Tekrardan selamlar, bilgisayarınıza Memtest86 testi uygulamayı deneyin. Tabii bu işlem öncesi BIOS'tan XMP ayarını kapamayı unutmayın. Sonuçları bizimle paylaşırsanız sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff893ffda3b110
Arg3: 0000000008000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8436
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20859
Key : Analysis.Init.CPU.mSec
Value: 1124
Key : Analysis.Init.Elapsed.mSec
Value: 4550
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : MemoryManagement.PFN
Value: 8000
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 020722-7703-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff893ffda3b110
BUGCHECK_P3: 8000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffb981`5f96ed78 fffff800`546440ca : 00000000`0000001a 00000000`00041792 ffff893f`fda3b110 00000000`08000000 : nt!KeBugCheckEx
ffffb981`5f96ed80 fffff800`5469e556 : 00000000`00000000 00000000`00000000 00000000`0000004e ffff893f`fda3b110 : nt!MiDeleteVa+0x153a
ffffb981`5f96ee80 fffff800`5469e66b : ffff8944`9ffed1d8 ffffa80f`91b4e700 ffffb981`00000000 ffffb981`5f96f2f0 : nt!MiWalkPageTablesRecursively+0x776
ffffb981`5f96ef20 fffff800`5469e66b : ffff8944`a24fff68 ffffa80f`91b4e700 ffffb981`00000001 ffffb981`5f96f300 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96efc0 fffff800`5469e66b : ffff8944`a24ff000 ffffa80f`91b4e700 ffffb981`00000002 ffffb981`5f96f310 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96f060 fffff800`54604f4b : 00000000`00000000 ffffa80f`91b4e700 00000000`00000003 ffffb981`5f96f320 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96f100 fffff800`54642961 : ffffb981`5f96f2a0 ffffa80f`00000000 ffff893f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffb981`5f96f200 fffff800`54612aa0 : 00000000`00000001 ffffb981`00000000 ffffa80f`91b4e550 ffffa80f`8dfd5080 : nt!MiDeletePagablePteRange+0x4f1
ffffb981`5f96f510 fffff800`54a01149 : ffffa80f`93c64460 00000000`00000000 ffffa80f`00000000 ffffa80f`00000000 : nt!MiDeleteVad+0x360
ffffb981`5f96f620 fffff800`54a007e0 : ffffa80f`93c64460 ffffa80f`8f365d60 ffffa80f`8dfd5080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb981`5f96f650 fffff800`549feaaf : ffffa80f`9196bbe0 ffffa80f`9196bbe0 ffffa80f`93c64460 ffffa80f`91b4e080 : nt!MiCleanVad+0x30
ffffb981`5f96f680 fffff800`54a5c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa80f`91b4e080 : nt!MmCleanProcessAddressSpace+0x137
ffffb981`5f96f700 fffff800`54ab0fe6 : ffffa80f`91b4e080 ffffd10f`3d8218f0 ffffb981`5f96f950 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffb981`5f96f790 fffff800`54af5b88 : 00000001`00000000 00000000`00000001 ffffb981`5f96f9a0 00000013`4e3a8000 : nt!PspExitThread+0x5f6
ffffb981`5f96f890 fffff800`5460ef67 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`546a1836 : nt!KiSchedulerApcTerminate+0x38
ffffb981`5f96f8d0 fffff800`547fb880 : 00000000`00000000 ffffb981`5f96f980 ffffb981`5f96fb40 00000bec`00000000 : nt!KiDeliverApc+0x487
ffffb981`5f96f980 fffff800`54808d5f : ffffa80f`8dfd5080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb981`5f96fac0 00007ffb`4824cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000013`50bff638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4824cdf4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff9600c34eac98, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: fffffb8fc0a26a50, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 10827
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 23755
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 3403
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 020722-7609-01.dmp
BUGCHECK_CODE: be
BUGCHECK_P1: ffff9600c34eac98
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: fffffb8fc0a26a50
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WmiPrvSE.exe
TRAP_FRAME: fffffb8fc0a26a50 -- (.trap 0xfffffb8fc0a26a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff67b3d9ec000 rbx=0000000000000000 rcx=ffff990000007000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043b83b099 rsp=fffffb8fc0a26be0 rbp=fffffb8fc0a26c61
r8=0000000000000000 r9=ffff990000007c90 r10=0000000000000001
r11=0000000000000192 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiDeletePteList+0x709:
fffff804`3b83b099 f0490fba6d183f lock bts qword ptr [r13+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
fffffb8f`c0a26858 fffff804`3ba756ee : 00000000`000000be ffff9600`c34eac98 8a000000`00200121 fffffb8f`c0a26a50 : nt!KeBugCheckEx
fffffb8f`c0a26860 fffff804`3b89f5bf : 8a000000`00200121 00000000`00000003 fffffb8f`c0a26ad0 00000000`00000000 : nt!MiRaisedIrqlFault+0x1423d2
fffffb8f`c0a268b0 fffff804`3ba0545e : 00000000`00098940 ffff9600`01c9bed0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
fffffb8f`c0a26a50 fffff804`3b83b099 : 00000000`0009894f 80000000`00000000 00000000`00000001 00000000`0000004f : nt!KiPageFault+0x35e
fffffb8f`c0a26be0 fffff804`3b8afdbc : fffffb8f`c0a26f50 ffff9b0c`629a5080 00000000`00000000 fffffb8f`c0a278d0 : nt!MiDeletePteList+0x709
fffffb8f`c0a26cc0 fffff804`3bbfa1ed : ffff9b0c`63d52080 ffff9b0c`6221e148 00000000`00000000 00000000`00000000 : nt!MiDecommitPages+0x3bc
fffffb8f`c0a27890 fffff804`3bbf9853 : fffffb8f`c0a27a10 00000000`00000000 fffffb8f`c0a27a10 ffff9b0c`6221e120 : nt!MiDecommitRegion+0x7d
fffffb8f`c0a27910 fffff804`3bbf9145 : 00000000`00000000 00000000`00008000 00000259`3260be50 fffff804`3bc8f297 : nt!MmFreeVirtualMemory+0x6d3
fffffb8f`c0a27a60 fffff804`3ba08cb8 : ffff9b0c`63d52080 ffff9b0c`00000001 00000259`32597130 fffffb8f`c0a27b40 : nt!NtFreeVirtualMemory+0x95
fffffb8f`c0a27ac0 00007ff9`c52cd134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ac`79d7cbf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c52cd134
SYMBOL_NAME: nt!MiRaisedIrqlFault+1423d2
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1423d2
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041791, The subtype of the BugCheck.
Arg2: ffff8180c0721d40
Arg3: 8000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 13140
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 34040
Key : Analysis.Init.CPU.mSec
Value: 1030
Key : Analysis.Init.Elapsed.mSec
Value: 2839
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 020722-9765-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41791
BUGCHECK_P2: ffff8180c0721d40
BUGCHECK_P3: 8000000000000000
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff487`6908f788 fffff805`0f45e341 : 00000000`0000001a 00000000`00041791 ffff8180`c0721d40 80000000`00000000 : nt!KeBugCheckEx
fffff487`6908f790 fffff805`0f483e07 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`0f5fe066 : nt!MiUnlockPageTableCharges+0x235
fffff487`6908f800 fffff805`1def18d0 : ffffb381`cdece000 ffffc48a`71cc0182 00000000`00000002 fffff487`00000000 : nt!MmUnlockPages+0x477
fffff487`6908f8f0 fffff805`1def152a : ffffc48a`71cc9de0 ffffb381`c237c040 00000000`00001f41 00000000`00000000 : dxgmms2!VIDMM_MDL_RANGE::Unlock+0x18
fffff487`6908f920 fffff805`1def13f8 : ffffc48a`8e461178 ffffc48a`6f42eb60 00000000`00000001 00000000`00000020 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::UnlockRange+0xa2
fffff487`6908f9b0 fffff805`1def4300 : ffffc48a`6f42eb60 ffffc48a`6f42ebc8 ffffc48a`6f42bbc8 fffff805`0f44c244 : dxgmms2!VIDMM_RECYCLE_RANGE:
ebouncedUnlock+0x10c
fffff487`6908fa10 fffff805`1def43f6 : fffff805`1def4200 ffffb381`c93a4010 00000000`00000000 fffff805`0ff25440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR:
rocessDebounceList+0xe0
fffff487`6908fa80 fffff805`1def4211 : fffff805`0ff25440 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
fffff487`6908fb00 fffff805`0f4b8655 : ffffb381`c237c040 fffff805`0f8fb820 ffffb381`b3483cb0 ffffb381`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
fffff487`6908fb30 fffff805`0f555995 : ffffb381`c237c040 00000000`00000080 ffffb381`b34a8040 ffffea83`00000001 : nt!ExpWorkerThread+0x105
fffff487`6908fbd0 fffff805`0f5fe938 : ffffda00`8299c180 ffffb381`c237c040 fffff805`0f555940 00000000`0000029e : nt!PspSystemThreadStartup+0x55
fffff487`6908fc20 00000000`00000000 : fffff487`69090000 fffff487`69089000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Unlock+18
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1469
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 18
FAILURE_BUCKET_ID: 0x1a_41791_dxgmms2!VIDMM_MDL_RANGE::Unlock
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5ba34459-7659-dc81-8aae-df74fa72f6ff}
Followup: MachineOwner
---------[/CODE]