MEMORY_CORRUPTION_ONE_BIT mavi ekran hatası

Evet. Hataların artması normal, daha test tamamlanmadıysa. Tek modül takacağınız zaman soldan ikinciye (DIMM_A2) takacaksınız.
 
Tamamdır. RAM değişiminden sonra son durum ile ilgili bilgilendirme yaparsanız sevinirim.

Tek modül takma olayını da test için demiştim aslında.
 
Tamamdır. RAM değişiminden sonra son durum ile ilgili bilgilendirme yaparsanız sevinirim.

Tek modül takma olayını da test için demiştim aslında.

Bir de RAM'lerim 3200 MHz fakat burada 3600 gözüküyor.
Bir de RAM'lerim 3200 MHz fakat burada 3600 gözüküyor.
Tamam anladım.
Belleklerinizde sorun var. İlk olarak bir test edin:


Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80669abf23a, Address of the instruction which caused the bugcheck
Arg3: ffffec0c00ec9d30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4890

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 12125

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80669abf23a

BUGCHECK_P3: ffffec0c00ec9d30

BUGCHECK_P4: 0

CONTEXT: ffffec0c00ec9d30 -- (.cxr 0xffffec0c00ec9d30)
rax=0000000000000000 rbx=9711302f03f00196 rcx=0000000000000011
rdx=fffff8066a124f60 rsi=fffff8066a124f60 rdi=ffff568eac125080
rip=fffff80669abf23a rsp=ffffec0c00eca730 rbp=ffffa902aa3e7080
r8=ffffec0c00eca740 r9=ffffd68eaf929580 r10=ffffd68eaf929580
r11=0000000000000673 r12=ffffd68eaf929490 r13=000000000000005c
r14=ffffd68ec1e8fe80 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!ObLogSecurityDescriptor+0x9a:
fffff806`69abf23a 48395f10 cmp qword ptr [rdi+10h],rbx ds:002b:ffff568e`ac125090=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffec0c`00eca730 fffff806`69abe63c : ffffec0c`000000f4 ffffec0c`00eca7e8 00000000`00000010 00000000`000000f4 : nt!ObLogSecurityDescriptor+0x9a
ffffec0c`00eca7b0 fffff806`69abf05a : 00000000`00000000 ffffd68e`b55ef0a0 00000000`00000000 ffffd68e`b55ef0a0 : nt!ObSetSecurityDescriptorInfo+0x9c
ffffec0c`00eca810 fffff806`69ac02b9 : 00000000`000f01ff 00000000`00000000 ffffd68e`b45ecb50 fffff806`69aafb96 : nt!SeDefaultObjectMethod+0x11a
ffffec0c`00eca870 fffff806`69abe95c : ffffd68e`b0b64420 ffffd68e`00000004 00000000`00000002 ffffd68e`b0b64450 : nt!ObSetSecurityObjectByPointer+0x89
ffffec0c`00eca8d0 fffff806`699fbc7e : ffffd68e`ba3c7c01 00000000`00000000 00000000`00000000 ffffec0c`00ecab80 : nt!SepAppendAceToTokenObjectAcl+0x22c
ffffec0c`00eca9a0 fffff806`698058b8 : 00000086`241fde10 ffffa902`aa3e7080 00000086`241fdd88 00000086`241fde78 : nt!NtCreateLowBoxToken+0x4ee
ffffec0c`00ecaa90 00007ffa`3b74d3d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`241fdd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3b74d3d4

SYMBOL_NAME: nt!ObLogSecurityDescriptor+9a

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .cxr 0xffffec0c00ec9d30 ; kb

BUCKET_ID_FUNC_OFFSET: 9a

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObLogSecurityDescriptor

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c7451bc4-8d5e-bc70-86b5-535f25d13589}

Followup: MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffffd005cade490, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffd005cade3e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3561

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5965

Key : Analysis.Memory.CommitPeak.Mb
Value: 82

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 1d

BUGCHECK_P2: fffffd005cade490

BUGCHECK_P3: fffffd005cade3e8

BUGCHECK_P4: 0

TRAP_FRAME: fffffd005cade490 -- (.trap 0xfffffd005cade490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbe80d7010f78 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff9e80d7010f78 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807054666c7 rsp=fffffd005cade628 rbp=0000000000000076
r8=0000000000000000 r9=ffff9e80e71fcf78 r10=0000000000000000
r11=ffff9e80d5cbbf78 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x198c17:
fffff807`054666c7 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffffd005cade3e8 -- (.exr 0xfffffd005cade3e8)
ExceptionAddress: fffff807054666c7 (nt!RtlRbRemoveNode+0x0000000000198c17)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 000000000000001d

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffffd00`5cade168 fffff807`05405e69 : 00000000`00000139 00000000`0000001d fffffd00`5cade490 fffffd00`5cade3e8 : nt!KeBugCheckEx
fffffd00`5cade170 fffff807`05406290 : ffff9e80`dd96dde0 00000000`000000c0 00000000`000000e0 ffff9e80`00000001 : nt!KiBugCheckDispatch+0x69
fffffd00`5cade2b0 fffff807`05404623 : 00000000`00001001 00000000`00000fff 00000000`000f01ff 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffd00`5cade490 fffff807`054666c7 : 00000022`00070000 00010007`00760001 fffff807`052cd870 00000000`00000076 : nt!KiRaiseSecurityCheckFailure+0x323
fffffd00`5cade628 fffff807`052cd870 : 00000000`00000076 ffff9e80`d7010fe0 00000000`00000000 ffff9e80`d7010f70 : nt!RtlRbRemoveNode+0x198c17
fffffd00`5cade640 fffff807`052cd2b8 : ffff9e80`d3200280 ffff9e80`d7002000 ffff9e80`d3200280 fffffd00`5cade748 : nt!RtlpHpVsChunkCoalesce+0xb0
fffffd00`5cade6a0 fffff807`052cbc44 : 00000000`00000000 ffffda87`00000000 00000000`00000000 fffffd00`00000000 : nt!RtlpHpVsContextFree+0x188
fffffd00`5cade740 fffff807`059b2019 : 00000000`00000750 ffff9e80`dc6bf010 00000000`000006c0 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffd00`5cade820 fffff807`056a4b84 : ffff9e80`dc6bf030 ffff9e80`dc6bf030 ffffda87`b76ab900 ffffda87`c29f0c40 : nt!ExFreePool+0x9
fffffd00`5cade850 fffff807`056a4998 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
fffffd00`5cade8b0 fffff807`052dffc7 : 00000000`00000000 00000000`00000000 fffffd00`5cadea39 ffff9e80`dc6bf060 : nt!ObpRemoveObjectRoutine+0x88
fffffd00`5cade910 fffff807`056d243e : ffffda87`b76ab900 00000000`00000001 ffffffff`ffffffff ffff9e80`e2cd7180 : nt!ObfDereferenceObjectWithTag+0xc7
fffffd00`5cade950 fffff807`056d60bc : 00000000`00001460 ffffda87`c31ef040 000000f6`d90ff218 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
fffffd00`5cadea90 fffff807`054058b8 : ffffda87`c31ef000 ffffda87`c303edd0 fffffd00`5cadeb80 ffffda87`0000a048 : nt!NtClose+0xec
fffffd00`5cadeb00 00007ff9`06d6bfa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f6`d90ff438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`06d6bfa4

SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.19041.508

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x139_1d_INVALID_BALANCED_TREE_nt!ExFreePool

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ab43366d-59cb-5971-8e17-b53398bf3f90}

Followup: Pool_corruption
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd2092175d3b0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8035f5dd3cf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4718

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 64341

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffd2092175d3b0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8035f5dd3cf

BUGCHECK_P4: 2

READ_ADDRESS: fffff8034d4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8034d40f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd2092175d3b0

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: LockApp.exe

TRAP_FRAME: fffff004daab5530 -- (.trap 0xfffff004daab5530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8035f5dd3cf rbx=0000000000000000 rcx=fffff004daab57a8
rdx=ffffda0917e75000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035f5dd3cf rsp=fffff004daab56c0 rbp=ffffda0917e75000
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8035f63
r11=ffffb7785c000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0xc1d3cf:
fffff803`5f5dd3cf 8b9ef0000000 mov ebx,dword ptr [rsi+0F0h] ds:00000000`000000f0=????????
Resetting default scope

STACK_TEXT:
fffff004`daab5288 fffff803`4cc86729 : 00000000`00000050 ffffd209`2175d3b0 00000000`00000000 fffff004`daab5530 : nt!KeBugCheckEx
fffff004`daab5290 fffff803`4caeeb80 : ffffda09`1a130101 00000000`00000000 fffff004`daab55b0 00000000`00000000 : nt!MiSystemFault+0x13faf9
fffff004`daab5390 fffff803`4cc0205e : 00000000`00000040 00000000`000005e4 00000000`00000002 ffffda09`24ae6780 : nt!MmAccessFault+0x400
fffff004`daab5530 fffff803`5f5dd3cf : ffffda09`17e75000 ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 : nt!KiPageFault+0x35e
fffff004`daab56c0 ffffda09`17e75000 : ffffda09`17e75000 ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 : nvlddmkm+0xc1d3cf
fffff004`daab56c8 ffffda09`17e75000 : ffffda09`1a9e6010 fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 : 0xffffda09`17e75000
fffff004`daab56d0 ffffda09`1a9e6010 : fffff004`daab5819 ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 : 0xffffda09`17e75000
fffff004`daab56d8 fffff004`daab5819 : ffffda09`17c52dd0 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf : 0xffffda09`1a9e6010
fffff004`daab56e0 ffffda09`17c52dd0 : 01000000`00100000 ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 : 0xfffff004`daab5819
fffff004`daab56e8 01000000`00100000 : ffffda09`22a232b0 fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 : 0xffffda09`17c52dd0
fffff004`daab56f0 ffffda09`22a232b0 : fffff803`5f1cd9cf 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 : 0x01000000`00100000
fffff004`daab56f8 fffff803`5f1cd9cf : 00000000`00000000 fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 : 0xffffda09`22a232b0
fffff004`daab5700 00000000`00000000 : fffff803`4cc6c387 ffffda09`18362a10 fffff004`daab5769 00000000`00000001 : nvlddmkm+0x80d9cf

SYMBOL_NAME: nvlddmkm+c1d3cf

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: c1d3cf

FAILURE_BUCKET_ID: AV_R_INVALID_nvlddmkm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e90a4ef4-7822-d3fe-1570-e91273858ed6}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8046c8c932c, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3061

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3867

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8046c8c932c

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8046d2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8046d20f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2: ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.exe

BAD_STACK_POINTER: fffff80471880158

STACK_TEXT:
fffff804`71880158 fffff804`6caf4d4e : 00000000`0000001e ffffffff`c0000005 fffff804`6c8c932c 00000000`00000000 : nt!KeBugCheckEx
fffff804`71880160 fffff804`6c9fcd62 : fffff804`6caf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff804`718801a0 fffff804`6c885027 : fffff804`71880710 00000000`00000000 fffff804`71872fb0 fffff804`6c9faee5 : nt!RtlpExecuteHandlerForException+0x12
fffff804`718801d0 fffff804`6c883ce6 : fffff804`71872108 fffff804`71880e20 fffff804`71872108 00000000`00000000 : nt!RtlDispatchException+0x297
fffff804`718808f0 fffff804`6c9f4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`71880fb0 fffff804`6c9f4d00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`71871fc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue

SYMBOL_NAME: nt!KeSetEvent+12c

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.508

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 12c

FAILURE_BUCKET_ID: 0x1E_c0000005_R_STACKPTR_ERROR_nt!KeSetEvent

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5b67424c-419d-c5a3-8e34-77d4a1bf1db0}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8a8103ce4038
Arg3: 0000020000000000
Arg4: 0000000000000000

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3311

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3310

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff8a8103ce4038

BUGCHECK_P3: 20000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: RuntimeBroker.exe

STACK_TEXT:
ffffda06`693a2d58 fffff804`1692abba : 00000000`0000001a 00000000`00041792 ffff8a81`03ce4038 00000200`00000000 : nt!KeBugCheckEx
ffffda06`693a2d60 fffff804`168edc06 : 00000000`00000000 ffffda06`693a3330 00000000`00000026 ffff8a81`03ce4038 : nt!MiDeleteVa+0x153a
ffffda06`693a2e60 fffff804`168edd1b : ffff8ac5`4081e720 ffffe006`ad5a8700 ffffda06`00000000 ffffda06`693a32d0 : nt!MiWalkPageTablesRecursively+0x776
ffffda06`693a2f00 fffff804`168edd1b : ffff8ac5`62a040f0 ffffe006`ad5a8700 ffffda06`00000001 ffffda06`693a32e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a2fa0 fffff804`168edd1b : ffff8ac5`62a04000 ffffe006`ad5a8700 ffffda06`00000002 ffffda06`693a32f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a3040 fffff804`168dcbfb : 00000000`00000000 ffffe006`ad5a8700 00000000`00000003 ffffda06`693a3300 : nt!MiWalkPageTablesRecursively+0x88b
ffffda06`693a30e0 fffff804`16929451 : ffffda06`693a3280 ffffe006`00000000 ffff8a81`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffda06`693a31e0 fffff804`16901670 : 00000000`00000001 ffffda06`00000000 ffffe006`ad5a8550 ffffe006`b252a640 : nt!MiDeletePagablePteRange+0x4f1
ffffda06`693a34f0 fffff804`16c999e9 : ffffe006`b83c0440 00000000`00000000 ffffe006`00000000 ffffe006`00000000 : nt!MiDeleteVad+0x360
ffffda06`693a3600 fffff804`16c9938c : ffffe006`b83c0440 ffffe006`addedc00 ffffe006`b252a640 00000000`00000000 : nt!MiUnmapVad+0x49
ffffda06`693a3630 fffff804`16ce4dd3 : ffffe006`b83c2380 ffffe006`b83c2380 ffffe006`b83c0440 ffffe006`ad5a8080 : nt!MiCleanVad+0x30
ffffda06`693a3660 fffff804`16c81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe006`ad5a8080 : nt!MmCleanProcessAddressSpace+0x137
ffffda06`693a36e0 fffff804`16c9ea8a : ffffe006`ad5a8080 ffffc90d`d2eef730 ffffda06`693a3920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffda06`693a3760 fffff804`16bf4558 : 00000000`40010004 00000000`00000001 00000000`00000000 0000001c`915dc000 : nt!PspExitThread+0x5f6
ffffda06`693a3860 fffff804`168e6ca7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffda06`693a38a0 fffff804`169f8440 : 00000207`9c506030 ffffda06`693a3950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffda06`693a3950 fffff804`16a0595f : ffffe006`b252a640 ffffda06`693a3b80 0000001c`9187f3f8 ffffda06`693a3aa8 : nt!KiInitiateUserApc+0x70
ffffda06`693a3a90 00007ffc`0130a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000001c`9187fa38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0130a104

MODULE_NAME: hardware

IMAGE_NAME: memory_corruption

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner
---------

20201012_145254.jpg


Buradan geçtim bir sonrakinde y ye bastım kaydettim. Peki ya nereye kayıt edildi nereden ulaşabilirim?
 
Son düzenleme:
Adamlara verdiğiniz zaman zaten onlar da bu testi yapacak. Test yaptık, bozuk değil deme gibi bir durumları olmamalı. Derslerse de beraber bir test yaparsınız, olur biter. Yeni bellekleri taktıktan sonra da yapmanız gereken ek bir şey yok, XMP açıp kullanacaksınız sadece.
 

Yeni konular

Geri
Yukarı