Çözüldü ntkrnlmp.exe mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Fatih Taşkent

Decapat
Katılım
30 Kasım 2019
Mesajlar
9
Arkadaşlar merhaba,

Sistemimi yaklaşık 3 ay önce topladım. Kullanmaya başladığım ilk günden beri mavi ekran hataları alıyorum. 2 kez temiz Windows 10 sürüm 2004 kurdum, bios ve sürücülerimi güncelledim fakat bir işe yaramadı. Hataları genellikle bilgisayarı başlattığımda kilit ekranında şifremi girmeye çalışırken alıyorum, sadece birkez oyun başlatırken "attempted_wrıte_to_readonly_memory" hatası aldım. Bellekleri hem Memtest86 ile hem de Windows'un kendi aracıyla test ettim, hata çıkmadı. Yardımlarınızı bekliyorum şimdiden teşekkür ederim.

Sistem özellikleri;
AMD Ryzen 5 3600X.
ASUS TUF B450-PLUS.
ASUS Dual RTX 2070 Evo.
Corsair Vengeance RGB Pro 16 GB(2x8) 3200MHz.
XPG SX8200PRO 256 GB.
Corsair VS550.

Sistemde kullandığım yazılımlar;
iCUE.
Logitech G Hub.
ASUS STRIX Wireless headset.
SteelSeries Engine 3.
Steam.

Minidump dosyaları;
 
Çözüm
Sistemi X.M.P kapalı olarak test ediniz. Sorun belleklerden.
Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe200054830b8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff858cf233ed80, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xBE

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  ffff858cf233ed80 -- (.trap 0xffff858cf233ed80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe200054830a0
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80028c2bc5d rsp=ffff858cf233ef10 rbp=ffffe200054830a0
 r8=000000000001c0b0  r9=ffff8551c21a7210 r10=0000000000000000
r11=ffff850000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff800`28c2bc5d f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffffe200`054830b8=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80028e2f11a to fffff80028df3ea0

STACK_TEXT: 
ffff858c`f233eb88 fffff800`28e2f11a : 00000000`000000be ffffe200`054830b8 8a000000`00200121 ffff858c`f233ed80 : nt!KeBugCheckEx
ffff858c`f233eb90 fffff800`28ceec6f : 8a000000`00200121 00000000`00000003 ffff858c`f233ee00 00000000`00000000 : nt!MiRaisedIrqlFault+0x1e28fe
ffff858c`f233ebe0 fffff800`28e0205e : fffff800`24aca0f8 ffffd000`9755f088 ffff858c`f233eeb1 00000000`00000003 : nt!MmAccessFault+0x4ef
ffff858c`f233ed80 fffff800`28c2bc5d : fffff800`2964f080 00000000`00000001 ffff8551`c21a7210 ffff8551`c21a7210 : nt!KiPageFault+0x35e
ffff858c`f233ef10 fffff800`28d2b731 : ffffe080`00000000 ffff930f`00000000 ffffe080`00000000 fffff800`28d21115 : nt!MiLockSetPfnPriority+0x11
ffff858c`f233ef40 fffff800`28d2b55f : ffff858c`f233f560 ffff8551`c21a7210 ffffe200`054830a0 00000000`00000000 : nt!MiAgePteWorker+0x1a1
ffff858c`f233efa0 fffff800`28cedc06 : ffff858c`f233f560 ffff8551`c21a7210 00000000`00000000 81008001`c2bae963 : nt!MiAgePte+0x51f
ffff858c`f233f040 fffff800`28cedd1b : ffff8542`00000000 fffff800`2964f080 00000000`00000000 ffff858c`f233f5b0 : nt!MiWalkPageTablesRecursively+0x776
ffff858c`f233f0e0 fffff800`28cedd1b : ffff8542`00000000 fffff800`2964f080 00000000`00000001 ffff858c`f233f5c0 : nt!MiWalkPageTablesRecursively+0x88b
ffff858c`f233f180 fffff800`28cedd1b : ffff8542`a1547000 fffff800`2964f080 00000000`00000002 ffff858c`f233f5d0 : nt!MiWalkPageTablesRecursively+0x88b
ffff858c`f233f220 fffff800`28cdcbfb : 00000000`5bf00002 fffff800`2964f080 ffff858c`00000003 ffff858c`f233f5e0 : nt!MiWalkPageTablesRecursively+0x88b
ffff858c`f233f2c0 fffff800`28cdc691 : ffff858c`f233f560 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff858c`f233f3c0 fffff800`28cdbd99 : 00000000`00000000 00000000`00000000 ffffd000`9b3211c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffff858c`f233f8d0 fffff800`28cdb5a7 : 00000000`00000000 ffff858c`f233fa80 ffff858c`f233fa40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffff858c`f233f9c0 fffff800`28c9c1f0 : fffff800`29650b80 ffff858c`f233fa80 00000000`000017a5 ffffd000`00000203 : nt!MiProcessWorkingSets+0x227
ffff858c`f233fa60 fffff800`28db4587 : 00000000`00000001 00000000`00000001 00000000`ffffffff ffffd000`979c0180 : nt!MiWorkingSetManager+0x110
ffff858c`f233fb20 fffff800`28c66dd5 : ffff930f`503df080 00000000`00000080 fffff800`28db4430 0974fe3b`44ffa86d : nt!KeBalanceSetManager+0x157
ffff858c`f233fc10 fffff800`28dfb4f8 : ffffd000`979c0180 ffff930f`503df080 fffff800`28c66d80 415e415f`4160c483 : nt!PspSystemThreadStartup+0x55
ffff858c`f233fc60 00000000`00000000 : ffff858c`f2340000 ffff858c`f233a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80028c5f3f1 - nt!MiUnlockStoreLockedPages+61
    [ fa:e0 ]
    fffff80028cdcc3d-fffff80028cdcc3e  2 bytes - nt!MiWalkPageTables+3ad (+0x7d84c)
    [ 80 f6:00 85 ]
    fffff80028cedc86-fffff80028cedc87  2 bytes - nt!MiWalkPageTablesRecursively+7f6 (+0x11049)
    [ 80 f6:00 85 ]
    fffff80028ceddcd-fffff80028ceddce  2 bytes - nt!MiWalkPageTablesRecursively+93d (+0x147)
    [ 80 f6:00 85 ]
    fffff80028d1ed25-fffff80028d1ed26  2 bytes - nt!MiSetVaAgeList+4f5 (+0x30f58)
    [ ff f6:7f 85 ]
    fffff80028d1ed40-fffff80028d1ed41  2 bytes - nt!MiSetVaAgeList+510 (+0x1b)
    [ ff f6:7f 85 ]
    fffff80028d1ed69-fffff80028d1ed6d  5 bytes - nt!MiSetVaAgeList+539 (+0x29)
    [ d7 be 7d fb f6:a7 50 a1 42 85 ]
    fffff80028d1ed84-fffff80028d1ed88  5 bytes - nt!MiSetVaAgeList+554 (+0x1b)
    [ d7 be 7d fb f6:a7 50 a1 42 85 ]
    fffff80028d1ed9f-fffff80028d1eda0  2 bytes - nt!MiSetVaAgeList+56f (+0x1b)
    [ d7 be:a7 50 ]
    fffff80028d2b5b7-fffff80028d2b5b8  2 bytes - nt!MiAgePteWorker+27 (+0xc818)
    [ 80 f6:00 85 ]
    fffff80028d2b5c7-fffff80028d2b5cb  5 bytes - nt!MiAgePteWorker+37 (+0x10)
    [ d0 be 7d fb f6:a0 50 a1 42 85 ]
    fffff80028d2b5db-fffff80028d2b5df  5 bytes - nt!MiAgePteWorker+4b (+0x14)
    [ d7 be 7d fb f6:a7 50 a1 42 85 ]
    fffff80028d2b5e9 - nt!MiAgePteWorker+59 (+0x0e)
    [ fa:e0 ]
    fffff80028d2b5f2-fffff80028d2b5f3  2 bytes - nt!MiAgePteWorker+62 (+0x09)
    [ ff f6:7f 85 ]
    fffff80028d4039a-fffff80028d4039b  2 bytes - nt!MiRemoveWsleList+47a (+0x14da8)
    [ 80 f6:00 85 ]
    fffff80028d40450-fffff80028d40451  2 bytes - nt!MiRemoveWsleList+530 (+0xb6)
    [ ff f6:7f 85 ]
    fffff80028d963ae-fffff80028d963b1  4 bytes - nt!MiFreeUltraMapping+32 (+0x55f5e)
    [ a0 7d fb f6:40 a1 42 85 ]
    fffff80028e2f1e6 - nt!MiRaisedIrqlFault+1e29ca (+0x98e38)
    [ fa:e0 ]
47 errors : !nt (fffff80028c5f3f1-fffff80028e2f1e6)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
AGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffbd07647729c0, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffffbd07647729c0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 ffffbd07647729c0

FAULTING_IP:
+3a2d14751e9359
ffffbd07`647729c0 ??              ???

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  nvcontainer.ex

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  ffffd98d2c9f07c0 -- (.trap 0xffffd98d2c9f07c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbd07647729c0 rbx=0000000000000000 rcx=ffffbf42c4c90e70
rdx=ffffbf42c061fe70 rsi=0000000000000000 rdi=0000000000000000
rip=ffffbd07647729c0 rsp=ffffd98d2c9f0958 rbp=00000000000008ee
 r8=ffffbf42c4e14450  r9=0000000000000000 r10=0000000000000000
r11=ffffb3fb4cc00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffbd07`647729c0 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8052dc86729 to fffff8052dbf3ea0

FAILED_INSTRUCTION_ADDRESS:
+3a2d14751e9359
ffffbd07`647729c0 ??              ???

STACK_TEXT: 
ffffd98d`2c9f0518 fffff805`2dc86729 : 00000000`00000050 ffffbd07`647729c0 00000000`00000010 ffffd98d`2c9f07c0 : nt!KeBugCheckEx
ffffd98d`2c9f0520 fffff805`2daeeb80 : 00000000`00000500 00000000`00000010 ffffd98d`2c9f0840 00000000`00000000 : nt!MiSystemFault+0x13faf9
ffffd98d`2c9f0620 fffff805`2dc0205e : 00000000`6c777355 ffffbf07`647d21f4 ffffbf42`c0602080 ffffbf42`c47d7ab0 : nt!MmAccessFault+0x400
ffffd98d`2c9f07c0 ffffbd07`647729c0 : ffffbf07`6449bbfb ffffbf42`c4c90e70 00000000`000008ee ffffbf42`c47f3010 : nt!KiPageFault+0x35e
ffffd98d`2c9f0958 ffffbf07`6449bbfb : ffffbf42`c4c90e70 00000000`000008ee ffffbf42`c47f3010 00000000`00000001 : 0xffffbd07`647729c0
ffffd98d`2c9f0960 ffffbf07`6449b977 : 00000000`00000001 ffffd98d`2c9f0a69 ffff8e04`b11a64b0 ffff8e04`bbedbfc0 : win32kbase!UpdateWindowTreeDpiAwareness+0x1af
ffffd98d`2c9f09b0 ffffbf07`6528db89 : ffff8e04`b19df580 00000000`00000002 00000000`00000020 000000b1`be5ffaf8 : win32kbase!NtUserSetProcessDpiAwarenessContext+0x267
ffffd98d`2c9f0ad0 fffff805`2dc058b8 : ffff8e04`b19df580 ffff8e04`be0d2660 ffffd98d`00000000 ffffd98d`2c9f0b80 : win32k!NtUserSetProcessDpiAwarenessContext+0x15
ffffd98d`2c9f0b00 00007ffb`8ed3ace4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b1`be5fef28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8ed3ace4


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffbf0764445697 - win32kbase!Win32FreePool+37
    [ 00:90 ]
    ffffbf07644456db-ffffbf07644456dc  2 bytes - win32kbase!AllocAce+2b (+0x44)
    [ 48 ff:4c 8b ]
    ffffbf07644456e2-ffffbf07644456e5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 39 cd 29 ]
    ffffbf0764445723-ffffbf0764445728  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 8f b8 23 00:e8 78 cb 29 00 90 ]
    ffffbf076444574f-ffffbf0764445754  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 63 b8 23 00:e8 4c cb 29 00 90 ]
    ffffbf076444577b-ffffbf0764445780  6 bytes - win32kbase!AllocAce+cb (+0x2c)
    [ ff 15 37 b8 23 00:e8 20 cb 29 00 90 ]
    ffffbf0764445796 - win32kbase!AllocAce+e6 (+0x1b)
    [ ff:e8 ]
    ffffbf076449b9c2-ffffbf076449b9c3  2 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+2b2 (+0x5622c)
    [ 48 ff:4c 8b ]
    ffffbf076449b9c9-ffffbf076449b9cc  4 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+2b9 (+0x07)
    [ 0f 1f 44 00:e8 52 6a 24 ]
    ffffbf076449ba00-ffffbf076449ba01  2 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+2f0 (+0x37)
    [ 48 ff:4c 8b ]
    ffffbf076449ba07-ffffbf076449ba0a  4 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+2f7 (+0x07)
    [ 0f 1f 44 00:e8 14 6a 24 ]
    ffffbf076449ba0f-ffffbf076449ba10  2 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+2ff (+0x08)
    [ 48 ff:4c 8b ]
    ffffbf076449ba16-ffffbf076449ba19  4 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+306 (+0x07)
    [ 0f 1f 44 00:e8 05 6a 24 ]
    ffffbf076449ba1d-ffffbf076449ba1e  2 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+30d (+0x07)
    [ 48 ff:4c 8b ]
    ffffbf076449ba24-ffffbf076449ba27  4 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+314 (+0x07)
    [ 0f 1f 44 00:e8 f7 69 24 ]
    ffffbf076449ba2c-ffffbf076449ba2d  2 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+31c (+0x08)
    [ 48 ff:4c 8b ]
    ffffbf076449ba33-ffffbf076449ba36  4 bytes - win32kbase!NtUserSetProcessDpiAwarenessContext+323 (+0x07)
    [ 0f 1f 44 00:e8 e8 69 24 ]
    ffffbf076449bbfb - win32kbase!UpdateWindowTreeDpiAwareness+1af (+0x1c8)
    [ 00:90 ]
    ffffbf07644af3a2-ffffbf07644af3a3  2 bytes - win32kbase!HMGrowHandleTable+86 (+0x137a7)
    [ 48 ff:4c 8b ]
    ffffbf07644af3a9-ffffbf07644af3ac  4 bytes - win32kbase!HMGrowHandleTable+8d (+0x07)
    [ 0f 1f 44 00:e8 72 30 23 ]
63 errors : !win32kbase (ffffbf0764445697-ffffbf07644af3ac)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff804068e50bd, Address of the instruction which caused the bugcheck
Arg3: ffffa58a229cca80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!MiRemoveSharedCommitNode+18d
fffff804`068e50bd 48836f2001      sub     qword ptr [rdi+20h],1

CONTEXT:  ffffa58a229cca80 -- (.cxr 0xffffa58a229cca80;r)
rax=0000000000000000 rbx=ffffe70ce3830080 rcx=ffffc10d089d7e68
rdx=ffffc10d089d7e48 rsi=ffffe70ce8ed8810 rdi=0000000000000000
rip=fffff804068e50bd rsp=ffffa58a229cd480 rbp=ffffe70ce3830080
 r8=ffffa58a229cd490  r9=7fffe70ce3830550 r10=7ffffffffffffffc
r11=ffffa58a229cd3b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffe70ce3a58080
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!MiRemoveSharedCommitNode+0x18d:
fffff804`068e50bd 48836f2001      sub     qword ptr [rdi+20h],1 ds:002b:00000000`00000020=????????????????
Last set context:
rax=0000000000000000 rbx=ffffe70ce3830080 rcx=ffffc10d089d7e68
rdx=ffffc10d089d7e48 rsi=ffffe70ce8ed8810 rdi=0000000000000000
rip=fffff804068e50bd rsp=ffffa58a229cd480 rbp=ffffe70ce3830080
 r8=ffffa58a229cd490  r9=7fffe70ce3830550 r10=7ffffffffffffffc
r11=ffffa58a229cd3b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffe70ce3a58080
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!MiRemoveSharedCommitNode+0x18d:
fffff804`068e50bd 48836f2001      sub     qword ptr [rdi+20h],1 ds:002b:00000000`00000020=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x3B

PROCESS_NAME:  taskhostw.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80406501d32 to fffff804068e50bd

STACK_TEXT: 
ffffa58a`229cd480 fffff804`06501d32 : ffffffff`ffffffff ffffc10d`089d7e68 ffffe70c`e7597ac0 00000000`00000000 : nt!MiRemoveSharedCommitNode+0x18d
ffffa58a`229cd4f0 fffff804`068999e9 : 00000000`00000000 00000000`00000000 ffffe70c`00000000 ffffe70c`00000000 : nt!MiDeleteVad+0xa22
ffffa58a`229cd600 fffff804`0689938c : ffffe70c`e758ae60 ffffe70c`e6e3ed40 ffffe70c`e3a58080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffa58a`229cd630 fffff804`068e4dd3 : ffffe70c`e7597ac0 ffffe70c`e7597ac0 ffffe70c`e758ae60 ffffe70c`e3830080 : nt!MiCleanVad+0x30
ffffa58a`229cd660 fffff804`06881f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe70c`e3830080 : nt!MmCleanProcessAddressSpace+0x137
ffffa58a`229cd6e0 fffff804`0689ea8a : ffffe70c`e3830080 ffffc10d`05ddd060 ffffa58a`229cd920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffa58a`229cd760 fffff804`067f4558 : 00000000`00000000 00000000`00000001 ffffe70c`dcde3501 00000012`118c7000 : nt!PspExitThread+0x5f6
ffffa58a`229cd860 fffff804`064e6ca7 : ffffa58a`229c0101 00000000`00000000 ffffe70c`e8ece390 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffa58a`229cd8a0 fffff804`065f8440 : 000001f8`179d2cc0 ffffa58a`229cd950 00000012`11aff8c8 ffffe70c`00000000 : nt!KiDeliverApc+0x487
ffffa58a`229cd950 fffff804`0660595f : 00000000`00000000 ffffa58a`229cdb80 00000000`00000000 ffffe70c`e51491c0 : nt!KiInitiateUserApc+0x70
ffffa58a`229cda90 00007ffe`10ccf814 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000012`11aff878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`10ccf814


CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8040570aad4-fffff8040570aad5  2 bytes - FLTMGR!FltSendMessage+74
    [ 48 ff:4c 8b ]
    fffff8040570aadb-fffff8040570aade  4 bytes - FLTMGR!FltSendMessage+7b (+0x07)
    [ 0f 1f 44 00:e8 70 39 e0 ]
    fffff8040570aaf9-fffff8040570aafa  2 bytes - FLTMGR!FltSendMessage+99 (+0x1e)
    [ 48 ff:4c 8b ]
    fffff8040570ab00-fffff8040570ab03  4 bytes - FLTMGR!FltSendMessage+a0 (+0x07)
    [ 0f 1f 44 00:e8 cb 2f dd ]
    fffff8040570ab0e-fffff8040570ab0f  2 bytes - FLTMGR!FltSendMessage+ae (+0x0e)
    [ 48 ff:4c 8b ]
    fffff8040570ab15-fffff8040570ab18  4 bytes - FLTMGR!FltSendMessage+b5 (+0x07)
    [ 0f 1f 44 00:e8 f6 4d dd ]
    fffff8040570bf9c-fffff8040570bf9d  2 bytes - FLTMGR!FltpFsControlCompletion+c (+0x1487)
    [ 48 ff:4c 8b ]
    fffff8040570bfa3-fffff8040570bfa6  4 bytes - FLTMGR!FltpFsControlCompletion+13 (+0x07)
    [ 0f 1f 44 00:e8 58 d2 db ]
    fffff8040570c031-fffff8040570c032  2 bytes - FLTMGR!FltpSaveFileObjectFileName+45 (+0x8e)
    [ 48 ff:4c 8b ]
    fffff8040570c038-fffff8040570c03c  5 bytes - FLTMGR!FltpSaveFileObjectFileName+4c (+0x07)
    [ 0f 1f 44 00 00:e8 f3 5f 4a 01 ]
    fffff8040570c055-fffff8040570c056  2 bytes - FLTMGR!FltpSaveFileObjectFileName+69 (+0x1d)
    [ 48 ff:4c 8b ]
    fffff8040570c05c-fffff8040570c05f  4 bytes - FLTMGR!FltpSaveFileObjectFileName+70 (+0x07)
    [ 0f 1f 44 00:e8 af 70 dc ]
    fffff8040570c09f-fffff8040570c0a0  2 bytes - FLTMGR!FltAcquirePushLockSharedEx+f (+0x43)
    [ 48 ff:4c 8b ]
    fffff8040570c0a6-fffff8040570c0a7  2 bytes - FLTMGR!FltAcquirePushLockSharedEx+16 (+0x07)
    [ 0f 1f:e8 25 ]
    fffff8040573cd05-fffff8040573cd06  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
    [ 48 ff:4c 8b ]
    fffff8040573cd0c-fffff8040573cd0f  4 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
    [ 0f 1f 44 00:e8 8f fd cf ]
    fffff8040573cd1a-fffff8040573cd1b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
    [ 48 ff:4c 8b ]
    fffff8040573cd21-fffff8040573cd24  4 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
    [ 0f 1f 44 00:e8 3a 3c da ]
    fffff8040573cd6a-fffff8040573cd6b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
    [ 48 ff:4c 8b ]
    fffff8040573cd71-fffff8040573cd74  4 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
    [ 0f 1f 44 00:e8 3a 34 da ]
    fffff8040573cd76-fffff8040573cd77  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+a6 (+0x05)
    [ 48 ff:4c 8b ]
    fffff8040573cd7d-fffff8040573cd80  4 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x07)
    [ 0f 1f 44 00:e8 0e 0f cd ]
65 errors : !FLTMGR (fffff8040570aad4-fffff8040573cd80)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffa58a229cca80 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Bende mavi ekran alıyorum yardımcı olur musun reis?
Olurum.
Battleye ve Easy Anti-Cheat'i kaldırınız.
DDU ile ekran kartı sürücüsünü kaldırıp WHQL bir sürümünü kurunuz.
Memtest86 ile bellek testi yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu dediklerimin sonucu yeni bir konu açıp paylaşınız.
 
Olurum.
Battleye ve Easy Anti-Cheat'i kaldırınız.
DDU ile ekran kartı sürücüsünü kaldırıp WHQL bir sürümünü kurunuz.
Memtest86 ile bellek testi yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu dediklerimin sonucu yeni bir konu açıp paylaşınız.
Dostum bende mavi ekran hatası alıyorum yardımcı olur musun?
 

Yeni konular

Geri
Yukarı