R7 240 sistemde mavi ekran hatası

İşletim sistemi
Windows 10

Müslümhan

Femtopat
Katılım
31 Ocak 2022
Mesajlar
11
Daha fazla  
Cinsiyet
Erkek
RAM
Smart pc3l-12800U 8x8 16gb ram
SSD veya HDD modeli
Seagate Barracuda 1TB 3.5" 7200RPM 64MB Cache Sata
Ekran kartı
Seagate Barracuda 1TB 3.5" 7200RPM 64MB Cache Sata
Anakart
GA-H61MA-D3V
İşlemci
Intel® Core™ i5-3330 İşlemci 6M Önbellek, 3.20 GHz
Sistem özellikleri: R7 240 ekran kartı, i5 3330 işlemci, 8x8 1600MHz RAM, 1TB 7200RPM hard disk. Günde 1-2 kere mavi ekran hatası alıyorum PC format attım yine alınca tek çare buraya yazdım.

 
Son düzenleyen: Moderatör:
Tekrardan selamlar, hızlı bir şekilde geri dönemediğim için kusuruma bakmayın. Şimdi, sizden önümüzdeki süreçte birkaç şey isteyeceğim. Öncelikle HD Tune 5.75 indirin ve sistemdeki disklerinizin health sekmesinin ekran alıntısını bizimle paylaşın. Ek olarak sisteme bağlı USB aygıtları sayar mısınız? USB kulaklığınız ya da mikrofonunuz var mı? Bu detayları belirtirseniz sevinirim. Ona göre diğer adımlara geçiş yaparız, bilginize.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the.
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on.
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe26003000018, Virtual address for the attempted write.
Arg2: 8a00000000100021, PTE contents.
Arg3: ffffcc8e812f37f0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10265.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 16092.

Key : Analysis.Init.CPU.mSec
Value: 874.

Key : Analysis.Init.Elapsed.mSec
Value: 2739.

Key : Analysis.Memory.CommitPeak.Mb
Value: 75.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 020222-39921-01.dmp

BUGCHECK_CODE: be.

BUGCHECK_P1: ffffe26003000018.

BUGCHECK_P2: 8a00000000100021.

BUGCHECK_P3: ffffcc8e812f37f0.

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffffcc8e812f37f0 -- (.trap 0xffffcc8e812f37f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe26003000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031303acee rsp=ffffcc8e812f3980 rbp=ffffcc8e812f3a01
r8=0000000200100000 r9=ffffa500e6ac0c08 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
nt!MiDeletePteList+0x35e:
fffff803`1303acee f0490fba6e183f lock bts qword ptr [r14+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope.

