Tekrardan selamlar, hızlı bir şekilde geri dönemediğim için kusuruma bakmayın. Şimdi, sizden önümüzdeki süreçte birkaç şey isteyeceğim. Öncelikle HD Tune 5.75 indirin ve sistemdeki disklerinizin Health sekmesinin ekran alıntısını bizimle paylaşın. Ek olarak sisteme bağlı USB aygıtları sayar mısınız? USB kulaklığınız ya da mikrofonunuz var mı? Bu detayları belirtirseniz sevinirim. Ona göre diğer adımlara geçiş yaparız, bilginize.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe26003000018, Virtual address for the attempted write.
Arg2: 8a00000000100021, PTE contents.
Arg3: ffffcc8e812f37f0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10265
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16092
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 2739
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 020222-39921-01.dmp
BUGCHECK_CODE: be
BUGCHECK_P1: ffffe26003000018
BUGCHECK_P2: 8a00000000100021
BUGCHECK_P3: ffffcc8e812f37f0
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: ffffcc8e812f37f0 -- (.trap 0xffffcc8e812f37f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe26003000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031303acee rsp=ffffcc8e812f3980 rbp=ffffcc8e812f3a01
r8=0000000200100000 r9=ffffa500e6ac0c08 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiDeletePteList+0x35e:
fffff803`1303acee f0490fba6e183f lock bts qword ptr [r14+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
ffffcc8e`812f35f8 fffff803`132756ee : 00000000`000000be ffffe260`03000018 8a000000`00100021 ffffcc8e`812f37f0 : nt!KeBugCheckEx
ffffcc8e`812f3600 fffff803`1309f5bf : 8a000000`00100021 00000000`00000003 ffffcc8e`812f3870 00000000`00000000 : nt!MiRaisedIrqlFault+0x1423d2
ffffcc8e`812f3650 fffff803`1320545e : 00000000`00000002 00000000`80000002 ffffcc8e`812f3890 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffcc8e`812f37f0 fffff803`1303acee : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffcc8e`812f3980 fffff803`130b0c1e : ffffcc8e`812f3c30 ffffd208`8b73b180 00000000`00000000 ffffcc8e`812f4670 : nt!MiDeletePteList+0x35e
ffffcc8e`812f3a60 fffff803`133fa1ed : ffffd208`8bf092c0 ffffd208`8b344378 00000000`00000001 00000000`00000000 : nt!MiDecommitPages+0x121e
ffffcc8e`812f4630 fffff803`133f9853 : 00000000`00000000 00000000`00000000 ffffcc8e`812f47b0 ffffd208`8b344350 : nt!MiDecommitRegion+0x7d
ffffcc8e`812f46b0 fffff803`133f9145 : 00000000`00000000 fffff803`132091cc ffffd208`8bf092c0 ffffcc8e`812f4860 : nt!MmFreeVirtualMemory+0x6d3
ffffcc8e`812f4800 fffff803`132091f1 : ffffd208`8bf092c0 00000000`00000000 ffffcc8e`812f4938 00000000`00000008 : nt!NtFreeVirtualMemory+0x95
ffffcc8e`812f4860 fffff803`131fb140 : fffff803`25410e9c ffffd208`8bbe8b20 ffffd208`8bbe8520 00000000`00000200 : nt!KiSystemServiceExitPico+0x2bc
ffffcc8e`812f49f8 fffff803`25410e9c : ffffd208`8bbe8b20 ffffd208`8bbe8520 00000000`00000200 fffff803`25413707 : nt!KiServiceLinkage
ffffcc8e`812f4a00 fffff803`2541434a : 00000000`00071000 ffffaa00`b6c10148 ffffaa00`c0603ba0 ffffd208`8bbe8520 : dxgmms2!VIDMM_RECYCLE_RANGE:
ebouncedDecommit+0x160
ffffcc8e`812f4a50 fffff803`254143f6 : fffff803`00000000 ffffd208`8bbe8520 00000000`00000000 fffff803`13b25440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR:
rocessDebounceList+0x12a
ffffcc8e`812f4ac0 fffff803`25414211 : fffff803`13b25440 ffffd208`8800d920 00000000`00000000 00000000`00000200 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
ffffcc8e`812f4b40 fffff803`130b8655 : ffffd208`8bf092c0 fffff803`1fa02fa0 ffffd208`7d6a0500 00000000`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
ffffcc8e`812f4b70 fffff803`13155995 : ffffd208`8bf092c0 00000000`00000080 ffffd208`7d674040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffcc8e`812f4c10 fffff803`131fe938 : ffff9280`a3358180 ffffd208`8bf092c0 fffff803`13155940 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffcc8e`812f4c60 00000000`00000000 : ffffcc8e`812f5000 ffffcc8e`812ef000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_RANGE:
ebouncedDecommit+160
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1469
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 160
FAILURE_BUCKET_ID: 0xBE_dxgmms2!VIDMM_RECYCLE_RANGE:
ebouncedDecommit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a6104d4-555c-91ca-b987-7bc7f0d3a50c}
Followup: MachineOwner
---------
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132882582373273719
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_0C76&PID_161F\6&944c330&0&2
VetoString :
[/CODE]