R9 5900X sistemde mavi ekran hatası

İşletim sistemi
Windows 10

Nurimu25

Femtopat
Katılım
7 Şubat 2022
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
RAM
2 x 8GB GSkill TridentZ Neo 3600MHz 16CS
SSD veya HDD modeli
1 x XPG 1TB S40G RGB PCIe Gen3x4 M.2 SSD (3500MB O
Ekran kartı
MSI GeForce RTX 3070 Ti SUPRIM X 8G Graphics Board
Anakart
ASUS Prime X570-P AMD X570 Soket AM4 DDR4 4400(OC)
İşlemci
Ryzen 9 5900X 12 Cores 24 Threads
Merhaba Technopat ailesi. Sistemi yaklaşık 1 sene önce topladım ama bu aralar sıkça mavi ekran hatası ile karşılaşmaktayım.
 
Son düzenleyen: Moderatör:
Öncelikle Technopat Sosyal'e hoş geldiniz. Umarız iyi vakit geçirir ve sorunlarınıza cevap bulursunuz. :)

Hazır sorunlarınıza cevap bulmaktan bahsetmişken sorununuzu çözmek için minidump dosyasına ihtiyacımız var. Gerekli rehber aşağıda bulunmakta. Rehbere göre dosyalarınızı paylaşırsanız size yardımcı olabiliriz.

 
Tekrardan selamlar, bilgisayarınıza Memtest86 testi uygulamayı deneyin. Tabii bu işlem öncesi BIOS'tan XMP ayarını kapamayı unutmayın. Sonuçları bizimle paylaşırsanız sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff893ffda3b110
Arg3: 0000000008000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8436

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20859

Key : Analysis.Init.CPU.mSec
Value: 1124

Key : Analysis.Init.Elapsed.mSec
Value: 4550

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : MemoryManagement.PFN
Value: 8000

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020722-7703-01.dmp

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff893ffda3b110

BUGCHECK_P3: 8000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffffb981`5f96ed78 fffff800`546440ca : 00000000`0000001a 00000000`00041792 ffff893f`fda3b110 00000000`08000000 : nt!KeBugCheckEx
ffffb981`5f96ed80 fffff800`5469e556 : 00000000`00000000 00000000`00000000 00000000`0000004e ffff893f`fda3b110 : nt!MiDeleteVa+0x153a
ffffb981`5f96ee80 fffff800`5469e66b : ffff8944`9ffed1d8 ffffa80f`91b4e700 ffffb981`00000000 ffffb981`5f96f2f0 : nt!MiWalkPageTablesRecursively+0x776
ffffb981`5f96ef20 fffff800`5469e66b : ffff8944`a24fff68 ffffa80f`91b4e700 ffffb981`00000001 ffffb981`5f96f300 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96efc0 fffff800`5469e66b : ffff8944`a24ff000 ffffa80f`91b4e700 ffffb981`00000002 ffffb981`5f96f310 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96f060 fffff800`54604f4b : 00000000`00000000 ffffa80f`91b4e700 00000000`00000003 ffffb981`5f96f320 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96f100 fffff800`54642961 : ffffb981`5f96f2a0 ffffa80f`00000000 ffff893f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffb981`5f96f200 fffff800`54612aa0 : 00000000`00000001 ffffb981`00000000 ffffa80f`91b4e550 ffffa80f`8dfd5080 : nt!MiDeletePagablePteRange+0x4f1
ffffb981`5f96f510 fffff800`54a01149 : ffffa80f`93c64460 00000000`00000000 ffffa80f`00000000 ffffa80f`00000000 : nt!MiDeleteVad+0x360
ffffb981`5f96f620 fffff800`54a007e0 : ffffa80f`93c64460 ffffa80f`8f365d60 ffffa80f`8dfd5080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb981`5f96f650 fffff800`549feaaf : ffffa80f`9196bbe0 ffffa80f`9196bbe0 ffffa80f`93c64460 ffffa80f`91b4e080 : nt!MiCleanVad+0x30
ffffb981`5f96f680 fffff800`54a5c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa80f`91b4e080 : nt!MmCleanProcessAddressSpace+0x137
ffffb981`5f96f700 fffff800`54ab0fe6 : ffffa80f`91b4e080 ffffd10f`3d8218f0 ffffb981`5f96f950 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffb981`5f96f790 fffff800`54af5b88 : 00000001`00000000 00000000`00000001 ffffb981`5f96f9a0 00000013`4e3a8000 : nt!PspExitThread+0x5f6
ffffb981`5f96f890 fffff800`5460ef67 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`546a1836 : nt!KiSchedulerApcTerminate+0x38
ffffb981`5f96f8d0 fffff800`547fb880 : 00000000`00000000 ffffb981`5f96f980 ffffb981`5f96fb40 00000bec`00000000 : nt!KiDeliverApc+0x487
ffffb981`5f96f980 fffff800`54808d5f : ffffa80f`8dfd5080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb981`5f96fac0 00007ffb`4824cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000013`50bff638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4824cdf4


MODULE_NAME: hardware

IMAGE_NAME: memory_corruption

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff9600c34eac98, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: fffffb8fc0a26a50, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10827

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 23755

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 3403

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020722-7609-01.dmp

BUGCHECK_CODE: be

BUGCHECK_P1: ffff9600c34eac98

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: fffffb8fc0a26a50

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WmiPrvSE.exe

TRAP_FRAME: fffffb8fc0a26a50 -- (.trap 0xfffffb8fc0a26a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff67b3d9ec000 rbx=0000000000000000 rcx=ffff990000007000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043b83b099 rsp=fffffb8fc0a26be0 rbp=fffffb8fc0a26c61
r8=0000000000000000 r9=ffff990000007c90 r10=0000000000000001
r11=0000000000000192 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiDeletePteList+0x709:
fffff804`3b83b099 f0490fba6d183f lock bts qword ptr [r13+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope

STACK_TEXT:
fffffb8f`c0a26858 fffff804`3ba756ee : 00000000`000000be ffff9600`c34eac98 8a000000`00200121 fffffb8f`c0a26a50 : nt!KeBugCheckEx
fffffb8f`c0a26860 fffff804`3b89f5bf : 8a000000`00200121 00000000`00000003 fffffb8f`c0a26ad0 00000000`00000000 : nt!MiRaisedIrqlFault+0x1423d2
fffffb8f`c0a268b0 fffff804`3ba0545e : 00000000`00098940 ffff9600`01c9bed0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
fffffb8f`c0a26a50 fffff804`3b83b099 : 00000000`0009894f 80000000`00000000 00000000`00000001 00000000`0000004f : nt!KiPageFault+0x35e
fffffb8f`c0a26be0 fffff804`3b8afdbc : fffffb8f`c0a26f50 ffff9b0c`629a5080 00000000`00000000 fffffb8f`c0a278d0 : nt!MiDeletePteList+0x709
fffffb8f`c0a26cc0 fffff804`3bbfa1ed : ffff9b0c`63d52080 ffff9b0c`6221e148 00000000`00000000 00000000`00000000 : nt!MiDecommitPages+0x3bc
fffffb8f`c0a27890 fffff804`3bbf9853 : fffffb8f`c0a27a10 00000000`00000000 fffffb8f`c0a27a10 ffff9b0c`6221e120 : nt!MiDecommitRegion+0x7d
fffffb8f`c0a27910 fffff804`3bbf9145 : 00000000`00000000 00000000`00008000 00000259`3260be50 fffff804`3bc8f297 : nt!MmFreeVirtualMemory+0x6d3
fffffb8f`c0a27a60 fffff804`3ba08cb8 : ffff9b0c`63d52080 ffff9b0c`00000001 00000259`32597130 fffffb8f`c0a27b40 : nt!NtFreeVirtualMemory+0x95
fffffb8f`c0a27ac0 00007ff9`c52cd134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ac`79d7cbf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c52cd134


SYMBOL_NAME: nt!MiRaisedIrqlFault+1423d2

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1466

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 1423d2

FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041791, The subtype of the BugCheck.
Arg2: ffff8180c0721d40
Arg3: 8000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 13140

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 34040

Key : Analysis.Init.CPU.mSec
Value: 1030

Key : Analysis.Init.Elapsed.mSec
Value: 2839

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020722-9765-01.dmp

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41791

BUGCHECK_P2: ffff8180c0721d40

BUGCHECK_P3: 8000000000000000

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
fffff487`6908f788 fffff805`0f45e341 : 00000000`0000001a 00000000`00041791 ffff8180`c0721d40 80000000`00000000 : nt!KeBugCheckEx
fffff487`6908f790 fffff805`0f483e07 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`0f5fe066 : nt!MiUnlockPageTableCharges+0x235
fffff487`6908f800 fffff805`1def18d0 : ffffb381`cdece000 ffffc48a`71cc0182 00000000`00000002 fffff487`00000000 : nt!MmUnlockPages+0x477
fffff487`6908f8f0 fffff805`1def152a : ffffc48a`71cc9de0 ffffb381`c237c040 00000000`00001f41 00000000`00000000 : dxgmms2!VIDMM_MDL_RANGE::Unlock+0x18
fffff487`6908f920 fffff805`1def13f8 : ffffc48a`8e461178 ffffc48a`6f42eb60 00000000`00000001 00000000`00000020 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::UnlockRange+0xa2
fffff487`6908f9b0 fffff805`1def4300 : ffffc48a`6f42eb60 ffffc48a`6f42ebc8 ffffc48a`6f42bbc8 fffff805`0f44c244 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedUnlock+0x10c
fffff487`6908fa10 fffff805`1def43f6 : fffff805`1def4200 ffffb381`c93a4010 00000000`00000000 fffff805`0ff25440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::processDebounceList+0xe0
fffff487`6908fa80 fffff805`1def4211 : fffff805`0ff25440 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
fffff487`6908fb00 fffff805`0f4b8655 : ffffb381`c237c040 fffff805`0f8fb820 ffffb381`b3483cb0 ffffb381`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
fffff487`6908fb30 fffff805`0f555995 : ffffb381`c237c040 00000000`00000080 ffffb381`b34a8040 ffffea83`00000001 : nt!ExpWorkerThread+0x105
fffff487`6908fbd0 fffff805`0f5fe938 : ffffda00`8299c180 ffffb381`c237c040 fffff805`0f555940 00000000`0000029e : nt!PspSystemThreadStartup+0x55
fffff487`6908fc20 00000000`00000000 : fffff487`69090000 fffff487`69089000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Unlock+18

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 18

FAILURE_BUCKET_ID: 0x1a_41791_dxgmms2!VIDMM_MDL_RANGE::Unlock

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5ba34459-7659-dc81-8aae-df74fa72f6ff}

Followup: MachineOwner
---------[/CODE]
 
Tekrardan selamlar, bilgisayarınıza Memtest86 testi uygulamayı deneyin. Tabii bu işlem öncesi BIOS'tan XMP ayarını kapamayı unutmayın. Sonuçları bizimle paylaşırsanız sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff893ffda3b110
Arg3: 0000000008000000
Arg4: 0000000000000000

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8436

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 20859

Key : Analysis.Init.CPU.mSec
Value: 1124

Key : Analysis.Init.Elapsed.mSec
Value: 4550

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : MemoryManagement.PFN
Value: 8000

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 020722-7703-01.dmp

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff893ffda3b110

BUGCHECK_P3: 8000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR: ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffffb981`5f96ed78 fffff800`546440ca : 00000000`0000001a 00000000`00041792 ffff893f`fda3b110 00000000`08000000 : nt!KeBugCheckEx
ffffb981`5f96ed80 fffff800`5469e556 : 00000000`00000000 00000000`00000000 00000000`0000004e ffff893f`fda3b110 : nt!MiDeleteVa+0x153a
ffffb981`5f96ee80 fffff800`5469e66b : ffff8944`9ffed1d8 ffffa80f`91b4e700 ffffb981`00000000 ffffb981`5f96f2f0 : nt!MiWalkPageTablesRecursively+0x776
ffffb981`5f96ef20 fffff800`5469e66b : ffff8944`a24fff68 ffffa80f`91b4e700 ffffb981`00000001 ffffb981`5f96f300 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96efc0 fffff800`5469e66b : ffff8944`a24ff000 ffffa80f`91b4e700 ffffb981`00000002 ffffb981`5f96f310 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96f060 fffff800`54604f4b : 00000000`00000000 ffffa80f`91b4e700 00000000`00000003 ffffb981`5f96f320 : nt!MiWalkPageTablesRecursively+0x88b
ffffb981`5f96f100 fffff800`54642961 : ffffb981`5f96f2a0 ffffa80f`00000000 ffff893f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffb981`5f96f200 fffff800`54612aa0 : 00000000`00000001 ffffb981`00000000 ffffa80f`91b4e550 ffffa80f`8dfd5080 : nt!MiDeletePagablePteRange+0x4f1
ffffb981`5f96f510 fffff800`54a01149 : ffffa80f`93c64460 00000000`00000000 ffffa80f`00000000 ffffa80f`00000000 : nt!MiDeleteVad+0x360
ffffb981`5f96f620 fffff800`54a007e0 : ffffa80f`93c64460 ffffa80f`8f365d60 ffffa80f`8dfd5080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb981`5f96f650 fffff800`549feaaf : ffffa80f`9196bbe0 ffffa80f`9196bbe0 ffffa80f`93c64460 ffffa80f`91b4e080 : nt!MiCleanVad+0x30
ffffb981`5f96f680 fffff800`54a5c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa80f`91b4e080 : nt!MmCleanProcessAddressSpace+0x137
ffffb981`5f96f700 fffff800`54ab0fe6 : ffffa80f`91b4e080 ffffd10f`3d8218f0 ffffb981`5f96f950 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffb981`5f96f790 fffff800`54af5b88 : 00000001`00000000 00000000`00000001 ffffb981`5f96f9a0 00000013`4e3a8000 : nt!PspExitThread+0x5f6
ffffb981`5f96f890 fffff800`5460ef67 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`546a1836 : nt!KiSchedulerApcTerminate+0x38
ffffb981`5f96f8d0 fffff800`547fb880 : 00000000`00000000 ffffb981`5f96f980 ffffb981`5f96fb40 00000bec`00000000 : nt!KiDeliverApc+0x487
ffffb981`5f96f980 fffff800`54808d5f : ffffa80f`8dfd5080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb981`5f96fac0 00007ffb`4824cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000013`50bff638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4824cdf4

MODULE_NAME: hardware

IMAGE_NAME: memory_corruption

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff9600c34eac98, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: fffffb8fc0a26a50, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10827

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 23755

Key : Analysis.Init.CPU.mSec
Value: 921

Key : Analysis.Init.Elapsed.mSec
Value: 3403

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 020722-7609-01.dmp

BUGCHECK_CODE: be

BUGCHECK_P1: ffff9600c34eac98

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: fffffb8fc0a26a50

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WmiPrvSE.exe

TRAP_FRAME: fffffb8fc0a26a50 -- (.trap 0xfffffb8fc0a26a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff67b3d9ec000 rbx=0000000000000000 rcx=ffff990000007000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043b83b099 rsp=fffffb8fc0a26be0 rbp=fffffb8fc0a26c61
r8=0000000000000000 r9=ffff990000007c90 r10=0000000000000001
r11=0000000000000192 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiDeletePteList+0x709:
fffff804`3b83b099 f0490fba6d183f lock bts qword ptr [r13+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope

STACK_TEXT:
fffffb8f`c0a26858 fffff804`3ba756ee : 00000000`000000be ffff9600`c34eac98 8a000000`00200121 fffffb8f`c0a26a50 : nt!KeBugCheckEx
fffffb8f`c0a26860 fffff804`3b89f5bf : 8a000000`00200121 00000000`00000003 fffffb8f`c0a26ad0 00000000`00000000 : nt!MiRaisedIrqlFault+0x1423d2
fffffb8f`c0a268b0 fffff804`3ba0545e : 00000000`00098940 ffff9600`01c9bed0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
fffffb8f`c0a26a50 fffff804`3b83b099 : 00000000`0009894f 80000000`00000000 00000000`00000001 00000000`0000004f : nt!KiPageFault+0x35e
fffffb8f`c0a26be0 fffff804`3b8afdbc : fffffb8f`c0a26f50 ffff9b0c`629a5080 00000000`00000000 fffffb8f`c0a278d0 : nt!MiDeletePteList+0x709
fffffb8f`c0a26cc0 fffff804`3bbfa1ed : ffff9b0c`63d52080 ffff9b0c`6221e148 00000000`00000000 00000000`00000000 : nt!MiDecommitPages+0x3bc
fffffb8f`c0a27890 fffff804`3bbf9853 : fffffb8f`c0a27a10 00000000`00000000 fffffb8f`c0a27a10 ffff9b0c`6221e120 : nt!MiDecommitRegion+0x7d
fffffb8f`c0a27910 fffff804`3bbf9145 : 00000000`00000000 00000000`00008000 00000259`3260be50 fffff804`3bc8f297 : nt!MmFreeVirtualMemory+0x6d3
fffffb8f`c0a27a60 fffff804`3ba08cb8 : ffff9b0c`63d52080 ffff9b0c`00000001 00000259`32597130 fffffb8f`c0a27b40 : nt!NtFreeVirtualMemory+0x95
fffffb8f`c0a27ac0 00007ff9`c52cd134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000ac`79d7cbf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c52cd134

SYMBOL_NAME: nt!MiRaisedIrqlFault+1423d2

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1466

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 1423d2

FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041791, The subtype of the BugCheck.
Arg2: ffff8180c0721d40
Arg3: 8000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 13140

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 34040

Key : Analysis.Init.CPU.mSec
Value: 1030

Key : Analysis.Init.Elapsed.mSec
Value: 2839

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 020722-9765-01.dmp

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41791

BUGCHECK_P2: ffff8180c0721d40

BUGCHECK_P3: 8000000000000000

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
fffff487`6908f788 fffff805`0f45e341 : 00000000`0000001a 00000000`00041791 ffff8180`c0721d40 80000000`00000000 : nt!KeBugCheckEx
fffff487`6908f790 fffff805`0f483e07 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`0f5fe066 : nt!MiUnlockPageTableCharges+0x235
fffff487`6908f800 fffff805`1def18d0 : ffffb381`cdece000 ffffc48a`71cc0182 00000000`00000002 fffff487`00000000 : nt!MmUnlockPages+0x477
fffff487`6908f8f0 fffff805`1def152a : ffffc48a`71cc9de0 ffffb381`c237c040 00000000`00001f41 00000000`00000000 : dxgmms2!VIDMM_MDL_RANGE::Unlock+0x18
fffff487`6908f920 fffff805`1def13f8 : ffffc48a`8e461178 ffffc48a`6f42eb60 00000000`00000001 00000000`00000020 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::UnlockRange+0xa2
fffff487`6908f9b0 fffff805`1def4300 : ffffc48a`6f42eb60 ffffc48a`6f42ebc8 ffffc48a`6f42bbc8 fffff805`0f44c244 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedUnlock+0x10c
fffff487`6908fa10 fffff805`1def43f6 : fffff805`1def4200 ffffb381`c93a4010 00000000`00000000 fffff805`0ff25440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::processDebounceList+0xe0
fffff487`6908fa80 fffff805`1def4211 : fffff805`0ff25440 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
fffff487`6908fb00 fffff805`0f4b8655 : ffffb381`c237c040 fffff805`0f8fb820 ffffb381`b3483cb0 ffffb381`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
fffff487`6908fb30 fffff805`0f555995 : ffffb381`c237c040 00000000`00000080 ffffb381`b34a8040 ffffea83`00000001 : nt!ExpWorkerThread+0x105
fffff487`6908fbd0 fffff805`0f5fe938 : ffffda00`8299c180 ffffb381`c237c040 fffff805`0f555940 00000000`0000029e : nt!PspSystemThreadStartup+0x55
fffff487`6908fc20 00000000`00000000 : fffff487`69090000 fffff487`69089000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Unlock+18

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 18

FAILURE_BUCKET_ID: 0x1a_41791_dxgmms2!VIDMM_MDL_RANGE::Unlock

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5ba34459-7659-dc81-8aae-df74fa72f6ff}

Followup: MachineOwner
---------[/CODE]

Merhaba, Enes3078 "Memtest86" testini uygulayıp sonuçları paylaşacağım.
İgilendiğiniz için teşekkür ederim.
İyi çalışmalar.
Merhaba , az önce Memtest86 testini uyguladım maalesef sonuçlar hiç açıcı gözükmüyor. İlk defa karşımda "FAIL" yazısı ile karşılaştım. :( Test Loglarını ve ekranın fotoğraflarını alttaki linkte paylaşıyorum. Yorumlarınızı bekler iyi akşamlar dilerim.

Sonuclar

Memtest86_2.jpeg
 
Son düzenleyen: Moderatör:
Vallahi RAM'de bir hata çıktıysa göndermek şart. Size tavsiyem RAM'in garantisi varsa garantiye gönderin. Yoksa da artık yenisi şart. Çift RAM varsa tek RAM'i takıp test edersiniz ve hangi RAM hatalı hangisi hatasız onu tespit eder ona göre arızalı olanı sadece değişirsiniz. Sonuçtan bizi de haberdar etmeyi unutmazsanız seviniriz.
 
Merhaba, önerinizi için teşekkür ederim. Ürünü 10/09/2020 tarihinde N11'den satın aldım. Garantisi hala sürüyor. Yarın N11 ile görüşüp bilgi almaya çalışacağım. İlgilendiğiniz için tekrardan teşekkür ederim. Görüşme sonucunu buraya yazacağım.

Merhaba, önerinizi için teşekkür ederim. Ürünü 10/09/2020 tarihinde N11'den satın aldım. Garantisi hala sürüyor. Yarın N11 ile görüşüp bilgi almaya çalışacağım. İlgilendiğiniz için tekrardan teşekkür ederim. Görüşme sonucunu buraya yazacağım.

Güncel durum:
Satın aldığım firma ile görüşüp 16.02.2022 tarihinde kargo ile RAM'leri teslim edeceğim. RAM'leri ilk önce kendileri test ettikten sonra G.Skill firmasına göndereceklerini söylediler.
Güncel durum :
Merhabalar herkese yaklaşık 3 aydır konu ile ilgili güncelleme atamamıştım. Ülke koşullarından dolayı Ram'leri yeni alabildim.N11 QP Bilişim'e yönlendirdi, görüşmeler sonucunda 21.05.2022 Cumartesi günü sorunlu Ram'leri kargo ile gönderdim. QP bilişimin testleri sonuçlandığı zaman güncel durumu paylaşacağım. Kendinize iyi bakın.
Merhaba, önerinizi için teşekkür ederim. Ürünü 10/09/2020 tarihinde N11'den satın aldım. Garantisi hala sürüyor. Yarın N11 ile görüşüp bilgi almaya çalışacağım. İlgilendiğiniz için tekrardan teşekkür ederim. Görüşme sonucunu buraya yazacağım.



Güncel durum:
Satın aldığım firma ile görüşüp 16.02.2022 tarihinde kargo ile RAM'leri teslim edeceğim. RAM'leri ilk önce kendileri test ettikten sonra G.Skill firmasına göndereceklerini söylediler.
Güncel durum :
Merhabalar herkese yaklaşık 3 aydır konu ile ilgili güncelleme atamamıştım. Ülke koşullarından dolayı Ram'leri yeni alabildim.N11 QP Bilişim'e yönlendirdi, görüşmeler sonucunda 21.05.2022 Cumartesi günü sorunlu Ram'leri kargo ile gönderdim. QP bilişimin testleri sonuçlandığı zaman güncel durumu paylaşacağım. Kendinize iyi bakın.
Güncel Durum 12.06.2022:
QP Bilişim ; RAM'leri testleri yapıp donanımsal hata olduğunu doğruladı ve yenisi ile değiştirdi. Yeni Ram'ler şu an kargoda.Bu konuda yardımlarınızı esirgemediğiniz için Technopat ailesine teşekkür ederim.
 
Son düzenleme:

Geri
Yukarı