ASUS ROG STRIX B450-F mavi ekran hatası

Owtol

Kilopat
Katılım
2 Şubat 2016
Mesajlar
12
Daha fazla  
Cinsiyet
Erkek
Yaklaşık 1 hafta önce Teknobiyotik'ten aldığım sistemim bana 8 GB RAM takılı olarak geldi ama ben 16 GB olarak sipariş vermiştim. Ekran kartımı takıp çalıştırdığımda 8 GB RAM'le bir sorun yoktu daha sonra takmadıkları RAM"i gönderdiler onu sisteme dahil ettikten 1 gün sonra mavi ekran hatası almaya başladım. Driverları sildim yetmedi. Format attım her şeyi denedim acaba RAM'ler anakartla uyumlu mu değil diye düşündüm ama çalıştılar PSU'da veya M.2'de bir sorun yok. Sizce ne olabilir çözüm ve desteklerinizi bekliyorum teşekkürler. Sistem bilgilerim aşağıdadır.

AMD Ryzen™ 5 3600X 3.8GHz (Turbo 4.4GHz) 6 Core 12 threads 35MB cache AM4 işlemci.

ASUS ROG STRIX B450-F GAMING socket AM4, DDR4 3200MHz( O.C.), NVMe M.2, USB 3.1 gen2, HDMI, DP, RGB ATX anakart.

Adata DDR4 16 GB(2x8GB) 3200MHz XPG Spectrix D60G RGB RAM (AX4U320038G16A-ST60/2)

Adata XPG Spectrix S40G RGB 512 GB 3500/1900MB/s NVMe M.2 SSD.

ASUS ROG STRIX GTX 1080 A8GB DDR5X.

 
Son düzenleyen: Moderatör:
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffe3000754a2e0
Arg3: 0000000000000007
Arg4: 0000000000000008

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Dump.Attributes.InsufficientDumpfileSize
    Value: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.657 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0xc
  Insufficient Dumpfile Size
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffe3000754a2e0

BUGCHECK_P3: 7

BUGCHECK_P4: 8

BUGCHECK_STR:  0x1a_41790

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-23-2020 22:08:04.0961

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff807069e9848 to fffff807069c1510

STACK_TEXT:
fffffa0a`6271dc98 fffff807`069e9848 : 00000000`0000001a 00000000`00041790 ffffe300`0754a2e0 00000000`00000007 : nt!KeBugCheckEx
fffffa0a`6271dca0 fffff807`068b1167 : 00000000`00000003 fffffa0a`6271e3f0 fffffa0a`6271e3f0 fffffa0a`6271e340 : nt!MiDeletePteRun+0x1d35a8
fffffa0a`6271dec0 fffff807`068acc82 : ffff8402`4fbdf580 ffffe880`ea71c000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
fffffa0a`6271def0 fffff807`068ace11 : fffffa0a`6271e340 ffffe8f4`407538d8 00000000`00000000 0a000002`718ba867 : nt!MiWalkPageTablesRecursively+0x512
fffffa0a`6271dfb0 fffff807`068ace11 : fffffa0a`6271e340 ffffe8f4`7a203a98 00000000`00000000 0a000001`36b3e867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffa0a`6271e070 fffff807`068ace11 : fffffa0a`6271e340 ffffe8f4`7a3d1018 ffffe8f4`00000000 0a000002`7b13d867 : nt!MiWalkPageTablesRecursively+0x6a1
fffffa0a`6271e130 fffff807`068ac59c : fffffa0a`6271e340 ffffd01e`c0000000 ffffd01e`00000000 ffff8402`4fbdf580 : nt!MiWalkPageTablesRecursively+0x6a1
fffffa0a`6271e1f0 fffff807`068aaa08 : fffffa0a`6271e340 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffffa0a`6271e2f0 fffff807`068b8b60 : ffffffff`ffffffff ffff8402`4fbdf3f8 ffff8402`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffffa0a`6271e690 fffff807`06dd9fd1 : ffff8402`4a968080 00000000`00000000 ffff8402`4ecdabc0 ffff8402`4a968080 : nt!MiDeleteVad+0x860
fffffa0a`6271e850 fffff807`06dd9a6f : ffff8402`4ecdac10 ffff8402`4ecdac10 ffff8402`4fbdf080 fffff807`06c6a400 : nt!MiCleanVad+0x4d
fffffa0a`6271e880 fffff807`06e38941 : ffffffff`00000000 ffffffff`ffffffff fffffa0a`6271eb01 ffff8402`4fbdf080 : nt!MmCleanProcessAddressSpace+0x137
fffffa0a`6271e900 fffff807`06e5eb23 : ffff8402`4fbdf080 ffffaa8b`23c20920 fffffa0a`6271eb80 00000000`00000000 : nt!PspRundownSingleProcess+0x139
fffffa0a`6271e980 fffff807`06e39fbb : 00000000`00000000 fffffa0a`6271eb01 00000096`d50b6000 ffff8402`4a968080 : nt!PspExitThread+0x60b
fffffa0a`6271ea90 fffff807`069d2e18 : ffff8402`00000d54 ffff8402`4a968080 ffff8402`4fbdf080 000001d4`e00b1250 : nt!NtTerminateProcess+0xeb
fffffa0a`6271eb00 00007ffc`87d9c644 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`d4edf798 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`87d9c644


THREAD_SHA1_HASH_MOD_FUNC:  8fdeac079ced619cec4394c6f740bb61520d44ac

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a043637007f72f0ea58c2a82de58efbb11c38106

THREAD_SHA1_HASH_MOD:  9eef8c7ca0ce66f8b8b34848179f303828cff762

FOLLOWUP_IP:
nt!MiDeletePteRun+1d35a8
fffff807`069e9848 cc              int     3

FAULT_INSTR_CODE:  4d8d48cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiDeletePteRun+1d35a8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  1d35a8

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

PRIMARY_PROBLEM_CLASS:  0x1a_41790_nt!MiDeletePteRun

TARGET_TIME:  2020-02-22T23:19:11.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.657

ANALYSIS_SESSION_ELAPSED_TIME:  afc

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41790_nt!mideletepterun

FAILURE_ID_HASH:  {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8500fd1f7c10
Arg3: 0000001000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff8500fd1f7c10

BUGCHECK_P3: 1000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BUGCHECK_STR:  0x1a_41792

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-23-2020 22:08:14.0353

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT:
ffff910a`f011df28 fffff800`108253ee : 00000000`0000001a 00000000`00041792 ffff8500`fd1f7c10 00000010`00000000 : nt!KeBugCheckEx
ffff910a`f011df30 fffff800`106ac957 : 00000000`00000000 ffff8500`fd1f7c10 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c9e
ffff910a`f011e040 fffff800`106ace11 : ffff910a`f011e490 ffff8542`807e8fb8 00000000`00000000 0a000002`7769f867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff910a`f011e100 fffff800`106ace11 : ffff910a`f011e490 ffff8542`a1403f40 00000000`00000000 0a000001`91d5f867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff910a`f011e1c0 fffff800`106ace11 : ffff910a`f011e490 ffff8542`a150a018 ffff8542`00000000 0a000001`91c5e867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff910a`f011e280 fffff800`106ac59c : ffff910a`f011e490 00000000`00000000 00000000`00000000 00000000`00000702 : nt!MiWalkPageTablesRecursively+0x6a1
ffff910a`f011e340 fffff800`106aaa08 : ffff910a`f011e490 ffffd484`00000002 ffffe489`00000001 ffff910a`00000000 : nt!MiWalkPageTables+0x36c
ffff910a`f011e440 fffff800`106b8b60 : ffffffff`ffffffff ffffd484`f5be65f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff910a`f011e7e0 fffff800`10bc7bfd : 00000000`00000000 00000000`1fa3eb90 ffffd484`facbecc0 00000000`00000000 : nt!MiDeleteVad+0x860
ffff910a`f011e9a0 fffff800`10bc79f3 : ffffd484`facbecc0 00000000`00000000 000001fa`3eb90000 00000000`00000000 : nt!MiUnmapVad+0x49
ffff910a`f011e9d0 fffff800`10bc7889 : ffffd484`f5be6280 fffff800`00000008 ffffd484`ec89cc40 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
ffff910a`f011eab0 fffff800`107d2e18 : ffffd484`eceba080 000001fa`3eb90000 00007ffc`8ea00000 ffffd484`f5be6280 : nt!NtUnmapViewOfSectionEx+0x99
ffff910a`f011eb00 00007ffc`9d37f974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009d`f1cf93f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`9d37f974


THREAD_SHA1_HASH_MOD_FUNC:  cd17d96308226c0911d4c2e72141f4a08060b33a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3f1e260415cb0e6b5f6ff77776bc245798d2736b

THREAD_SHA1_HASH_MOD:  fe34192f63d13620a8987d294372ee74d699cfee

SYMBOL_NAME:  ONE_BIT

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-02-22T23:51:55.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  30ba

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff853ffd4b5bc8
Arg3: 0000001000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff853ffd4b5bc8

BUGCHECK_P3: 1000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BUGCHECK_STR:  0x1a_41792

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-23-2020 22:08:10.0841

ANALYSIS_VERSION: 10.0.18362.1 x86fre

STACK_TEXT:
fffff183`cabe1ef8 fffff804`05a253ee : 00000000`0000001a 00000000`00041792 ffff853f`fd4b5bc8 00000010`00000000 : nt!KeBugCheckEx
fffff183`cabe1f00 fffff804`058ac957 : 00000000`00000000 ffff853f`fd4b5bc8 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176c9e
fffff183`cabe2010 fffff804`058ace11 : fffff183`cabe2460 ffff8542`9ffea5a8 00000000`00000000 0a000002`91ab2867 : nt!MiWalkPageTablesRecursively+0x1e7
fffff183`cabe20d0 fffff804`058ace11 : fffff183`cabe2460 ffff8542`a14fff50 00000000`00000000 0a000002`93131867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff183`cabe2190 fffff804`058ace11 : fffff183`cabe2460 ffff8542`a150a7f8 ffff8542`00000000 0a000002`9311c867 : nt!MiWalkPageTablesRecursively+0x6a1
fffff183`cabe2250 fffff804`058ac59c : fffff183`cabe2460 00000000`00000000 00000000`00000000 fffff804`058fb4e6 : nt!MiWalkPageTablesRecursively+0x6a1
fffff183`cabe2310 fffff804`058aaa08 : fffff183`cabe2460 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
fffff183`cabe2410 fffff804`058b8b60 : ffffffff`ffffffff ffff8609`deb6f3f8 00000000`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
fffff183`cabe27b0 fffff804`05dc7bfd : ffff8609`dbc899e0 00000000`0008a000 ffff8609`deeca540 00000000`00000000 : nt!MiDeleteVad+0x860
fffff183`cabe2970 fffff804`05dc79f3 : ffff8609`deeca540 00007ffa`96b20000 ffff8609`dbce14d0 00000000`00000000 : nt!MiUnmapVad+0x49
fffff183`cabe29a0 fffff804`05dc7889 : ffff8609`deb6f080 fffff804`00000008 ffff8609`d3aa0140 00000000`00000000 : nt!MiUnmapViewOfSection+0x133
fffff183`cabe2a80 fffff804`05dc757c : ffff8609`de3a7080 00000274`2862c210 00000274`2862c210 ffff8609`deb6f080 : nt!NtUnmapViewOfSectionEx+0x99
fffff183`cabe2ad0 fffff804`059d2e18 : ffff8609`de3a7080 0000008c`4c17ca60 00007ffa`952757a0 ffff8609`e69d3c60 : nt!NtUnmapViewOfSection+0xc
fffff183`cabe2b00 00007ffa`9d1bc604 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008c`4c17cb88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9d1bc604


THREAD_SHA1_HASH_MOD_FUNC:  e3e3f454f5c5e2fe31f4ba7b6315002a603841a7

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e1612500ec4dd89991a61214ff6f1ddc9c25756e

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

SYMBOL_NAME:  ONE_BIT

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-02-23T18:43:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2be2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8073d973358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8073d973358

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CPU_COUNT: c

CPU_MHZ: ed8

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x133

PROCESS_NAME:  MsMpEng.exe

CURRENT_IRQL:  d

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  02-23-2020 22:08:06.0921

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DEVICE_OBJECT: ffffe78f00000000

LAST_CONTROL_TRANSFER:  from fffff8073d5eebc1 to fffff8073d5c1510

STACK_TEXT:
ffffad01`2397bb08 fffff807`3d5eebc1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`3d973358 : nt!KeBugCheckEx
ffffad01`2397bb10 fffff807`3d41f897 : 000003f5`111240b3 ffffad01`23a00180 00000000`00000286 ffff8d8c`b2467ab0 : nt!KeAccumulateTicks+0x1cc161
ffffad01`2397bb70 fffff807`3d3601e1 : ffff8d8c`b2467d70 ffffe78f`6d4a2500 ffff8d8c`b2467b30 ffffe78f`6d4a25b0 : nt!KeClockInterruptNotify+0xc07
ffffad01`2397bf30 fffff807`3d402a25 : ffffe78f`6d4a2500 00000000`00000000 00000000`00000000 ffff594d`f987e056 : hal!HalpTimerClockIpiRoutine+0x21
ffffad01`2397bf60 fffff807`3d5c2faa : ffff8d8c`b2467b30 ffffe78f`6d4a2500 ffff9703`ec842c10 ffffe78f`6d4a2500 : nt!KiCallInterruptServiceRoutine+0xa5
ffffad01`2397bfb0 fffff807`3d5c3517 : 00000012`74d268c0 ffff8d8c`b2467b30 ffffe78f`6d4a2500 ffffe78f`7a39f4f0 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8d8c`b2467ab0 fffff807`3d4b4ade : 00000000`00000000 00000000`00000002 ffff8d8c`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8d8c`b2467c40 fffff807`3d4090ae : ffff8d8c`b2467f80 ffff8d8c`b24681a8 ffffe78f`7b66eac0 00000000`00000000 : nt!MiFlushSectionInternal+0x2de
ffff8d8c`b2467f10 fffff807`3d4076cd : 00000000`00000000 ffffe78f`7c0a3380 00000000`00000000 00000000`00000000 : nt!MmFlushSection+0x166
ffff8d8c`b2467fc0 fffff807`3d4d5e73 : ffffe78f`7a39f458 00000000`00000000 ffff8d8c`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6cd
ffff8d8c`b2468110 fffff807`4289b586 : ffff9703`dccbc170 ffff8d8c`b2468710 ffff9703`dccbc001 ffffe78f`77fc4528 : nt!CcCoherencyFlushAndPurgeCache+0x73
ffff8d8c`b2468160 fffff807`427981da : ffffe78f`77fc4528 ffff9703`dccbc170 ffffe78f`77fc4528 ffff9703`dccbc010 : Ntfs!NtfsFlushUserStream+0xc6
ffff8d8c`b24681f0 fffff807`428bd732 : ffffe78f`77fc4528 ffffe78f`72a07180 ffff9703`dccbc010 ffff8d8c`b2468370 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x2e2
ffff8d8c`b2468340 fffff807`4279a577 : ffff9703`e80b47e0 ffffe78f`773c64e0 ffff9703`e80b47e0 ffffe78f`773c64e0 : Ntfs!NtfsFlushVolume+0x2e2
ffff8d8c`b2468460 fffff807`42788527 : ffffe78f`77fc4528 ffffe78f`773c64e0 ffffe78f`72842c70 00000000`00000001 : Ntfs!NtfsVolumeDasdIo+0x1ef
ffff8d8c`b2468520 fffff807`4278641c : ffff8d8c`b2468720 ffffe78f`773c64e0 ffff8d8c`b2468720 ffffe78f`77fc4528 : Ntfs!NtfsCommonRead+0x1ef7
ffff8d8c`b24686e0 fffff807`3d431f79 : ffffe78f`72a09a30 ffffe78f`773c64e0 ffffe78f`773c6910 00000000`00000000 : Ntfs!NtfsFsdRead+0x20c
ffff8d8c`b24687a0 fffff807`41ce55de : 00000000`00000000 ffff8d8c`b2468880 ffffe78f`773c64e0 ffff8d8c`b2468890 : nt!IofCallDriver+0x59
ffff8d8c`b24687e0 fffff807`41ce3f16 : ffff8d8c`b2468880 00000000`00000001 ffffe78f`77d95501 fffff807`3d9f13c5 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffff8d8c`b2468860 fffff807`3d431f79 : ffffe78f`773c64e0 fffff807`3d5f5c70 ffffe78f`7c0a3ad0 00000000`00000000 : FLTMGR!FltpDispatch+0xb6
ffff8d8c`b24688c0 fffff807`3d9e9785 : 00000000`00000000 ffffe78f`7d01fb50 ffffe78f`7d01fba0 ffffe78f`7d01fb50 : nt!IofCallDriver+0x59
ffff8d8c`b2468900 fffff807`3d9e595f : ffffe78f`00000000 00000000`00000000 00000000`00000000 ffff8d8c`b2468b80 : nt!IopSynchronousServiceTail+0x1a5
ffff8d8c`b24689a0 fffff807`3d5d2e18 : 00000000`00000d38 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x59f
ffff8d8c`b2468a90 00007ffe`7767c184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009a`f74fc7a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7767c184


THREAD_SHA1_HASH_MOD_FUNC:  74132733ef8198b9dd76871a96b92b6689423cbe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  4bb6bfd16d3c7580e65485d9ec9ea90751688f2b

THREAD_SHA1_HASH_MOD:  8764cb687a5b7a1604be871561846addc3653d4b

FOLLOWUP_IP:
nt!KeAccumulateTicks+1cc161
fffff807`3d5eebc1 cc              int     3

FAULT_INSTR_CODE:  ab3944cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KeAccumulateTicks+1cc161

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4269a790

IMAGE_VERSION:  10.0.18362.657

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1cc161

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

PRIMARY_PROBLEM_CLASS:  0x133_ISR_nt!KeAccumulateTicks

TARGET_TIME:  2020-02-22T23:14:13.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7a39

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x133_isr_nt!keaccumulateticks

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------
 
Şu an RAM'in tekini çıkardım sistem sürekli mavi ekran verdiği için.
Tek RAM'de stabil çalışıyor.
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…