MEMORY_MANAGEMENT Mavi ekran hatası

Faruk Elmas

Hectopat
Katılım
16 Eylül 2020
Mesajlar
15
Son Windows Update'ini yaptıktan sonra 3 defa MEMORY_MANAGEMENT ve bugünde KERNEL_DATA_INPAGE_ERROR adlı bir mavi ekran hatası aldım.
Sistemim;
Intel Core i5-4460 3.2 GHz
12 GB Ram (8+4)
NVIDIA GTX 1050
Bu link ile de dump dosyalarını paylaşmak istedim. En kısa sürede yardımcı olmanız ümidiyle şimdiden ilgilenen herkese teşekkürler

 
Öncelikle Vanguard'ı kaldırıp belleklere test yapın.
BIOS'unuz eski kalmış, güncelleyin.
 
MEMORY_MANAGEMENT hataları doğrudan bellek hatasını gösteriyor, zaten dosya içeriğinde memory_corruption yani belleklerde bozulma olduğu yazıyor. Diğer hatada ise ntkrnlmp.exe hata vermiş, bu da çoğunlukla bellek sorunu oluyor.

MemTest86 ile belleklerde test yapın.

Aynı zamanda BIOS'unuz 2015 yılından kalma, 2018'de çıkmış en güncel sürümü yükleyin.

Ayrıca belleklerinizi kit olarak alın. XMP ayarlarını açtıysanız kapatın. 8+4 GB şeklinde kullanmanız uyumsuzluk sorunu yaratıyor olabilir.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff480b1df8b08
Arg3: 0000400000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13556

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff480b1df8b08

BUGCHECK_P3: 400000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffffd0f`e8e060f8 fffff800`5672abba     : 00000000`0000001a 00000000`00041792 fffff480`b1df8b08 00004000`00000000 : nt!KeBugCheckEx
fffffd0f`e8e06100 fffff800`566edc06     : 00000000`00000000 ffffc904`35caa700 00000000`0000001d fffff480`b1df8b08 : nt!MiDeleteVa+0x153a
fffffd0f`e8e06200 fffff800`566edd1b     : fffff4fa`00000000 ffffc904`35caa700 fffffd0f`00000000 fffffd0f`e8e06670 : nt!MiWalkPageTablesRecursively+0x776
fffffd0f`e8e062a0 fffff800`566edd1b     : fffff4fa`7d202c70 ffffc904`35caa700 fffffd0f`00000001 fffffd0f`e8e06680 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0f`e8e06340 fffff800`566edd1b     : fffff4fa`7d202000 ffffc904`35caa700 fffffd0f`00000002 fffffd0f`e8e06690 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0f`e8e063e0 fffff800`566dcbfb     : 00000000`00000002 ffffc904`35caa700 fffffd0f`00000003 fffffd0f`e8e066a0 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0f`e8e06480 fffff800`56729451     : fffffd0f`e8e06620 ffffc904`00000000 fffff480`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffd0f`e8e06580 fffff800`56701670     : 00000000`00000001 fffffd0f`00000000 ffffc904`35caa550 ffffc904`36418080 : nt!MiDeletePagablePteRange+0x4f1
fffffd0f`e8e06890 fffff800`56a999e9     : ffffc904`00000000 00000000`00000000 00000163`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffffd0f`e8e069a0 fffff800`56a997c2     : ffffc904`3f474f20 00000000`00000000 ffffc904`35caa080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffd0f`e8e069d0 fffff800`56a99639     : fffffe2c`270ff611 0000005c`a29fe268 00000000`ff357291 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffffd0f`e8e06ab0 fffff800`568058b8     : ffffc904`36418080 00000163`bef30000 fffffd0f`e8e06b18 ffffc904`35caa080 : nt!NtUnmapViewOfSectionEx+0x99
fffffd0f`e8e06b00 00007ffb`64fef734     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005c`a29fe348 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`64fef734


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff20000130b08
Arg3: 0000400000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4343

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff20000130b08

BUGCHECK_P3: 400000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:
ffff8b89`d248adf8 fffff806`39b2abba     : 00000000`0000001a 00000000`00041792 fffff200`00130b08 00004000`00000000 : nt!KeBugCheckEx
ffff8b89`d248ae00 fffff806`39aedc06     : 00000000`00000000 00000000`00000000 00000000`000001e6 fffff200`00130b08 : nt!MiDeleteVa+0x153a
ffff8b89`d248af00 fffff806`39aedd1b     : fffff279`00000000 ffff9304`efd6a700 ffff8b89`00000000 ffff8b89`d248b370 : nt!MiWalkPageTablesRecursively+0x776
ffff8b89`d248afa0 fffff806`39aedd1b     : fffff279`3c800000 ffff9304`efd6a700 ffff8b89`00000001 ffff8b89`d248b380 : nt!MiWalkPageTablesRecursively+0x88b
ffff8b89`d248b040 fffff806`39aedd1b     : fffff279`3c800000 ffff9304`efd6a700 ffff8b89`00000002 ffff8b89`d248b390 : nt!MiWalkPageTablesRecursively+0x88b
ffff8b89`d248b0e0 fffff806`39adcbfb     : 00000000`00000000 ffff9304`efd6a700 00000000`00000003 ffff8b89`d248b3a0 : nt!MiWalkPageTablesRecursively+0x88b
ffff8b89`d248b180 fffff806`39b29451     : ffff8b89`d248b320 ffff9304`00000000 fffff200`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff8b89`d248b280 fffff806`39b01670     : 00000000`00000001 ffff8b89`00000000 ffff9304`efd6a550 ffff9304`ebc0f080 : nt!MiDeletePagablePteRange+0x4f1
ffff8b89`d248b590 fffff806`39e9939f     : ffff9304`ebc0f080 00000000`00000000 ffff9304`00000000 ffff9304`00000000 : nt!MiDeleteVad+0x360
ffff8b89`d248b6a0 fffff806`39ee4dd3     : ffff9304`efd53170 ffff9304`efd53170 ffff9304`f2846a10 ffff9304`efd6a080 : nt!MiCleanVad+0x43
ffff8b89`d248b6d0 fffff806`39e81f5f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9304`efd6a080 : nt!MmCleanProcessAddressSpace+0x137
ffff8b89`d248b750 fffff806`39e9ea8a     : ffff9304`efd6a080 ffffb882`4e3b5770 ffff8b89`d248b990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8b89`d248b7d0 fffff806`39df4558     : 00000000`c0000005 ffff9304`efd6a001 00000000`00000001 00000000`09c4b000 : nt!PspExitThread+0x5f6
ffff8b89`d248b8d0 fffff806`39ae6ca7     : 00000000`00000000 fffff806`39ae4867 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8b89`d248b910 fffff806`39bf8440     : 00000000`00000000 ffff8b89`d248b9c0 ffff9304`ef8a0368 00000000`00000000 : nt!KiDeliverApc+0x487
ffff8b89`d248b9c0 fffff806`39c0595f     : ffff9304`ebc0f080 00000000`00000000 00000000`00000000 ffff9304`00000000 : nt!KiInitiateUserApc+0x70
ffff8b89`d248bb00 00000000`77481cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0e28ec38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77481cfc


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffb5bffecfab08
Arg3: 0000400000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4452

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21082

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffb5bffecfab08

BUGCHECK_P3: 400000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  HxT

STACK_TEXT:
ffff9c0f`403640d8 fffff807`2af2abba     : 00000000`0000001a 00000000`00041792 ffffb5bf`fecfab08 00004000`00000000 : nt!KeBugCheckEx
ffff9c0f`403640e0 fffff807`2af293ef     : ffffa482`3057d700 00000000`00000000 ffffb5bf`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffff9c0f`403641e0 fffff807`2af01670     : 00000000`00000001 ffff9c0f`00000000 ffffa482`3057d550 ffffa482`38196080 : nt!MiDeletePagablePteRange+0x48f
ffff9c0f`403644f0 fffff807`2b2999e9     : ffffa482`30790aa0 00000000`00000000 ffffa482`00000000 ffffa482`00000000 : nt!MiDeleteVad+0x360
ffff9c0f`40364600 fffff807`2b29938c     : ffffa482`30790aa0 ffffa482`33776d20 ffffa482`38196080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c0f`40364630 fffff807`2b2e4dd3     : ffffa482`32971d80 ffffa482`32971d80 ffffa482`30790aa0 ffffa482`3057d080 : nt!MiCleanVad+0x30
ffff9c0f`40364660 fffff807`2b281f5f     : ffffffff`00000001 ffffffff`ffffffff 00000000`00000001 ffffa482`3057d080 : nt!MmCleanProcessAddressSpace+0x137
ffff9c0f`403646e0 fffff807`2b29ea8a     : ffffa482`3057d080 ffff8007`8eaf9060 ffff9c0f`40364920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff9c0f`40364760 fffff807`2b1f4558     : 00000000`00000001 00000000`00000001 00000000`00000000 00000041`389a6000 : nt!PspExitThread+0x5f6
ffff9c0f`40364860 fffff807`2aee6ca7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff9c0f`403648a0 fffff807`2aff8440     : 0000023f`c4509c30 ffff9c0f`40364950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff9c0f`40364950 fffff807`2b00595f     : 00000000`00000000 fffff807`2ae617be ffffa482`3dbc9580 0000023f`c45278d0 : nt!KiInitiateUserApc+0x70
ffff9c0f`40364a90 00007ffd`9fa8a104     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000041`397ff978 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`9fa8a104


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
Kod:
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000001, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000005, error status (normally i/o status code)
Arg3: ffffa10947fbd0c0, current process (virtual address for lock type 3, or PTE)
Arg4: ffffc73efe961000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5140

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13794

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7a

BUGCHECK_P1: 1

BUGCHECK_P2: ffffffffc0000005

BUGCHECK_P3: ffffa10947fbd0c0

BUGCHECK_P4: ffffc73efe961000

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WhatsApp.exe

STACK_TEXT:
ffffb106`22afb0d8 fffff800`6bc72bbc     : 00000000`0000007a 00000000`00000001 ffffffff`c0000005 ffffa109`47fbd0c0 : nt!KeBugCheckEx
ffffb106`22afb0e0 fffff800`6baeda6b     : 00000000`00000001 ffffa109`00000000 00000000`00000194 00004000`00000000 : nt!MiGetNextPageTablePte+0x18471c
ffffb106`22afb130 fffff800`6baedd1b     : ffffc763`00000000 ffffa109`47fbd740 ffffb106`00000001 ffffb106`22afb510 : nt!MiWalkPageTablesRecursively+0x5db
ffffb106`22afb1d0 fffff800`6baedd1b     : ffffc763`00000000 ffffa109`47fbd740 ffffb106`00000002 ffffb106`22afb520 : nt!MiWalkPageTablesRecursively+0x88b
ffffb106`22afb270 fffff800`6badcbfb     : 00000000`00000000 ffffa109`47fbd740 00000000`00000003 ffffb106`22afb530 : nt!MiWalkPageTablesRecursively+0x88b
ffffb106`22afb310 fffff800`6bb29451     : ffffb106`22afb4b0 ffffa109`00000000 ffffc73e`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffb106`22afb410 fffff800`6bb01670     : 00000000`00000001 ffffb106`00000000 ffffa109`47fbd590 ffffa109`4a12e080 : nt!MiDeletePagablePteRange+0x4f1
ffffb106`22afb720 fffff800`6be999e9     : ffffa109`4d145200 00000000`00000000 ffffa109`00000000 ffffa109`00000000 : nt!MiDeleteVad+0x360
ffffb106`22afb830 fffff800`6be9938c     : ffffa109`4d145200 ffffa109`470d7700 ffffa109`4a12e080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb106`22afb860 fffff800`6bee4dd3     : ffffa109`4d13a940 ffffa109`4d13a940 ffffa109`4d145200 ffffa109`47fbd0c0 : nt!MiCleanVad+0x30
ffffb106`22afb890 fffff800`6be81f5f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa109`47fbd0c0 : nt!MmCleanProcessAddressSpace+0x137
ffffb106`22afb910 fffff800`6be9ea8a     : ffffa109`47fbd0c0 ffffe08d`28d16060 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffb106`22afb990 fffff800`6bdf3eae     : ffffa109`00000000 00000000`00000001 00000000`00000000 00000055`074be000 : nt!PspExitThread+0x5f6
ffffb106`22afba90 fffff800`6bc058b8     : ffffa109`47fbd0c0 ffffa109`4a12e080 ffffb106`22afbb80 ffffa109`47fbd0c0 : nt!NtTerminateProcess+0xde
ffffb106`22afbb00 00007ffc`b728c344     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000055`076ff6b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b728c344


SYMBOL_NAME:  nt!MiGetNextPageTablePte+18471c

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  18471c

FAILURE_BUCKET_ID:  0x7a_c0000005_nt!MiGetNextPageTablePte

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d4584103-842d-cac6-0c84-edfb0f8fe0b3}

Followup:     MachineOwner
---------

BIOS'un güncel olmadığını nasıl anlıyorsunuz?
Dosyayı WinDbg ile analiz ediyoruz. Analiz tamamlandıktan sonra !sysinfo machineid komutunu girdiğiniz zaman anakarta dair tüm bilgiler çıkıyor.

Tabii, WinDbg kullanmak şart değil. Başka yöntemlerle de analiz yapılabilir ama o yöntemleri bilmiyorum.
 
Galiba bu noktadan sonra teste devam etmenin bir anlamı kalmıyor. 😂😂😂
 

Dosya Ekleri

  • 16002782325402685885504182456208.jpg
    16002782325402685885504182456208.jpg
    290,9 KB · Görüntüleme: 41
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı