetting default scope

STACK_TEXT:
ffff9802`01096bd8 fffff800`0a087340 : 00000000`000000be ffff9286`05b64ec8 8a000000`00200121 ffff9802`01096dd0 : nt!KeBugCheckEx
ffff9802`01096be0 fffff800`09e12dcf : 8a000000`00200121 00000000`00000003 ffff9802`01096e50 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec
ffff9802`01096c30 fffff800`09febb1e : ffffc964`9fff6b78 00000000`00000000 ffff9802`010974b8 00000000`00000000 : nt!MmAccessFault+0x4ef
ffff9802`01096dd0 fffff800`09efedd9 : ffffb902`d6859700 0000000f`ffffffff 000002c8`d7192000 00000000`00000003 : nt!KiPageFault+0x35e
ffff9802`01096f60 fffff800`09ec421f : ffff9286`05b64eb0 ffff9280`00000000 ffff9286`05b64eb0 ffffb902`c984b090 : nt!MiLockSetPfnPriority+0x11
ffff9802`01096f90 fffff800`09ec39b4 : ffff9286`05b64eb0 00000000`00000000 000002c8`d7192000 ffffffff`ffffffff : nt!MiAgePteWorker+0x3ef
ffff9802`01096ff0 fffff800`09e119d1 : 00000000`00000000 ffff9802`01097560 00000000`00000000 00000000`00000004 : nt!MiAgePte+0x134
ffff9802`01097080 fffff800`09e11cf0 : 00000000`00000000 ffffb902`d6859700 ffffc964`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffff9802`01097110 fffff800`09e11cf0 : 00000000`00000000 ffffb902`d6859700 ffffc964`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`010971a0 fffff800`09e11cf0 : ffff9802`01097560 ffffb902`d6859700 ffffc964`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`01097230 fffff800`09e0e5fb : 00000000`00000000 ffffb902`d6859700 ffff9802`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffff9802`010972c0 fffff800`09e0dee1 : ffff9802`01097560 00000000`00000000 00000000`00000002 fffff800`00000000 : nt!MiWalkPageTables+0x36b
ffff9802`010973c0 fffff800`09e0d5e9 : 00000000`00000000 00000000`00000000 ffffa680`6afc71c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffff9802`010978d0 fffff800`09e0cd97 : 00000000`00000000 ffff9802`01097a80 ffff9802`01097a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffff9802`010979c0 fffff800`09ee61b8 : fffff800`0a850a00 ffff9802`01097a80 00000000`00000171 fffff800`00020200 : nt!MiProcessWorkingSets+0x227
ffff9802`01097a60 fffff800`09fa34c7 : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff800`06241180 : nt!MiWorkingSetManager+0xb8
ffff9802`01097b20 fffff800`09f46715 : ffffb902`c9935080 00000000`00000080 fffff800`09fa3370 33480039`7992058b : nt!KeBalanceSetManager+0x157
ffff9802`01097c10 fffff800`09fe5078 : ffffa680`69aa1180 ffffb902`c9935080 fffff800`09f466c0 48247489`48602444 : nt!PspSystemThreadStartup+0x55
ffff9802`01097c60 00000000`00000000 : ffff9802`01098000 ffff9802`01092000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiRaisedIrqlFault+14baec

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  14baec

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff858605ed7678, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa00314896dd0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff858605ed7678

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffffa00314896dd0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

TRAP_FRAME:  ffffa00314896dd0 -- (.trap 0xffffa00314896dd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff858605ed7660
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801616fedd9 rsp=ffffa00314896f60 rbp=ffff8c80ec014c90
r8=0000000000005ff1  r9=ffff8c80ec014c90 r10=0000000000000000
r11=ffff8c8000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff801`616fedd9 f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffff8586`05ed7678=????????????????
Resetting default scope

STACK_TEXT:
ffffa003`14896bd8 fffff801`61887340 : 00000000`000000be ffff8586`05ed7678 8a000000`00200121 ffffa003`14896dd0 : nt!KeBugCheckEx
ffffa003`14896be0 fffff801`61612dcf : 8a000000`00200121 00000000`00000003 ffffa003`14896e50 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec
ffffa003`14896c30 fffff801`617ebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffa003`14896dd0 fffff801`616fedd9 : ffffb38a`981df940 0000000f`ffffffff 000001d8`02992000 00000000`00000003 : nt!KiPageFault+0x35e
ffffa003`14896f60 fffff801`616c421f : ffff8586`05ed7660 ffff8580`00000000 ffff8586`05ed7660 ffffb38a`8ae4b090 : nt!MiLockSetPfnPriority+0x11
ffffa003`14896f90 fffff801`616c39b4 : ffff8586`05ed7660 00000000`00000000 000001d8`02992000 ffffffff`ffffffff : nt!MiAgePteWorker+0x3ef
ffffa003`14896ff0 fffff801`616119d1 : 00000000`00000000 ffffa003`14897560 00000000`00000000 00000000`00000003 : nt!MiAgePte+0x134
ffffa003`14897080 fffff801`61611cf0 : 00000000`00000000 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffffa003`14897110 fffff801`61611cf0 : 00000000`00000000 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`148971a0 fffff801`61611cf0 : ffffa003`14897560 ffffb38a`981df940 ffff8cc6`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`14897230 fffff801`6160e5fb : 00000000`00000000 ffffb38a`981df940 ffffa003`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffffa003`148972c0 fffff801`6160dee1 : ffffa003`14897560 00000000`00000000 00000000`00000002 fffff801`00000000 : nt!MiWalkPageTables+0x36b
ffffa003`148973c0 fffff801`6160d5e9 : 00000000`00000000 fffff801`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa003`148978d0 fffff801`6160cd97 : 00000000`00000000 ffffa003`14897a80 ffffa003`14897a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa003`148979c0 fffff801`616e61b8 : fffff801`62050a00 ffffa003`14897a80 00000000`00000089 ffffa181`00000200 : nt!MiProcessWorkingSets+0x227
ffffa003`14897a60 fffff801`617a34c7 : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff801`5e1bd180 : nt!MiWorkingSetManager+0xb8
ffffa003`14897b20 fffff801`61746715 : ffffb38a`8af24080 00000000`00000080 fffff801`617a3370 33480039`7992058b : nt!KeBalanceSetManager+0x157
ffffa003`14897c10 fffff801`617e5078 : ffffa181`d46a1180 ffffb38a`8af24080 fffff801`617466c0 48247489`48602444 : nt!PspSystemThreadStartup+0x55
ffffa003`14897c60 00000000`00000000 : ffffa003`14898000 ffffa003`14892000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiRaisedIrqlFault+14baec

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  14baec

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the bugcheck.
Arg2: 00000000201b7cee
Arg3: 0000000000000001
Arg4: 00000000201b7cee

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JC78BRD

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 16

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61948

BUGCHECK_P2: 201b7cee

BUGCHECK_P3: 1

BUGCHECK_P4: 201b7cee

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffffa86`5cd8ddf8 fffff804`65479de0 : 00000000`0000001a 00000000`00061948 00000000`201b7cee 00000000`00000001 : nt!KeBugCheckEx
fffffa86`5cd8de00 fffff804`652abdd3 : 00000000`002a1a02 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x15c798
fffffa86`5cd8de90 fffff804`652c1568 : fffffa86`5cd8e190 ffffa753`80838058 fffffa86`5cd8e240 00000000`00000000 : nt!MiDeletePteRun+0xff3
fffffa86`5cd8e0c0 fffff804`652c217b : fffffa86`5cd8e1f0 ffffd404`ef869700 ffffa701`0700bc78 fffffa86`5cd8e1f0 : nt!MiDeleteVaTail+0x78
fffffa86`5cd8e0f0 fffff804`652a787f : 00000000`00000000 00000000`00000060 ffffd404`ef8697c0 ffffd404`ef83c080 : nt!MiDeletePagablePteRange+0x33b
fffffa86`5cd8e570 fffff804`65666a13 : ffffd404`ef869080 00000000`00000000 ffffd404`00000000 ffffd404`00000001 : nt!MiDeleteVad+0x41f
fffffa86`5cd8e6a0 fffff804`656678b3 : ffffd404`ef7c3ac0 ffffd404`ef7c3ac0 ffffd404`ec4d07f0 ffffd404`ef869080 : nt!MiCleanVad+0x43
fffffa86`5cd8e6d0 fffff804`656b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd404`ef869080 : nt!MmCleanProcessAddressSpace+0x137
fffffa86`5cd8e750 fffff804`655e8c32 : ffffd404`ef869080 ffff8000`dc11c060 fffffa86`5cd8e990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffffa86`5cd8e7d0 fffff804`656f4c98 : ffffd404`c0000374 00000000`00000001 fffffa86`5cd8e9e0 0000004d`6d4ae000 : nt!PspExitThread+0x5f6
fffffa86`5cd8e8d0 fffff804`6522a4e7 : 00000000`40d00088 00000000`00000000 00000000`00000000 fffff804`65214bb6 : nt!KiSchedulerApcTerminate+0x38
fffffa86`5cd8e910 fffff804`653e1fc0 : 0000004d`6f5ff568 fffffa86`5cd8e9c0 fffffa86`5cd8eb80 7fffffff`00000000 : nt!KiDeliverApc+0x487
fffffa86`5cd8e9c0 fffff804`653ef41f : ffffd404`ef83c080 ffffd404`ec910e60 fffffa86`5cd8eb18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
fffffa86`5cd8eb00 00007ffe`5dacae14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000004d`6f5ff538 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`5dacae14


SYMBOL_NAME:  nt!MiDereferenceIoPages+15c798

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  15c798

FAILURE_BUCKET_ID:  0x1a_61948_nt!MiDereferenceIoPages

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {16899f95-043e-78ea-0aba-e664d76c4fc5}

Followup:     MachineOwner
---------
Kod:
Testi yapmıştım windows üzerinde sorun çıktı sonra Valorant şüphelendim sildim sonra tekrar test ettim sorun çıkmadı. Sabah beri değişik mavi ekran hatası yiyordum. Sorun Valorant oyunu sanırsam sildim sonra test ettim sorun çıkmadı.
Ekran Görüntüsü (5).png
 
Windows üzerinden değil, USB üzerinden Memtest86 ile yap diyoruz. Ama o bile sorun bulduysa sorun RAM'lerde belli zaten.

Bu arada Valorant yüklü değilken sorun olmuyorsa yükleme onu. Ama dediğim gibi, dediğin duruma bakınca en doğru sonucu Memtest verir. Windows üzerinden yapma.
 
Windows üzerinden değil, USB üzerinden Memtest86 ile yap diyoruz. Ama o bile sorun bulduysa sorun RAM'lerde belli zaten.

Tamam Memtest86 uzun sürdüğü için uğraşmadım. Ama 3-4 kere test ettiğimde bellek sorunu 2 kere çıktı. Sonra Valorant oyunu sildim sonra tekrardan test ettim sorun çıkmadı. Sorun Valorant oyunu alakalı sanırsam.
 
RAM ile Valorant ilişiği olduğunu hiç sanmıyorum, oyun teste etki ediyor. Memtest ile yaparsan etki edecek bir şey olmadığı için nesnel ve güvenilir bir sonuç çıkacaktır. Yapmam diyorsan sen bilirsin.

Şimdi bende bilemedim Valorant yükledikten sonra değişik mavi ekran hataları almayı başladım. Ben Valorant şüpheleniyorum. Sildikten sonra sorun çözülmüş gibi duruyor. Dediğin gibi Memtest86 bakacağım.
RAM ile Valorant ilişiği olduğunu hiç sanmıyorum, oyun teste etki ediyor. Memtest ile yaparsan etki edecek bir şey olmadığı için nesnel ve güvenilir bir sonuç çıkacaktır. Yapmam diyorsan sen bilirsin.
Test ediyorum. Evet sülalesi gibi sorun buldu. Çözümü nedir? İlk başlarda sorun yoktu sonrada olmayı başladı.
 
Son düzenleme:
Daha yeni aldım. Sonradan olmayı başladı nasıl arızalı olmayı başlıyor yapmayın şunu. Şu an BIOS sıfırladım ve RAM yer değiştirdim. Bir daha test yapacağım.
Deneyin bakalım. Hata bulduysa çaresi yok benim bildiğim kadarıyla. Araştırabilirsiniz kendiniz de. @Murat5038 gelince detaylı bilgi verir.
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı