Çözüldü MEMORY_MANAGEMENT mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

mustafa6789

Centipat
Katılım
31 Aralık 2020
Mesajlar
425
Çözümler
1
Bu hataların nedeni nedir?
Bazen oyun oynarken bazen YouTube'u açınca veriyor hatayı.
PC'nin ömrü mü bitti yoksa?
Sistem:
-R7 240 4 GB.
-Q9300.
-1333MHz 8 GB RAM.
-Gigabyte GA-G41M-Combo

mavi ekran 1.jpeg


mavi ekran 2.jpeg


mavi ekran 3.jpeg


mavi ekran 4.jpeg
 
Çözüm
Olmuş.

Öncelikle belleklere test yapın. RAM'lerde sorun çıkarsa değiştirmeniz gerekecek, belirteyim şimdiden. Avast'ı kaldırın.

Ekran kartınızın sürücüsünü DDU ile kaldırıp sitesinden güncelleyin. İşletim sisteminizi güncelleyin.

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803394988fa, The address that the exception occurred at
Arg3: fffffe0497eae678, Exception Record Address
Arg4: fffffe0497eadec0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 8124

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 153235

    Key  : Analysis.Init.CPU.mSec
    Value: 608

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1418

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803394988fa

BUGCHECK_P3: fffffe0497eae678

BUGCHECK_P4: fffffe0497eadec0

EXCEPTION_RECORD:  fffffe0497eae678 -- (.exr 0xfffffe0497eae678)
ExceptionAddress: fffff803394988fa (dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x0000000000000bda)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffffe0497eadec0 -- (.cxr 0xfffffe0497eadec0)
rax=1000000000000000 rbx=ffffe60e2fdc0c10 rcx=ffffe60e2fd69680
rdx=ffffe60e2fdc0c10 rsi=ffffe60e2fdb7000 rdi=0000000000000000
rip=fffff803394988fa rsp=fffffe0497eae8b0 rbp=fffffe0497eae9b0
r8=fffffe0497eae8b8  r9=ffffe60e2fd834e0 r10=0000000000000000
r11=fffff80339420000 r12=0000000000000000 r13=ffffb3821f7c6e70
r14=ffffe60e3ca8c110 r15=fffffe0497eaec50
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xbda:
fffff803`394988fa 4c396808        cmp     qword ptr [rax+8],r13 ds:002b:10000000`00000008=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8046d5713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffffe04`97eae8b0 fffff803`394a9e10     : ffffe60e`2fdc0c00 fffff803`39462000 ffffe60e`2fdb7000 ffffe60e`2fdc0c00 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xbda
fffffe04`97eaeb20 fffff803`394a7729     : ffffb382`057b4a10 fffff804`6d58f400 ffffe60e`2fd69600 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x26d0
fffffe04`97eaed20 fffff804`6d127c35     : ffffe60e`2fd69680 fffff803`394a7720 ffffb382`057b4a10 00000000`a91b3ffe : dxgmms2!VidMmWorkerThreadProc+0x9
fffffe04`97eaed50 fffff804`6d1cb0b8     : fffff804`68882180 ffffe60e`2fd69680 fffff804`6d127be0 de42a98c`46108046 : nt!PspSystemThreadStartup+0x55
fffffe04`97eaeda0 00000000`00000000     : fffffe04`97eaf000 fffffe04`97ea9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+bda

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.1500

STACK_COMMAND:  .cxr 0xfffffe0497eadec0 ; kb

BUCKET_ID_FUNC_OFFSET:  bda

FAILURE_BUCKET_ID:  AV_dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b2278b94-ad39-cfd1-b64e-2c23c686ba7f}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd7bffaec1570
Arg3: 4000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8843

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10696

    Key  : Analysis.Init.CPU.mSec
    Value: 968

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2036

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : MemoryManagement.PFN
    Value: 0

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffd7bffaec1570

BUGCHECK_P3: 4000000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffff828a`42fcad18 fffff805`2da034b8     : 00000000`0000001a 00000000`00041792 ffffd7bf`faec1570 40000000`00000000 : nt!KeBugCheckEx
ffff828a`42fcad20 fffff805`2d858d27     : 00000000`00000000 ffffd7bf`faec1570 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1a8998
ffff828a`42fcae30 fffff805`2d8591e1     : ffff828a`42fcb280 ffffd7eb`dffd7608 00000000`00000000 0a000001`c3283867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff828a`42fcaef0 fffff805`2d8591e1     : ffff828a`42fcb280 ffffd7eb`f5effeb8 00000000`00000000 0a000001`aad27867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcafb0 fffff805`2d8591e1     : ffff828a`42fcb280 ffffd7eb`f5faf7f8 00000000`00000000 0a000000`3551a867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcb070 fffff805`2d85896c     : ffff828a`42fcb280 ffffd7eb`f5fafd78 ffff828a`00000000 ffff828a`42fcb1f9 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcb130 fffff805`2d8ac7f8     : ffff828a`42fcb280 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff828a`42fcb230 fffff805`2d864f30     : ffffffff`ffffffff ffffb008`ec5743f8 ffff828a`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff828a`42fcb5d0 fffff805`2de726dd     : ffffb008`ec2ea080 ffffb008`ec2ea080 ffffb008`ee65bb80 ffffb008`ec5743f0 : nt!MiDeleteVad+0x860
ffff828a`42fcb790 fffff805`2de41d70     : ffffb008`ee65bb80 ffffb008`ee950c30 ffffb008`ec2ea080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff828a`42fcb7c0 fffff805`2de412df     : ffffb008`ee65b680 ffffb008`ee65b680 ffffb008`ec574080 fffff805`2dc68180 : nt!MiCleanVad+0x30
ffff828a`42fcb7f0 fffff805`2de9c801     : ffffffff`00000000 ffffffff`ffffffff ffff828a`42fcba01 ffffb008`ec574080 : nt!MmCleanProcessAddressSpace+0x137
ffff828a`42fcb870 fffff805`2de44993     : ffffb008`ec574080 ffff8a86`587fb8e0 ffff828a`42fcba99 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffff828a`42fcb8f0 fffff805`2decb3d3     : 00000000`00000000 fffff805`29142101 00000011`ea394000 00000000`00000000 : nt!PspExitThread+0x60b
ffff828a`42fcba00 fffff805`2d852e31     : ffffb008`ec2ea080 ffff828a`00000000 00007ffe`00000000 00007ffe`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff828a`42fcba40 fffff805`2d9c8010     : 00001864`00220001 ffff828a`42fcbb00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffff828a`42fcbb00 fffff805`2d9d53ff     : ffffb008`ec2ea080 00000011`ec3ff568 ffff828a`42fcbc58 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff828a`42fcbc40 00007ffe`ee9fce14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000011`ec3ff538 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ee9fce14


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffa3811208abf0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffa3811208ab48, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 15593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 107391

    Key  : Analysis.Init.CPU.mSec
    Value: 1014

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1887

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : FailFast.Name
    Value: INVALID_BALANCED_TREE

    Key  : FailFast.Type
    Value: 29

    Key  : Memory.System.Errors.BadPageCount
    Value: 201

    Key  : Memory.System.Errors.ScrubErrors
    Value: 201

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffa3811208abf0

BUGCHECK_P3: ffffa3811208ab48

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa3811208abf0 -- (.trap 0xffffa3811208abf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=bfff800ccff6efe8 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff800ccff6efe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037540c9a3 rsp=ffffa3811208ad88 rbp=0000000000000022
r8=ffff800cd8d80fe8  r9=0000000000000000 r10=ffff800cd389afe8
r11=bfff800ccff6efe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!RtlRbRemoveNode+0x199a93:
fffff803`7540c9a3 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa3811208ab48 -- (.exr 0xffffa3811208ab48)
ExceptionAddress: fffff8037540c9a3 (nt!RtlRbRemoveNode+0x0000000000199a93)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

BAD_PAGES_DETECTED: c9

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffa381`1208a8c8 fffff803`753d5929     : 00000000`00000139 00000000`0000001d ffffa381`1208abf0 ffffa381`1208ab48 : nt!KeBugCheckEx
ffffa381`1208a8d0 fffff803`753d5d50     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa381`1208aa10 fffff803`753d40e3     : 00000000`00000003 00000000`00000210 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa381`1208abf0 fffff803`7540c9a3     : 0000000f`01ce0002 000101ce`00220000 fffff803`75272c90 00000000`00000022 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa381`1208ad88 fffff803`75272c90     : 00000000`00000022 ffff800c`cff70cc0 00000000`00000000 ffff800c`cff6efe0 : nt!RtlRbRemoveNode+0x199a93
ffffa381`1208ada0 fffff803`7527274a     : ffff800c`c1e00280 ffff800c`c1e00280 ffff800c`e97ce480 ffffa381`1208aeb0 : nt!RtlpHpVsChunkCoalesce+0xb0
ffffa381`1208ae10 fffff803`752749bd     : 00000000`0000003f ffff800c`00000000 00010000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x18a
ffffa381`1208aeb0 fffff803`7556e0a9     : ffffa381`1208b1f0 00000000`00000310 ffff800c`e5035a50 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffffa381`1208afd0 fffff800`fb7fc817     : ffffa909`19c84088 ffff09c9`622c6331 00000000`00000001 01000000`00100000 : nt!ExFreePool+0x9
ffffa381`1208b000 fffff800`fb8edab9     : ffff800c`e5035a50 fffff800`fb8ddffc ffff800c`e5035ad0 00000000`00000000 : dxgkrnl!operator delete[]+0x17
ffffa381`1208b030 fffff800`fb8ed028     : ffffa909`19c84088 ffff800c`00000000 00000000`00000001 ffffa381`1208b1c0 : dxgkrnl!DXGADAPTERALLOCATION::~DXGADAPTERALLOCATION+0xd
ffffa381`1208b060 fffff800`fb809b44     : ffff800c`cc936820 00000000`00000001 ffff800c`d87345d0 00000000`00000000 : dxgkrnl!DXGSHAREDRESOURCE::~DXGSHAREDRESOURCE+0x8c
ffffa381`1208b090 fffff800`fb8dde0a     : ffff800c`e5035a50 ffff800c`d87345d0 00000000`00000001 ffff800c`d87345d0 : dxgkrnl!DXGSHAREDRESOURCE::`vector deleting destructor'+0x14
ffffa381`1208b0c0 fffff800`fb8d4b6b     : 00000000`00000000 ffffa381`1208b1f0 ffff800c`d8734500 00000000`00000000 : dxgkrnl!DXGSHAREDRESOURCE::Destroy+0x2a
ffffa381`1208b0f0 fffff800`fb8d32d8     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`fb911d6d : dxgkrnl!DXGDEVICE::DestroyAllocations+0x6a7
ffffa381`1208b290 fffff800`fb911d87     : ffff800c`cc936820 00000000`00000000 ffff800c`cc936900 ffff800c`00000000 : dxgkrnl!DXGDEVICE::DestroyResource+0x74
ffffa381`1208b2d0 fffff800`fb911ab2     : ffff800c`cc936820 ffff800c`cc936900 00000000`00000000 ffff800c`cc936998 : dxgkrnl!DXGDEVICE::DrainResources+0x5b
ffffa381`1208b320 fffff800`fb911fac     : ffff800c`cc936820 ffff800c`e1754dc0 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x14e
ffffa381`1208b360 fffff800`fb8e2f0e     : 00000000`00000000 ffffa381`1208b490 ffff800c`cc936820 ffff800c`cc936820 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffffa381`1208b390 fffff800`fb8e5835     : ffff800c`d2ff6630 00000000`00000000 ffff800c`d2ff6630 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x44e
ffffa381`1208b600 fffff800`fb7f8eb4     : 00000000`00000000 ffff800c`d2ff6630 ffffa909`19afab80 ffffa909`2026f080 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffffa381`1208b740 fffff803`75822a06     : 00000000`00000000 00000000`00000000 00000000`00004038 00000000`00000000 : dxgkrnl!DxgkProcessNotify+0xa4
ffffa381`1208b780 fffff803`75864c3c     : ffffa909`2026f000 ffffa909`2026f080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212
ffffa381`1208b850 fffff803`7584494f     : ffffa909`225c8688 00000000`00000000 ffffa381`1208ba29 00000000`00000000 : nt!PspExitProcess+0x70
ffffa381`1208b880 fffff803`758cb3d3     : 00000000`80000003 00000000`00000001 00000000`0a163000 00000000`00000000 : nt!PspExitThread+0x5c7
ffffa381`1208b990 fffff803`75252e31     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffa381`1208b9d0 fffff803`753c8010     : 00000000`00000001 ffffa381`1208ba90 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffa381`1208ba90 fffff803`753d53ff     : ffffa909`225c8080 00000000`11bbe998 00000000`ffffffff fffff803`00001cbf : nt!KiInitiateUserApc+0x70
ffffa381`1208bbd0 00007ffa`75798704     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`11bbe978 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`75798704


SYMBOL_NAME:  PAGE_NOT_ZERO

MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_NOT_ZERO_0x139

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2d547d65-0fa4-e377-ce77-fe92fd743dbf}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa48658a2ccf8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066eca52fa, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14125

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2173

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffa48658a2ccf8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8066eca52fa

READ_ADDRESS: fffff8066f1713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa48658a2ccf8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  QtWebEngineProcess.exe

TRAP_FRAME:  fffffb08f02e3590 -- (.trap 0xfffffb08f02e3590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdfffffffffff rbx=0000000000000000 rcx=ffffbd0fc6ce7e70
rdx=ffffa552a954a7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066eca52fa rsp=fffffb08f02e3720 rbp=fffffb08f02e3820
r8=ffff9e00018e8590  r9=fffffb08f02e39c0 r10=00007ffc751defc8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiResolveMappedFileFault+0xda:
fffff806`6eca52fa 4c8b33          mov     r14,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffffb08`f02e3448 fffff806`6edd5929     : 00000000`0000000a ffffa486`58a2ccf8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb08`f02e3450 fffff806`6edd1c69     : 00000000`00000000 00000000`6f068180 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffb08`f02e3590 fffff806`6eca52fa     : e48678a2`ccf80460 ffff9e00`00000000 ffff9e00`0162c5a0 fffffb08`f02e37e8 : nt!KiPageFault+0x469
fffffb08`f02e3720 fffff806`6ecd5278     : fffffb08`f02e39c0 ffffbd0f`c6ce7e70 ffff9e00`018e8590 fffffb08`f02e3998 : nt!MiResolveMappedFileFault+0xda
fffffb08`f02e3850 fffff806`6eccf99c     : fffffb08`f02e39c0 00000000`00000000 fffffb08`f02e3998 ffffbd0f`c6ce7e70 : nt!MiResolveProtoPteFault+0xaf8
fffffb08`f02e3950 fffff806`6eccdad9     : 00000000`00000100 00000000`00000100 00000000`c0000016 00000227`4757d000 : nt!MiDispatchFault+0x80c
fffffb08`f02e3aa0 fffff806`6edd1b5e     : 00000227`44b8f910 fffffb08`f02e3cc0 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x169
fffffb08`f02e3c40 00007ffc`751defc8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000080`d237e518 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`751defc8


SYMBOL_NAME:  nt!MiResolveMappedFileFault+da

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1440

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  da

FAILURE_BUCKET_ID:  AV_nt!MiResolveMappedFileFault

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1d098aa9-3360-d59f-97f1-7952eef5f856}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa48658a2ccf8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066eca52fa, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14125

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2173

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffa48658a2ccf8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8066eca52fa

READ_ADDRESS: fffff8066f1713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa48658a2ccf8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  QtWebEngineProcess.exe

TRAP_FRAME:  fffffb08f02e3590 -- (.trap 0xfffffb08f02e3590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdfffffffffff rbx=0000000000000000 rcx=ffffbd0fc6ce7e70
rdx=ffffa552a954a7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066eca52fa rsp=fffffb08f02e3720 rbp=fffffb08f02e3820
r8=ffff9e00018e8590  r9=fffffb08f02e39c0 r10=00007ffc751defc8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiResolveMappedFileFault+0xda:
fffff806`6eca52fa 4c8b33          mov     r14,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffffb08`f02e3448 fffff806`6edd5929     : 00000000`0000000a ffffa486`58a2ccf8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb08`f02e3450 fffff806`6edd1c69     : 00000000`00000000 00000000`6f068180 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffb08`f02e3590 fffff806`6eca52fa     : e48678a2`ccf80460 ffff9e00`00000000 ffff9e00`0162c5a0 fffffb08`f02e37e8 : nt!KiPageFault+0x469
fffffb08`f02e3720 fffff806`6ecd5278     : fffffb08`f02e39c0 ffffbd0f`c6ce7e70 ffff9e00`018e8590 fffffb08`f02e3998 : nt!MiResolveMappedFileFault+0xda
fffffb08`f02e3850 fffff806`6eccf99c     : fffffb08`f02e39c0 00000000`00000000 fffffb08`f02e3998 ffffbd0f`c6ce7e70 : nt!MiResolveProtoPteFault+0xaf8
fffffb08`f02e3950 fffff806`6eccdad9     : 00000000`00000100 00000000`00000100 00000000`c0000016 00000227`4757d000 : nt!MiDispatchFault+0x80c
fffffb08`f02e3aa0 fffff806`6edd1b5e     : 00000227`44b8f910 fffffb08`f02e3cc0 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x169
fffffb08`f02e3c40 00007ffc`751defc8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000080`d237e518 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`751defc8


SYMBOL_NAME:  nt!MiResolveMappedFileFault+da

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1440

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  da

FAILURE_BUCKET_ID:  AV_nt!MiResolveMappedFileFault

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1d098aa9-3360-d59f-97f1-7952eef5f856}

Followup:     MachineOwner
---------
Minidump dosyalarınızı paylaşır mısınız?
 
Minidump dosyalarınızı paylaşır mısınız?

Klasörü oluşturdum, nasıl yükleyeceğim Technopat'a?

1620036255437.png


Nasıl klasör seçeceğim yani?
 
Doğrudan buraya yükleyemezsiniz. MediaFire'a yükleyip paylaşabilirsiniz.
 

Oldu mu?
Evet bu arada tekrar hata verdi baştan açmam gerekti.
 
Olmuş.

Öncelikle belleklere test yapın. RAM'lerde sorun çıkarsa değiştirmeniz gerekecek, belirteyim şimdiden. Avast'ı kaldırın.

Ekran kartınızın sürücüsünü DDU ile kaldırıp sitesinden güncelleyin. İşletim sisteminizi güncelleyin.

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff803394988fa, The address that the exception occurred at
Arg3: fffffe0497eae678, Exception Record Address
Arg4: fffffe0497eadec0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 8124

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 153235

    Key  : Analysis.Init.CPU.mSec
    Value: 608

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1418

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff803394988fa

BUGCHECK_P3: fffffe0497eae678

BUGCHECK_P4: fffffe0497eadec0

EXCEPTION_RECORD:  fffffe0497eae678 -- (.exr 0xfffffe0497eae678)
ExceptionAddress: fffff803394988fa (dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x0000000000000bda)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffffe0497eadec0 -- (.cxr 0xfffffe0497eadec0)
rax=1000000000000000 rbx=ffffe60e2fdc0c10 rcx=ffffe60e2fd69680
rdx=ffffe60e2fdc0c10 rsi=ffffe60e2fdb7000 rdi=0000000000000000
rip=fffff803394988fa rsp=fffffe0497eae8b0 rbp=fffffe0497eae9b0
r8=fffffe0497eae8b8  r9=ffffe60e2fd834e0 r10=0000000000000000
r11=fffff80339420000 r12=0000000000000000 r13=ffffb3821f7c6e70
r14=ffffe60e3ca8c110 r15=fffffe0497eaec50
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xbda:
fffff803`394988fa 4c396808        cmp     qword ptr [rax+8],r13 ds:002b:10000000`00000008=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8046d5713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
fffffe04`97eae8b0 fffff803`394a9e10     : ffffe60e`2fdc0c00 fffff803`39462000 ffffe60e`2fdb7000 ffffe60e`2fdc0c00 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xbda
fffffe04`97eaeb20 fffff803`394a7729     : ffffb382`057b4a10 fffff804`6d58f400 ffffe60e`2fd69600 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x26d0
fffffe04`97eaed20 fffff804`6d127c35     : ffffe60e`2fd69680 fffff803`394a7720 ffffb382`057b4a10 00000000`a91b3ffe : dxgmms2!VidMmWorkerThreadProc+0x9
fffffe04`97eaed50 fffff804`6d1cb0b8     : fffff804`68882180 ffffe60e`2fd69680 fffff804`6d127be0 de42a98c`46108046 : nt!PspSystemThreadStartup+0x55
fffffe04`97eaeda0 00000000`00000000     : fffffe04`97eaf000 fffffe04`97ea9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+bda

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.1500

STACK_COMMAND:  .cxr 0xfffffe0497eadec0 ; kb

BUCKET_ID_FUNC_OFFSET:  bda

FAILURE_BUCKET_ID:  AV_dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b2278b94-ad39-cfd1-b64e-2c23c686ba7f}

Followup:     MachineOwner
---------



MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd7bffaec1570
Arg3: 4000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8843

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10696

    Key  : Analysis.Init.CPU.mSec
    Value: 968

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2036

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 71

    Key  : MemoryManagement.PFN
    Value: 0

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffd7bffaec1570

BUGCHECK_P3: 4000000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffff828a`42fcad18 fffff805`2da034b8     : 00000000`0000001a 00000000`00041792 ffffd7bf`faec1570 40000000`00000000 : nt!KeBugCheckEx
ffff828a`42fcad20 fffff805`2d858d27     : 00000000`00000000 ffffd7bf`faec1570 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1a8998
ffff828a`42fcae30 fffff805`2d8591e1     : ffff828a`42fcb280 ffffd7eb`dffd7608 00000000`00000000 0a000001`c3283867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff828a`42fcaef0 fffff805`2d8591e1     : ffff828a`42fcb280 ffffd7eb`f5effeb8 00000000`00000000 0a000001`aad27867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcafb0 fffff805`2d8591e1     : ffff828a`42fcb280 ffffd7eb`f5faf7f8 00000000`00000000 0a000000`3551a867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcb070 fffff805`2d85896c     : ffff828a`42fcb280 ffffd7eb`f5fafd78 ffff828a`00000000 ffff828a`42fcb1f9 : nt!MiWalkPageTablesRecursively+0x6a1
ffff828a`42fcb130 fffff805`2d8ac7f8     : ffff828a`42fcb280 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff828a`42fcb230 fffff805`2d864f30     : ffffffff`ffffffff ffffb008`ec5743f8 ffff828a`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff828a`42fcb5d0 fffff805`2de726dd     : ffffb008`ec2ea080 ffffb008`ec2ea080 ffffb008`ee65bb80 ffffb008`ec5743f0 : nt!MiDeleteVad+0x860
ffff828a`42fcb790 fffff805`2de41d70     : ffffb008`ee65bb80 ffffb008`ee950c30 ffffb008`ec2ea080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff828a`42fcb7c0 fffff805`2de412df     : ffffb008`ee65b680 ffffb008`ee65b680 ffffb008`ec574080 fffff805`2dc68180 : nt!MiCleanVad+0x30
ffff828a`42fcb7f0 fffff805`2de9c801     : ffffffff`00000000 ffffffff`ffffffff ffff828a`42fcba01 ffffb008`ec574080 : nt!MmCleanProcessAddressSpace+0x137
ffff828a`42fcb870 fffff805`2de44993     : ffffb008`ec574080 ffff8a86`587fb8e0 ffff828a`42fcba99 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffff828a`42fcb8f0 fffff805`2decb3d3     : 00000000`00000000 fffff805`29142101 00000011`ea394000 00000000`00000000 : nt!PspExitThread+0x60b
ffff828a`42fcba00 fffff805`2d852e31     : ffffb008`ec2ea080 ffff828a`00000000 00007ffe`00000000 00007ffe`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff828a`42fcba40 fffff805`2d9c8010     : 00001864`00220001 ffff828a`42fcbb00 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffff828a`42fcbb00 fffff805`2d9d53ff     : ffffb008`ec2ea080 00000011`ec3ff568 ffff828a`42fcbc58 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff828a`42fcbc40 00007ffe`ee9fce14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000011`ec3ff538 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ee9fce14


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffffa3811208abf0, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffa3811208ab48, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 15593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 107391

    Key  : Analysis.Init.CPU.mSec
    Value: 1014

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1887

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : FailFast.Name
    Value: INVALID_BALANCED_TREE

    Key  : FailFast.Type
    Value: 29

    Key  : Memory.System.Errors.BadPageCount
    Value: 201

    Key  : Memory.System.Errors.ScrubErrors
    Value: 201

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffa3811208abf0

BUGCHECK_P3: ffffa3811208ab48

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa3811208abf0 -- (.trap 0xffffa3811208abf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=bfff800ccff6efe8 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff800ccff6efe8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037540c9a3 rsp=ffffa3811208ad88 rbp=0000000000000022
r8=ffff800cd8d80fe8  r9=0000000000000000 r10=ffff800cd389afe8
r11=bfff800ccff6efe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!RtlRbRemoveNode+0x199a93:
fffff803`7540c9a3 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa3811208ab48 -- (.exr 0xffffa3811208ab48)
ExceptionAddress: fffff8037540c9a3 (nt!RtlRbRemoveNode+0x0000000000199a93)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

BAD_PAGES_DETECTED: c9

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffa381`1208a8c8 fffff803`753d5929     : 00000000`00000139 00000000`0000001d ffffa381`1208abf0 ffffa381`1208ab48 : nt!KeBugCheckEx
ffffa381`1208a8d0 fffff803`753d5d50     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa381`1208aa10 fffff803`753d40e3     : 00000000`00000003 00000000`00000210 00000000`00000103 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffa381`1208abf0 fffff803`7540c9a3     : 0000000f`01ce0002 000101ce`00220000 fffff803`75272c90 00000000`00000022 : nt!KiRaiseSecurityCheckFailure+0x323
ffffa381`1208ad88 fffff803`75272c90     : 00000000`00000022 ffff800c`cff70cc0 00000000`00000000 ffff800c`cff6efe0 : nt!RtlRbRemoveNode+0x199a93
ffffa381`1208ada0 fffff803`7527274a     : ffff800c`c1e00280 ffff800c`c1e00280 ffff800c`e97ce480 ffffa381`1208aeb0 : nt!RtlpHpVsChunkCoalesce+0xb0
ffffa381`1208ae10 fffff803`752749bd     : 00000000`0000003f ffff800c`00000000 00010000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x18a
ffffa381`1208aeb0 fffff803`7556e0a9     : ffffa381`1208b1f0 00000000`00000310 ffff800c`e5035a50 01000000`00100000 : nt!ExFreeHeapPool+0x56d
ffffa381`1208afd0 fffff800`fb7fc817     : ffffa909`19c84088 ffff09c9`622c6331 00000000`00000001 01000000`00100000 : nt!ExFreePool+0x9
ffffa381`1208b000 fffff800`fb8edab9     : ffff800c`e5035a50 fffff800`fb8ddffc ffff800c`e5035ad0 00000000`00000000 : dxgkrnl!operator delete[]+0x17
ffffa381`1208b030 fffff800`fb8ed028     : ffffa909`19c84088 ffff800c`00000000 00000000`00000001 ffffa381`1208b1c0 : dxgkrnl!DXGADAPTERALLOCATION::~DXGADAPTERALLOCATION+0xd
ffffa381`1208b060 fffff800`fb809b44     : ffff800c`cc936820 00000000`00000001 ffff800c`d87345d0 00000000`00000000 : dxgkrnl!DXGSHAREDRESOURCE::~DXGSHAREDRESOURCE+0x8c
ffffa381`1208b090 fffff800`fb8dde0a     : ffff800c`e5035a50 ffff800c`d87345d0 00000000`00000001 ffff800c`d87345d0 : dxgkrnl!DXGSHAREDRESOURCE::`vector deleting destructor'+0x14
ffffa381`1208b0c0 fffff800`fb8d4b6b     : 00000000`00000000 ffffa381`1208b1f0 ffff800c`d8734500 00000000`00000000 : dxgkrnl!DXGSHAREDRESOURCE::Destroy+0x2a
ffffa381`1208b0f0 fffff800`fb8d32d8     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`fb911d6d : dxgkrnl!DXGDEVICE::DestroyAllocations+0x6a7
ffffa381`1208b290 fffff800`fb911d87     : ffff800c`cc936820 00000000`00000000 ffff800c`cc936900 ffff800c`00000000 : dxgkrnl!DXGDEVICE::DestroyResource+0x74
ffffa381`1208b2d0 fffff800`fb911ab2     : ffff800c`cc936820 ffff800c`cc936900 00000000`00000000 ffff800c`cc936998 : dxgkrnl!DXGDEVICE::DrainResources+0x5b
ffffa381`1208b320 fffff800`fb911fac     : ffff800c`cc936820 ffff800c`e1754dc0 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x14e
ffffa381`1208b360 fffff800`fb8e2f0e     : 00000000`00000000 ffffa381`1208b490 ffff800c`cc936820 ffff800c`cc936820 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffffa381`1208b390 fffff800`fb8e5835     : ffff800c`d2ff6630 00000000`00000000 ffff800c`d2ff6630 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x44e
ffffa381`1208b600 fffff800`fb7f8eb4     : 00000000`00000000 ffff800c`d2ff6630 ffffa909`19afab80 ffffa909`2026f080 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffffa381`1208b740 fffff803`75822a06     : 00000000`00000000 00000000`00000000 00000000`00004038 00000000`00000000 : dxgkrnl!DxgkProcessNotify+0xa4
ffffa381`1208b780 fffff803`75864c3c     : ffffa909`2026f000 ffffa909`2026f080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x212
ffffa381`1208b850 fffff803`7584494f     : ffffa909`225c8688 00000000`00000000 ffffa381`1208ba29 00000000`00000000 : nt!PspExitProcess+0x70
ffffa381`1208b880 fffff803`758cb3d3     : 00000000`80000003 00000000`00000001 00000000`0a163000 00000000`00000000 : nt!PspExitThread+0x5c7
ffffa381`1208b990 fffff803`75252e31     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffa381`1208b9d0 fffff803`753c8010     : 00000000`00000001 ffffa381`1208ba90 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffa381`1208ba90 fffff803`753d53ff     : ffffa909`225c8080 00000000`11bbe998 00000000`ffffffff fffff803`00001cbf : nt!KiInitiateUserApc+0x70
ffffa381`1208bbd0 00007ffa`75798704     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`11bbe978 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`75798704


SYMBOL_NAME:  PAGE_NOT_ZERO

MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  PAGE_NOT_ZERO_0x139

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2d547d65-0fa4-e377-ce77-fe92fd743dbf}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa48658a2ccf8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066eca52fa, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14125

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2173

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffa48658a2ccf8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8066eca52fa

READ_ADDRESS: fffff8066f1713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa48658a2ccf8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  QtWebEngineProcess.exe

TRAP_FRAME:  fffffb08f02e3590 -- (.trap 0xfffffb08f02e3590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdfffffffffff rbx=0000000000000000 rcx=ffffbd0fc6ce7e70
rdx=ffffa552a954a7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066eca52fa rsp=fffffb08f02e3720 rbp=fffffb08f02e3820
r8=ffff9e00018e8590  r9=fffffb08f02e39c0 r10=00007ffc751defc8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiResolveMappedFileFault+0xda:
fffff806`6eca52fa 4c8b33          mov     r14,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffffb08`f02e3448 fffff806`6edd5929     : 00000000`0000000a ffffa486`58a2ccf8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb08`f02e3450 fffff806`6edd1c69     : 00000000`00000000 00000000`6f068180 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffb08`f02e3590 fffff806`6eca52fa     : e48678a2`ccf80460 ffff9e00`00000000 ffff9e00`0162c5a0 fffffb08`f02e37e8 : nt!KiPageFault+0x469
fffffb08`f02e3720 fffff806`6ecd5278     : fffffb08`f02e39c0 ffffbd0f`c6ce7e70 ffff9e00`018e8590 fffffb08`f02e3998 : nt!MiResolveMappedFileFault+0xda
fffffb08`f02e3850 fffff806`6eccf99c     : fffffb08`f02e39c0 00000000`00000000 fffffb08`f02e3998 ffffbd0f`c6ce7e70 : nt!MiResolveProtoPteFault+0xaf8
fffffb08`f02e3950 fffff806`6eccdad9     : 00000000`00000100 00000000`00000100 00000000`c0000016 00000227`4757d000 : nt!MiDispatchFault+0x80c
fffffb08`f02e3aa0 fffff806`6edd1b5e     : 00000227`44b8f910 fffffb08`f02e3cc0 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x169
fffffb08`f02e3c40 00007ffc`751defc8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000080`d237e518 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`751defc8


SYMBOL_NAME:  nt!MiResolveMappedFileFault+da

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1440

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  da

FAILURE_BUCKET_ID:  AV_nt!MiResolveMappedFileFault

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1d098aa9-3360-d59f-97f1-7952eef5f856}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa48658a2ccf8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066eca52fa, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14125

    Key  : Analysis.Init.CPU.mSec
    Value: 874

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2173

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffa48658a2ccf8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8066eca52fa

READ_ADDRESS: fffff8066f1713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa48658a2ccf8

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  QtWebEngineProcess.exe

TRAP_FRAME:  fffffb08f02e3590 -- (.trap 0xfffffb08f02e3590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdfffffffffff rbx=0000000000000000 rcx=ffffbd0fc6ce7e70
rdx=ffffa552a954a7f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066eca52fa rsp=fffffb08f02e3720 rbp=fffffb08f02e3820
r8=ffff9e00018e8590  r9=fffffb08f02e39c0 r10=00007ffc751defc8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiResolveMappedFileFault+0xda:
fffff806`6eca52fa 4c8b33          mov     r14,qword ptr [rbx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffffb08`f02e3448 fffff806`6edd5929     : 00000000`0000000a ffffa486`58a2ccf8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffb08`f02e3450 fffff806`6edd1c69     : 00000000`00000000 00000000`6f068180 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffb08`f02e3590 fffff806`6eca52fa     : e48678a2`ccf80460 ffff9e00`00000000 ffff9e00`0162c5a0 fffffb08`f02e37e8 : nt!KiPageFault+0x469
fffffb08`f02e3720 fffff806`6ecd5278     : fffffb08`f02e39c0 ffffbd0f`c6ce7e70 ffff9e00`018e8590 fffffb08`f02e3998 : nt!MiResolveMappedFileFault+0xda
fffffb08`f02e3850 fffff806`6eccf99c     : fffffb08`f02e39c0 00000000`00000000 fffffb08`f02e3998 ffffbd0f`c6ce7e70 : nt!MiResolveProtoPteFault+0xaf8
fffffb08`f02e3950 fffff806`6eccdad9     : 00000000`00000100 00000000`00000100 00000000`c0000016 00000227`4757d000 : nt!MiDispatchFault+0x80c
fffffb08`f02e3aa0 fffff806`6edd1b5e     : 00000227`44b8f910 fffffb08`f02e3cc0 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0x169
fffffb08`f02e3c40 00007ffc`751defc8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000080`d237e518 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`751defc8


SYMBOL_NAME:  nt!MiResolveMappedFileFault+da

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.1440

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  da

FAILURE_BUCKET_ID:  AV_nt!MiResolveMappedFileFault

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1d098aa9-3360-d59f-97f1-7952eef5f856}

Followup:     MachineOwner
---------
 
Çözüm
Hayır, görmedim. RAM ve ekran kartı ağırlıklı. Bilgisayarda bir süre işiniz yoksa önce Memtest'i yapıp sonuçları paylaşın, asıl şüpheli RAM. Ancak bilgisayarda işiniz varsa önce ekran kartı ve diğerlerini halledin, Memtest uzun sürer çünkü. Ekran kartı sürücüsünü buradan kurabilirsiniz.
 
Hayır, görmedim. RAM ve ekran kartı ağırlıklı. Bilgisayarda bir süre işiniz yoksa önce Memtest'i yapıp sonuçları paylaşın, asıl şüpheli RAM. Ancak bilgisayarda işiniz varsa önce ekran kartı ve diğerlerini halledin, Memtest uzun sürer çünkü. Ekran kartı sürücüsünü buradan kurabilirsiniz.

Elimde fazladan aynı RAM'lar var, değiştirebilirim.
 
Olabilir. Memtest'i hatadan emin olmak için yapıyoruz. Sonuçta yeni RAM alınıyor, boşa para verilmemeli. Fakat sizde RAM varmış. Memtest'i geçin o halde. Şu an sisteme takılı tüm RAM'leri çıkarın, elinizdekileri takın. Umarım onlar da hatalı değildir.

Sistemi bir süre o RAM'lerle kullanın. Sorun yaşarsanız yazarsınız tekrar. Sorun yaşamazsanız da geri dönüşünüzü bekliyorum.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı