Yeniden merhaba, sistemdeki RAM'lerinizi Memtest86 ile test etmenizi rica edeceğim. Sonucu sonrasında bizimle paylaşırsanız sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8057340e3d5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 9280
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17766
Key : Analysis.Init.CPU.mSec
Value: 999
Key : Analysis.Init.Elapsed.mSec
Value: 2303
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 021722-11296-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffffffffffffe8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8057340e3d5
BUGCHECK_P4: 2
READ_ADDRESS: fffff80573efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffe8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
TRAP_FRAME: ffff8281530928c0 -- (.trap 0xffff8281530928c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffffffffffff rbx=0000000000000000 rcx=ffffffffffffffd0
rdx=00000000000000ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057340e3d5 rsp=ffff828153092a58 rbp=ffff828153092b80
r8=ffffc00d732e6220 r9=fffff80573efbe80 r10=0000000000000000
r11=ffff9182731bd240 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!ObpGetWaitObject+0x15:
fffff805`7340e3d5 0fb64118 movzx eax,byte ptr [rcx+18h] ds:ffffffff`ffffffe8=??
Resetting default scope
STACK_TEXT:
ffff8281`53092618 fffff805`7364a86f : 00000000`00000050 ffffffff`ffffffe8 00000000`00000000 ffff8281`530928c0 : nt!KeBugCheckEx
ffff8281`53092620 fffff805`7349f540 : 00000000`00000000 00000000`00000000 ffff8281`53092940 00000000`00000000 : nt!MiSystemFault+0x18d30f
ffff8281`53092720 fffff805`7360575e : ffffffff`ffffffff fffff805`737a44f8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8281`530928c0 fffff805`7340e3d5 : fffff805`737f87ac ffff8281`53092b80 00000000`00501802 00000000`777c0f33 : nt!KiPageFault+0x35e
ffff8281`53092a58 fffff805`737f87ac : ffff8281`53092b80 00000000`00501802 00000000`777c0f33 00000000`00501802 : nt!ObpGetWaitObject+0x15
ffff8281`53092a60 fffff805`737f888a : ffffc00d`858e7080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x5c
ffff8281`53092ac0 fffff805`736094f1 : ffffc00d`858e7080 00000000`0000000e ffff8281`53092b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffff8281`53092b00 00000000`777c1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000000`1302f258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777c1cfc
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffbfe5ce89a8d0-ffffbfe5ce89a8d4 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+510
[ 9c 24 b0 03 00:48 8b 02 49 3b ]
ffffbfe5ce89a8d6-ffffbfe5ce89a8df 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+516 (+0x06)
[ 48 81 c4 a0 03 00 00 5d:77 09 1b c0 f7 d0 83 e0 ]
ffffbfe5ce89a8e1-ffffbfe5ce89a8e6 6 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+521 (+0x0b)
[ cc cc cc cc cc cc:b8 01 00 00 00 c3 ]
ffffbfe5ce89a8e8-ffffbfe5ce89a8fe 23 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __ (+0x07)
[ 40 55 48 8d ac 24 80 fe:cc cc cc cc cc cc cc cc ]
ffffbfe5ce89a900-ffffbfe5ce89a91b 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+18 (+0x18)
[ 48 33 c4 48 89 85 70 01:00 83 ea 01 74 7c 83 ea ]
ffffbfe5ce89a91d-ffffbfe5ce89a92a 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+35 (+0x1d)
[ 00 00 48 89 85 50 01 00:75 2c b8 80 00 00 00 8d ]
ffffbfe5ce89a92d-ffffbfe5ce89a935 9 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+45 (+0x10)
[ 48 89 85 40 01 00 00 48:00 8d 48 10 49 8d 14 0a ]
ffffbfe5ce89a937-ffffbfe5ce89a94c 22 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+4f (+0x0a)
[ a0 02 00 00 48 89 85 30:d2 74 0c f3 0f 11 12 41 ]
ffffbfe5ce89a94e-ffffbfe5ce89a954 7 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+66 (+0x17)
[ 00 00 48 8b 85 90 02:0f 85 c2 d2 06 00 b8 ]
ffffbfe5ce89a956-ffffbfe5ce89a96a 21 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+6e (+0x08)
[ 00 48 89 85 10 01 00 00:08 00 00 8d 4a 5b eb d3 ]
ffffbfe5ce89a96c-ffffbfe5ce89a970 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+84 (+0x16)
[ 48 8b 85 80 02:01 00 00 b9 60 ]
ffffbfe5ce89a973-ffffbfe5ce89a976 4 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+8b (+0x07)
[ 48 89 85 f0:00 eb bb b8 ]
ffffbfe5ce89a978 - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+90 (+0x05)
[ 00:04 ]
ffffbfe5ce89a97a-ffffbfe5ce89a97e 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+92 (+0x02)
[ 48 8b 85 78 02:00 b9 54 00 00 ]
ffffbfe5ce89a980-ffffbfe5ce89a984 5 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+98 (+0x06)
[ 00 48 89 85 e0:eb af b8 00 20 ]
ffffbfe5ce89a987-ffffbfe5ce89a994 14 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+9f (+0x07)
[ 00 48 8b 85 70 02 00 00:b9 6c 00 00 00 eb a3 b8 ]
ffffbfe5ce89a996-ffffbfe5ce89a9b1 28 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+ae (+0x0f)
[ 48 8b 85 68 02 00 00 48:00 00 eb 97 cc cc cc cc ]
ffffbfe5ce89a9b3-ffffbfe5ce89a9bc 10 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+cb (+0x1d)
[ 8b 85 58 02 00 00 48 89:8d 6c 24 c9 48 81 ec 00 ]
ffffbfe5ce89a9be-ffffbfe5ce89a9cf 18 bytes - win32kbase!_tlgWriteTemplate<long __cdecl(_tlgProvider_t const * __ptr64,void const * __ptr64,_GUID const * __ptr64,_GUID const * __ptr64,unsigned int,_EVENT_DATA_DESCRIPTOR * __ptr64),&_tlgWriteTransfer_EtwWriteTransfer,_GUID const * __ptr64,_GUID const * __+d6 (+0x0b)
[ 00 00 48 8b 85 50 02 00:48 8b 05 db c2 1a 00 48 ]
ffffbfe5ce8a3f00-ffffbfe5ce8a3f1d 30 bytes - win32kbase!UserGetDesktopDC+c8 (+0x9542)
[ 05 e8 9a 09 fa ff 48 8b:48 83 ec 28 48 8b ca e8 ]
ffffbfe5ce8a3f1f-ffffbfe5ce8a3f78 90 bytes - win32kbase!UserGetDesktopDC+e7 (+0x1f)
[ 45 33 c0 8b d7 85 f6 48:cc 45 33 db 4c 8b d1 4d ]
ffffbfe5ce8a3f7a-ffffbfe5ce8a3f93 26 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+1a (+0x5b)
[ 40 32 ff 84 c0 74 72 8b:00 74 44 48 8b 44 24 28 ]
ffffbfe5ce8a3f95-ffffbfe5ce8a3fb0 28 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+35 (+0x1b)
[ 5c 24 40 0f ba e0 09 73:4c 01 00 00 8a c1 c0 e8 ]
ffffbfe5ce8a3fb2-ffffbfe5ce8a3fff 78 bytes - win32kbase!DirectComposition::CCompositionDistantLightMarshaler::EmitUpdateCommands+52 (+0x1d)
[ 0f ba 73 10 09 8b 43 10:88 92 4c 01 00 00 c6 00 ]
ffffbfe5ce8a6561-ffffbfe5ce8a6585 37 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+c5 (+0x25af)
[ 8b 4e 58 49 23 d2 0f 10:83 ec 28 8b ca 45 33 c0 ]
ffffbfe5ce8a6587-ffffbfe5ce8a6589 3 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+eb (+0x26)
[ 8b 74 24:83 ec 20 ]
ffffbfe5ce8a658b-ffffbfe5ce8a65bf 53 bytes - win32kbase!DirectComposition::CPropertySetMarshaler::EmitSetProperty<PropertySetColorValue,_D3DCOLORVALUE>+ef (+0x04)
[ 48 83 c4 20 5f c3 cc 48:8d 05 2f 9d 15 00 8b da ]
ffffbfe5ce8a65c2-ffffbfe5ce8a65fb 58 bytes - win32kbase!DirectComposition::CAnimationMarshaler::`vector deleting destructor'+e (+0x37)
[ f9 e8 24 00 00 00 f6 c3:c4 48 89 58 10 89 48 08 ]
ffffbfe5ce8a65fd-ffffbfe5ce8a664b 79 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+11 (+0x3b)
[ 48 8b f9 48 89 01 48 8d:00 00 49 8d 48 08 49 3b ]
ffffbfe5ce8a664d-ffffbfe5ce8a665f 19 bytes - win32kbase!DirectComposition::CAnimationMarshaler::~CAnimationMarshaler+61 (+0x50)
[ 00 48 89 5f 48 48 85 db:eb c5 0f 10 02 f3 0f 7f ]
736 errors : !win32kbase (ffffbfe5ce89a8d0-ffffbfe5ce8a665f)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132895967657919551
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_8087&PID_1024\20180624905925
VetoString : [/CODE]