STACK_TEXT:
ffffcc8e`812f35f8 fffff803`132756ee : 00000000`000000be ffffe260`03000018 8a000000`00100021 ffffcc8e`812f37f0 : nt!KeBugCheckEx
ffffcc8e`812f3600 fffff803`1309f5bf : 8a000000`00100021 00000000`00000003 ffffcc8e`812f3870 00000000`00000000 : nt!MiRaisedIrqlFault+0x1423d2
ffffcc8e`812f3650 fffff803`1320545e : 00000000`00000002 00000000`80000002 ffffcc8e`812f3890 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffcc8e`812f37f0 fffff803`1303acee : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffcc8e`812f3980 fffff803`130b0c1e : ffffcc8e`812f3c30 ffffd208`8b73b180 00000000`00000000 ffffcc8e`812f4670 : nt!MiDeletePteList+0x35e
ffffcc8e`812f3a60 fffff803`133fa1ed : ffffd208`8bf092c0 ffffd208`8b344378 00000000`00000001 00000000`00000000 : nt!MiDecommitPages+0x121e
ffffcc8e`812f4630 fffff803`133f9853 : 00000000`00000000 00000000`00000000 ffffcc8e`812f47b0 ffffd208`8b344350 : nt!MiDecommitRegion+0x7d
ffffcc8e`812f46b0 fffff803`133f9145 : 00000000`00000000 fffff803`132091cc ffffd208`8bf092c0 ffffcc8e`812f4860 : nt!MmFreeVirtualMemory+0x6d3
ffffcc8e`812f4800 fffff803`132091f1 : ffffd208`8bf092c0 00000000`00000000 ffffcc8e`812f4938 00000000`00000008 : nt!NtFreeVirtualMemory+0x95
ffffcc8e`812f4860 fffff803`131fb140 : fffff803`25410e9c ffffd208`8bbe8b20 ffffd208`8bbe8520 00000000`00000200 : nt!KiSystemServiceExitPico+0x2bc
ffffcc8e`812f49f8 fffff803`25410e9c : ffffd208`8bbe8b20 ffffd208`8bbe8520 00000000`00000200 fffff803`25413707 : nt!KiServiceLinkage
ffffcc8e`812f4a00 fffff803`2541434a : 00000000`00071000 ffffaa00`b6c10148 ffffaa00`c0603ba0 ffffd208`8bbe8520 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
ffffcc8e`812f4a50 fffff803`254143f6 : fffff803`00000000 ffffd208`8bbe8520 00000000`00000000 fffff803`13b25440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::processDebounceList+0x12a
ffffcc8e`812f4ac0 fffff803`25414211 : fffff803`13b25440 ffffd208`8800d920 00000000`00000000 00000000`00000200 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
ffffcc8e`812f4b40 fffff803`130b8655 : ffffd208`8bf092c0 fffff803`1fa02fa0 ffffd208`7d6a0500 00000000`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
ffffcc8e`812f4b70 fffff803`13155995 : ffffd208`8bf092c0 00000000`00000080 ffffd208`7d674040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffcc8e`812f4c10 fffff803`131fe938 : ffff9280`a3358180 ffffd208`8bf092c0 fffff803`13155940 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffcc8e`812f4c60 00000000`00000000 : ffffcc8e`812f5000 ffffcc8e`812ef000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+160

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 160.

FAILURE_BUCKET_ID: 0xBE_dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {8a6104d4-555c-91ca-b987-7bc7f0d3a50c}

Followup: MachineOwner.
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132882582373273719.
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24.
PnpVetoType : 0
DeviceId : USB\VID_0C76&PID_161F\6&944c330&0&2
VetoString :
[/CODE]

Rampage Stormy siyah USB 7.1 Surround oyuncu kulaklık+Mic.
Platoon PL-145 oyuncu klayesi - USB Gaming Q klavye.
Logitech G300s Gaming mouse.

1643882352094.png


s1.png
 
Son düzenleyen: Moderatör:
Tamamdır. USB aygıtlarınızı farklı USB girişlerine takın ve kullandığınız USB hub vb. aygıt varsa onları kullanmak yerine direkt anakartın USB girişlerini kullanın.
 
Selamlar, geç döndüm kusuruma bakmayın. CPU'nun pinlerinin eksiksiz olduğunu kontrol eder misiniz size zahmet? Elinizde termal macun varsa evde yapın yoksa da macun alıp evde yapabilirsiniz ya da bir bilgisayarcıda kontrol ettirebilirsiniz. Size tahminlerimi söyleyeyim. Anakart, CPU, CPU soketi ya da RAM soketi arızalı olabilir. Bunları bir yerde tek tek test ettirip sonucu bize iletmenizi rica ediyorum sizden.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffd010c5b2080
Arg3: 0000000000040000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 19484

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 104538

Key : Analysis.Init.CPU.mSec
Value: 1718

Key : Analysis.Init.Elapsed.mSec
Value: 14917

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : MemoryManagement.PFN
Value: 40

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020422-41781-01.dmp

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffffd010c5b2080

BUGCHECK_P3: 40000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: VALORANT-Win64-Shipping.exe

STACK_TEXT:
ffff818b`ba466f68 fffff802`50a440ca : 00000000`0000001a 00000000`00041792 fffffd01`0c5b2080 00000000`00040000 : nt!KeBugCheckEx
ffff818b`ba466f70 fffff802`50a9e556 : 00000000`00000000 00000000`00000000 00000000`00000022 fffffd01`0c5b2080 : nt!MiDeleteVa+0x153a
ffff818b`ba467070 fffff802`50a9e66b : fffffd7e`80862d90 ffff8307`4428d700 ffff818b`00000000 ffff818b`ba4674e0 : nt!MiWalkPageTablesRecursively+0x776
ffff818b`ba467110 fffff802`50a9e66b : fffffd7e`00000000 ffff8307`4428d700 ffff818b`00000001 ffff818b`ba4674f0 : nt!MiWalkPageTablesRecursively+0x88b
ffff818b`ba4671b0 fffff802`50a9e66b : fffffd7e`bf404000 ffff8307`4428d700 ffff818b`00000002 ffff818b`ba467500 : nt!MiWalkPageTablesRecursively+0x88b
ffff818b`ba467250 fffff802`50a04f4b : 00000000`00000000 ffff8307`4428d700 00000000`00000003 ffff818b`ba467510 : nt!MiWalkPageTablesRecursively+0x88b
ffff818b`ba4672f0 fffff802`50a42961 : ffff818b`ba467490 ffff8307`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff818b`ba4673f0 fffff802`50a12aa0 : 00000000`00000000 ffff818b`00000000 ffff8307`4428d550 ffff8307`392e7080 : nt!MiDeletePagablePteRange+0x4f1
ffff818b`ba467700 fffff802`50a52107 : 00000000`218b714f 00000000`00000000 ffff8307`00000000 fffff802`00000000 : nt!MiDeleteVad+0x360
ffff818b`ba467810 fffff802`50df966c : ffff818b`00000000 00000000`00000000 ffff818b`ba467970 00000218`b5150000 : nt!MiFreeVadRange+0xa3
ffff818b`ba467870 fffff802`50df9145 : ffff89d0`1a334dc6 00000000`00000000 ffffa70d`515c30e0 00000000`00000000 : nt!MmFreeVirtualMemory+0x4ec
ffff818b`ba4679c0 fffff802`50c08cb8 : ffff8307`392e7080 00000000`00000000 00000000`0000000a ffff818b`00000000 : nt!NtFreeVirtualMemory+0x95
ffff818b`ba467a20 fffff802`50bfb140 : fffff802`61530152 ffffa70d`03136d10 fffff802`614f3de6 ffff8307`408fcf60 : nt!KiSystemServiceCopyEnd+0x28
ffff818b`ba467bb8 fffff802`61530152 : ffffa70d`03136d10 fffff802`614f3de6 ffff8307`408fcf60 fffff802`50b4ae69 : nt!KiServiceLinkage
ffff818b`ba467bc0 fffff802`614d1016 : 00000000`02000000 ffffa70d`06848800 ffffa70d`515be820 00000000`00000008 : dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+0xb6
ffff818b`ba467c10 fffff802`61530061 : ffffa70d`03136d10 fffff802`61534cff 00000000`00000001 ffffa70d`515be820 : dxgmms2!VIDMM_RECYCLE_BLOCK::`scalar deleting destructor'+0xe
ffff818b`ba467c40 fffff802`61533cfb : ffffa70d`06848800 ffffa70d`515be820 ffffa70d`515be820 ffffa70d`03136d10 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::DestroyRange+0x5d
ffff818b`ba467c80 fffff802`61534369 : ffffa70d`515bca88 ffff8307`46584660 ffffa70d`515c31a0 ffff8307`46584050 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::MergeSubrangesWherePossible+0x10b
ffff818b`ba467cb0 fffff802`61592698 : ffff818b`00000000 ffff8307`46584688 ffffa70d`5271c401 ffffa70d`5271dbd8 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::processDebounceList+0x149
ffff818b`ba467d20 fffff802`61535b11 : ffff8307`46584580 ffffa70d`5271cb10 ffff8307`408fcf60 ffffa70d`03145d01 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::processDebounceListsGlobally+0xd0
ffff818b`ba467db0 fffff802`615586b5 : ffff8307`48131e10 ffffa70d`0940f6b0 ffffa70d`03145d50 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x211
ffff818b`ba467df0 fffff802`61543eea : ffff8307`48131e10 00000000`00000004 ffff8307`48131e10 ffffa70d`03145d50 : dxgmms2!VIDMM_GLOBAL::UncommitLocalBackingStore+0x171
ffff818b`ba467e80 fffff802`61543bd5 : 00000000`00000000 ffffa70c`00000000 00000000`40006980 ffff8307`48131e10 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x27a
ffff818b`ba467fc0 fffff802`614e1eaa : 00000000`00000000 ffffa70c`fe49cb30 ffff818b`ba468150 ffffa70d`00000003 : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0xc5
ffff818b`ba468010 fffff802`5abc73b9 : 00000000`00000000 ffff818b`ba468150 00000000`00000000 00000000`00000000 : dxgmms2!VidMmCloseAllocation+0x1a
ffff818b`ba468050 fffff802`5abc6e0f : 00000000`00000000 fffff802`5ab848fa ffffa70d`07c0b010 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4c5
ffff818b`ba4681f0 fffff802`5ab85020 : ffffa70d`07c0b010 ffffa70d`07c0b100 00000000`00000000 ffffa70d`07c0b1f0 : dxgkrnl!DXGDEVICE::DrainAllocations+0x5f
ffff818b`ba468250 fffff802`5ab8471c : ffffa70d`07c0b010 ffffa70d`51b9bc20 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x148
ffff818b`ba468290 fffff802`5abb46c8 : 00000000`00000000 ffff818b`ba4683c0 ffffa70d`07c0b010 ffffa70d`07c0b010 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffff818b`ba4682c0 fffff802`5abb54f9 : ffffa70c`fe49cb30 00000000`000014dc ffffa70c`fe49cb30 ffff818b`ba4686c8 : dxgkrnl!DXGPROCESS::Destroy+0x494
ffff818b`ba468530 fffff802`5aaa6841 : 00000000`00000000 ffff8307`483ef800 00000000`00000000 00000000`00000000 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff818b`ba468680 fffff802`50e02a4f : 00000000`00000000 ffff8307`34fa0090 ffff8307`4428d080 fffff802`01046000 : dxgkrnl!DxgkProcessNotify+0x1a1
ffff818b`ba4686d0 fffff802`50e1d664 : ffff8307`4428d000 ffff8307`4428d080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff818b`ba4687a0 fffff802`50eb0fa2 : ffff8307`392e74b8 00000000`00000000 ffff818b`ba468990 00000000`00000000 : nt!PspExitProcess+0x70
ffff818b`ba4687d0 fffff802`50ef5b88 : 00000000`00000003 00000000`00000001 ffff818b`ba4689e0 000000a9`3dbe4000 : nt!PspExitThread+0x5b2
ffff818b`ba4688d0 fffff802`50a0ef67 : ffff8307`346dc300 ffff8307`48085000 00000000`00000000 00000000`00000001 : nt!KiSchedulerApcTerminate+0x38
ffff818b`ba468910 fffff802`50bfb880 : 00000000`00000000 ffff818b`ba4689c0 ffff8307`48094d48 ffff8307`00000000 : nt!KiDeliverApc+0x487
ffff818b`ba4689c0 fffff802`50c08d5f : ffff8307`392e7080 ffff8307`430cf080 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffff818b`ba468b00 00007ffa`2976cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a9`ab29f878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2976cdf4


MODULE_NAME: hardware

IMAGE_NAME: memory_corruption

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff800a96beee9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8006b297f84, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 16327

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 55839

Key : Analysis.Init.CPU.mSec
Value: 1108

Key : Analysis.Init.Elapsed.mSec
Value: 4731

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020422-41328-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: fffff800a96beee9

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8006b297f84

WRITE_ADDRESS: fffff80067cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff800a96beee9

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff8006be6dcf0 -- (.trap 0xfffff8006be6dcf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000d41c41a0 rbx=0000000000000000 rcx=fffff8006be6df28
rdx=ffff9603d41c41a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006b297f84 rsp=fffff8006be6de88 rbp=fffff8006be6df29
r8=0000000000000000 r9=ffff9603cfffc541 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ndis!NDIS_PCW_CONTEXT::NDIS_PCW_CONTEXT+0x10:
fffff800`6b297f84 3085c00f853d xor byte ptr [rbp+3D850FC0h],al ss:0018:fffff800`a96beee9=??
Resetting default scope

STACK_TEXT:
fffff800`6be6dba8 fffff800`67409269 : 00000000`0000000a fffff800`a96beee9 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`6be6dbb0 fffff800`67405569 : fffff800`653a34d0 ffff9603`00000000 ffff9603`e0ccece0 fffff800`653a448a : nt!KiBugCheckDispatch+0x69
fffff800`6be6dcf0 fffff800`6b297f84 : fffff800`6b2625ab ffff9603`dc6e48e0 ffff9603`dc6e48e0 00000000`00000000 : nt!KiPageFault+0x469
fffff800`6be6de88 fffff800`6b2625ab : ffff9603`dc6e48e0 ffff9603`dc6e48e0 00000000`00000000 00000000`00000000 : ndis!NDIS_PCW_CONTEXT::NDIS_PCW_CONTEXT+0x10
fffff800`6be6de90 fffff800`6b522f7e : ffff9603`d3763010 ffff9603`dc095ba0 ffff9603`00000000 00000000`00000000 : ndis!NdisSendNetBufferLists+0x14b
fffff800`6be6df90 fffff800`6b4e3f21 : 00000000`00000007 00000000`00000000 00000000`00000000 00000000`00000007 : tcpip!FlFastSendPackets+0x8e
fffff800`6be6e000 fffff800`6b4e50f8 : 00000000`00000000 00000000`00000014 ffff9603`d3bcaba0 ffff9603`dc095ba0 : tcpip!IpNlpFastContinueSendDatagrams+0x501
fffff800`6be6e150 fffff800`6b4e3979 : 00000000`00000000 00000000`00000000 fffff800`6b6a9230 ffff9603`dc6e48e0 : tcpip!IppSendDatagramsCommon+0x708
fffff800`6be6e2d0 fffff800`6b5139cd : ffff9603`d75a6d40 00000000`00000014 00000000`00000000 ffff9603`dd7f12b0 : tcpip!IpNlpFastSendDatagram+0x349
fffff800`6be6e390 fffff800`6b511b8e : 00000000`00000000 00000000`00000000 fffff800`00000004 00000000`008bbf18 : tcpip!TcpTcbHeaderSend+0x5cd
fffff800`6be6e640 fffff800`6729a38e : fffff800`63d34240 fffff800`63d31180 fffff800`6be6eb20 fffff800`63d31180 : tcpip!TcpPeriodicTimeoutHandler+0xe6e
fffff800`6be6e860 fffff800`67299674 : 00000000`00000000 00000000`00000000 00000000`00000008 00000000`000554c8 : nt!KiExecuteAllDpcs+0x30e
fffff800`6be6e9d0 fffff800`673fae4e : 00000000`00000000 fffff800`63d31180 fffff800`67d27a00 ffff9603`dbba5080 : nt!KiRetireDpcList+0x1f4
fffff800`6be6ec60 00000000`00000000 : fffff800`6be6f000 fffff800`6be69000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


CHKIMG_EXTENSION: !chkimg -lo 50 -db !ndis
180 errors : !ndis (fffff8006b297083-fffff8006b297ff3)
fffff8006b297080 db 48 83 *c8 02 4d 8b f0 48 8b f2 *48 8b c9 8b fb .H...M..H..H....
fffff8006b297090 48 8d 2c 80 48 c1 e5 02 49 39 28 *12 78 48 85 c9 H.,.H...I9(.xH..
fffff8006b2970a0 74 0e 8a *00 80 f9 11 0f 85 49 0b 02 00 49 8b f9 t........I...I..
fffff8006b2970b0 48 8b 15 *e1 d0 0a 00 4c 8b c5 48 *0b ce e8 be 8a H......L..H.....
...
fffff8006b2970d0 74 4a 4c 8b 87 30 11 00 00 4d 85 *e1 74 3e 8b c1 tJL..0...M..t>..
fffff8006b2970e0 45 0f b7 *0f 40 66 44 89 0a ff c1 *4c 83 c2 14 3b [email protected]...;
fffff8006b2970f0 4e 20 72 *c9 48 8b 74 24 40 8b c3 48 8b 5c 24 30 N [email protected].\$0
fffff8006b297100 48 8b 7c *e4 48 49 89 2e 48 8b 6c *64 38 48 83 c4 H.|.HI..H.ld8H..
fffff8006b297110 20 41 5e c3 cc bb 16 00 01 c0 eb *fd 41 b9 ff ff A^.........A...
fffff8006b297120 00 00 eb *d1 cc cc cc cc cc cc cc cc cc cc cc cc ................
fffff8006b297130 48 8b c4 *4c 89 58 10 48 89 70 18 *cc 89 78 20 55 H..L.X.H.p...x U
fffff8006b297140 41 54 41 *56 41 56 41 57 48 8d 68 *81 48 81 ec a0 ATAVAVAWH.h.H...
fffff8006b297150 00 00 00 48 8b 05 26 c6 0a 00 48 *37 c4 48 89 45 ...H..&...H7.H.E
fffff8006b297160 27 83 65 *c4 00 48 8d 55 c7 0f 57 *c4 0f 57 c9 0f '.e..H.U..W..W..
...
fffff8006b297200 e9 19 0a *0a 00 cc cc cc cc cc cc *4c cc cc cc cc ...........L....
fffff8006b297210 48 8b c4 48 89 58 08 48 89 68 10 *42 89 70 18 57 H..H.X.H.h.B.p.W
fffff8006b297220 41 54 41 *d1 48 83 ec 50 83 3d 71 *92 0a 00 00 4c ATA.H..P.=q....L
fffff8006b297230 8d 25 12 *e7 0a 00 41 0f b7 f0 8b *6a 4c 8b f1 74 .%....A....jL..t
fffff8006b297240 39 4c 39 *2d 00 be 0a 00 74 30 89 *7c d0 41 b9 89 9L9-....t0.|.A..
fffff8006b297250 00 00 00 89 50 c8 48 89 48 c0 48 *cd 05 c7 30 09 ....P.H.H.H...0.
fffff8006b297260 00 48 8b *5c e8 bd 0a 00 45 8d 41 *9c 48 89 44 24 .H.\....E.A.H.D$
fffff8006b297270 20 48 8b *59 40 e8 8e 46 00 00 8d *7c 20 66 83 ff [email protected]...| f..
...
fffff8006b297380 44 24 58 *45 b8 15 00 00 00 48 89 *75 24 50 48 8d D$XE.....H.u$PH.
fffff8006b297390 84 24 b8 *44 00 00 48 89 44 24 48 8b d7 48 89 7c .$.D..H.D$H..H.|
fffff8006b2973a0 24 40 48 8d 84 24 b0 00 00 00 48 *88 44 24 38 48 $@H..$....H.D$8H
fffff8006b2973b0 8b cb 48 *8f 84 24 a8 00 00 00 48 89 74 24 30 48 ..H..$....H.t$0H
fffff8006b2973c0 89 44 24 *2a 66 89 6c 24 20 4c 8b 15 d8 bc 0b 00 .D$*f.l$ L......
...
fffff8006b2973e0 6b 18 49 *af 73 20 49 8b e3 5f c3 cc cc cc cc cc k.I.s I.._......
fffff8006b2973f0 cc cc cc *8c cc cc cc cc cc cc cc *84 cc cc cc cc ................
...
fffff8006b297480 28 85 c0 *8f 84 9a 0a 02 00 83 f8 *81 75 0e 48 85 (...........u.H.
fffff8006b297490 ed 75 77 48 85 f6 0f 85 9c 00 00 *05 4c 8d 35 e5 .uwH........L.5.
fffff8006b2974a0 2e 09 00 *6c 39 25 9e bb 0a 00 74 *28 41 8b 47 28 ...l9%....t(A.G(
fffff8006b2974b0 41 b9 8a *94 00 00 89 44 24 40 b2 *01 40 0f b6 cf A......D$@..@...
fffff8006b2974c0 89 4c 24 *28 48 8b 0d 85 bb 0a 00 45 8d 41 81 48 .L$(H......E.A.H
fffff8006b2974d0 89 6c 24 *b0 48 89 74 24 28 4c 89 74 24 20 48 8b .l$.H.t$(L.t$ H.
fffff8006b2974e0 49 40 e8 29 41 fe ff 4c 8d 5c 24 *e0 40 8a c7 49 I@.)A..L.\[email protected]
fffff8006b2974f0 8b 5b 20 *4b 8b 6b 28 49 8b 73 30 49 8b 7b 38 49 .[ K.k(I.s0I.{8I
fffff8006b297500 8b e3 41 *d7 41 5e 41 5c c3 cc 48 8b cb e8 92 0a ..A.A^A\..H.....
fffff8006b297510 00 00 84 c0 0f 84 79 ff ff ff 4d *ab c6 48 8b d3 ......y...M..H..
fffff8006b297520 48 8b cd *aa 74 00 00 00 40 8a f8 *1d 01 0f 85 60 H...t...@......`
fffff8006b297530 ff ff ff *c1 64 ff ff ff 48 8b 43 *08 f6 40 04 04 ....d...H.C..@..
fffff8006b297540 75 23 48 *a7 d6 48 8d 4c 24 50 e8 *2c 0a 00 00 f7 u#H..H.L$P.,....
fffff8006b297550 44 24 5c *84 08 00 00 0f 85 03 0a *16 00 48 83 a3 D$\..........H..
fffff8006b297560 90 00 00 *44 00 4d 8b c6 48 8b d3 *69 8b ce e8 2d ...D.M..H..i...-
fffff8006b297570 03 00 00 *42 8a f8 3c 01 0f 84 1e *bf ff ff f7 86 ...B..<.........
...
fffff8006b297600 48 8b 49 *49 e8 d7 6b fd ff 41 b8 0b 00 00 00 4c H.II..k..A.....L
fffff8006b297610 8d 15 72 *1d 09 00 83 65 38 00 44 *89 75 30 c6 84 ..r....e8.D.u0..
fffff8006b297620 24 b8 00 00 00 01 41 83 fe 1c 0f *92 5c 09 02 00 $.....A.....\...
fffff8006b297630 48 8b 5d *b8 41 bd 28 00 00 00 8a *1a 01 80 f9 02 H.].A.(.........
fffff8006b297640 72 2c 0f *86 53 02 66 41 3b d5 0f 82 af 09 02 00 r,..S.fA;.......
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: STRIDE

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup: memory_corruption
---------
[/CODE]
 

Geri
Yukarı