i5-4460 Sistem sürekli çıkan mavi ekran hatası

İşletim sistemi
Windows 10

beyoglu34

Hectopat
Katılım
3 Ocak 2021
Mesajlar
13
Daha fazla  
Cinsiyet
Erkek
Merhaba, genellikle oyun oynarken karşılaşmaktayım. Ama web üzerinde de bir anda mavi ekran çıktığı oluyor. Yardımcı olursanız çok sevinirim.

Minidump link: minidump.rar

Sistem bilgileri;

Intel Core i5-4460 dört çekirdekli 3.20 GHz işlemci.
Afox Intel H81-MA5 DDR3 VGA+LAN 1150p.
Neo Forza 8 GB DDR3 1600 MHz PC/12800 PC-RAM.
Afox NVIDIA GTX1050-TI 4 GB 128 bit GDDR5.
 
Son düzenleyen: Moderatör:
Ben RAM hatası olarak yorumladım çünkü dosyaları analiz ederken "memory_corruption" ve "MEMORY_CORRUPTION_ONE_BIT" ibaresi yer almakta. Rica etsem Memtest yazılımı ile RAM'lerinizi teste sokup sonucu paylaşır mısınız?

Memtest : Memtest86 USB'den Çalışan RAM Test Programı

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffd629b28
Arg3: 0000000000400000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2421

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7968

    Key  : Analysis.Init.CPU.mSec
    Value: 764

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7961

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : MemoryManagement.PFN
    Value: 400


FILE_IN_CAB:  113021-11500-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff81bffd629b28

BUGCHECK_P3: 400000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  sppsvc.exe

STACK_TEXT: 
fffff604`14a83d48 fffff807`4e0440ca     : 00000000`0000001a 00000000`00041792 ffff81bf`fd629b28 00000000`00400000 : nt!KeBugCheckEx
fffff604`14a83d50 fffff807`4e09e416     : 00000000`00000000 00000000`00000000 00000000`0000013f ffff81bf`fd629b28 : nt!MiDeleteVa+0x153a
fffff604`14a83e50 fffff807`4e09e52b     : ffff81c0`00000000 ffffe087`d63e6700 fffff604`00000000 fffff604`14a842c0 : nt!MiWalkPageTablesRecursively+0x776
fffff604`14a83ef0 fffff807`4e09e52b     : ffff81c0`e06fff58 ffffe087`d63e6700 fffff604`00000001 fffff604`14a842d0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a83f90 fffff807`4e09e52b     : ffff81c0`e06ff000 ffffe087`d63e6700 fffff604`00000002 fffff604`14a842e0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a84030 fffff807`4e004f4b     : 00000000`00000000 ffffe087`d63e6700 00000000`00000003 fffff604`14a842f0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a840d0 fffff807`4e042961     : fffff604`14a84270 ffffe087`00000000 ffff81bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff604`14a841d0 fffff807`4e012aa0     : 00000000`00000001 fffff604`00000000 ffffe087`d63e6550 ffffe087`d6283080 : nt!MiDeletePagablePteRange+0x4f1
fffff604`14a844e0 fffff807`4e401149     : ffffe087`d3f4c940 00000000`00000000 ffffe087`00000000 ffffe087`00000000 : nt!MiDeleteVad+0x360
fffff604`14a845f0 fffff807`4e4007e0     : ffffe087`d3f4c940 ffffe087`d3dd2d10 ffffe087`d6283080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff604`14a84620 fffff807`4e3feaaf     : ffffe087`d3f4cd00 ffffe087`d3f4cd00 ffffe087`d3f4c940 ffffe087`d63e6080 : nt!MiCleanVad+0x30
fffff604`14a84650 fffff807`4e45c5a8     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe087`d63e6080 : nt!MmCleanProcessAddressSpace+0x137
fffff604`14a846d0 fffff807`4e4b0c26     : ffffe087`d63e6080 ffff8f8d`062906b0 fffff604`14a84920 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffff604`14a84760 fffff807`4e4f5538     : 00000000`00000000 00000000`00000001 00000001`00000000 00000038`553f8000 : nt!PspExitThread+0x5f6
fffff604`14a84860 fffff807`4e00ef67     : 00000000`00000101 00000000`00000000 ffffe087`d5642b50 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff604`14a848a0 fffff807`4e1fb840     : 0000018f`48592240 fffff604`14a84950 00000038`5515fa88 ffffe087`00000000 : nt!KiDeliverApc+0x487
fffff604`14a84950 fffff807`4e208d5f     : 00000000`00000000 fffff604`14a84b80 00000000`00000000 ffffe087`d82ec1c0 : nt!KiInitiateUserApc+0x70
fffff604`14a84a90 00007ffa`c69f07c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`5515fa38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`c69f07c4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff28000404b28
Arg3: 0000000000400000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3695

    Key  : Analysis.Init.CPU.mSec
    Value: 686

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7766

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : MemoryManagement.PFN
    Value: 400


FILE_IN_CAB:  112721-11406-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff28000404b28

BUGCHECK_P3: 400000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  PES2021.exe

STACK_TEXT: 
ffffea8b`984990f8 fffff801`606440ca     : 00000000`0000001a 00000000`00041792 fffff280`00404b28 00000000`00400000 : nt!KeBugCheckEx
ffffea8b`98499100 fffff801`6069e416     : 00000000`00000000 00000000`00000000 00000000`0000000e fffff280`00404b28 : nt!MiDeleteVa+0x153a
ffffea8b`98499200 fffff801`6069e52b     : fffff2f9`40002020 ffff9201`7c184700 ffffea8b`00000000 ffffea8b`98499670 : nt!MiWalkPageTablesRecursively+0x776
ffffea8b`984992a0 fffff801`6069e52b     : fffff2f9`7ca00010 ffff9201`7c184700 ffffea8b`00000001 ffffea8b`98499680 : nt!MiWalkPageTablesRecursively+0x88b
ffffea8b`98499340 fffff801`6069e52b     : fffff2f9`7ca00000 ffff9201`7c184700 ffffea8b`00000002 ffffea8b`98499690 : nt!MiWalkPageTablesRecursively+0x88b
ffffea8b`984993e0 fffff801`60604f4b     : 00000000`00000000 ffff9201`7c184700 00000000`00000003 ffffea8b`984996a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffea8b`98499480 fffff801`60642961     : ffffea8b`98499620 ffff9201`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffea8b`98499580 fffff801`60612aa0     : 00000000`00000001 ffffea8b`00000000 ffff9201`7c184550 ffff9201`7e5a5080 : nt!MiDeletePagablePteRange+0x4f1
ffffea8b`98499890 fffff801`60a01149     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffea8b`984999a0 fffff801`60a00f22     : ffff9201`7e107c60 00000000`00000000 ffff9201`7c184080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffea8b`984999d0 fffff801`60a00d99     : 00000000`00000000 00000000`51350000 00000000`062bea80 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffea8b`98499ab0 fffff801`60808cb8     : ffff9201`7e5a5080 00000000`80800000 ffffea8b`98499b80 ffff9201`7c184080 : nt!NtUnmapViewOfSectionEx+0x99
ffffea8b`98499b00 00007ffd`e12d06e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`062be8c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e12d06e4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
 

Bu konuyu görüntüleyen kullanıcılar

Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…