i5-4460 Sistem sürekli çıkan mavi ekran hatası

İşletim sistemi
Windows 10

beyoglu34

Hectopat
Katılım
3 Ocak 2021
Mesajlar
13
Daha fazla  
Cinsiyet
Erkek
Merhaba, genellikle oyun oynarken karşılaşmaktayım. Ama web üzerinde de bir anda mavi ekran çıktığı oluyor. Yardımcı olursanız çok sevinirim.

Minidump link: minidump.rar

Sistem bilgileri;

Intel Core i5-4460 dört çekirdekli 3.20 GHz işlemci.
Afox Intel H81-MA5 DDR3 VGA+LAN 1150p.
Neo Forza 8 GB DDR3 1600 MHz PC/12800 PC-RAM.
Afox NVIDIA GTX1050-TI 4 GB 128 bit GDDR5.
 
Son düzenleyen: Moderatör:
Ben RAM hatası olarak yorumladım çünkü dosyaları analiz ederken "memory_corruption" ve "MEMORY_CORRUPTION_ONE_BIT" ibaresi yer almakta. Rica etsem Memtest yazılımı ile RAM'lerinizi teste sokup sonucu paylaşır mısınız?

Memtest : Memtest86 USB'den Çalışan RAM Test Programı

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffd629b28
Arg3: 0000000000400000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2421

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7968

    Key  : Analysis.Init.CPU.mSec
    Value: 764

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7961

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : MemoryManagement.PFN
    Value: 400


FILE_IN_CAB:  113021-11500-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff81bffd629b28

BUGCHECK_P3: 400000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  sppsvc.exe

STACK_TEXT: 
fffff604`14a83d48 fffff807`4e0440ca     : 00000000`0000001a 00000000`00041792 ffff81bf`fd629b28 00000000`00400000 : nt!KeBugCheckEx
fffff604`14a83d50 fffff807`4e09e416     : 00000000`00000000 00000000`00000000 00000000`0000013f ffff81bf`fd629b28 : nt!MiDeleteVa+0x153a
fffff604`14a83e50 fffff807`4e09e52b     : ffff81c0`00000000 ffffe087`d63e6700 fffff604`00000000 fffff604`14a842c0 : nt!MiWalkPageTablesRecursively+0x776
fffff604`14a83ef0 fffff807`4e09e52b     : ffff81c0`e06fff58 ffffe087`d63e6700 fffff604`00000001 fffff604`14a842d0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a83f90 fffff807`4e09e52b     : ffff81c0`e06ff000 ffffe087`d63e6700 fffff604`00000002 fffff604`14a842e0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a84030 fffff807`4e004f4b     : 00000000`00000000 ffffe087`d63e6700 00000000`00000003 fffff604`14a842f0 : nt!MiWalkPageTablesRecursively+0x88b
fffff604`14a840d0 fffff807`4e042961     : fffff604`14a84270 ffffe087`00000000 ffff81bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff604`14a841d0 fffff807`4e012aa0     : 00000000`00000001 fffff604`00000000 ffffe087`d63e6550 ffffe087`d6283080 : nt!MiDeletePagablePteRange+0x4f1
fffff604`14a844e0 fffff807`4e401149     : ffffe087`d3f4c940 00000000`00000000 ffffe087`00000000 ffffe087`00000000 : nt!MiDeleteVad+0x360
fffff604`14a845f0 fffff807`4e4007e0     : ffffe087`d3f4c940 ffffe087`d3dd2d10 ffffe087`d6283080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff604`14a84620 fffff807`4e3feaaf     : ffffe087`d3f4cd00 ffffe087`d3f4cd00 ffffe087`d3f4c940 ffffe087`d63e6080 : nt!MiCleanVad+0x30
fffff604`14a84650 fffff807`4e45c5a8     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe087`d63e6080 : nt!MmCleanProcessAddressSpace+0x137
fffff604`14a846d0 fffff807`4e4b0c26     : ffffe087`d63e6080 ffff8f8d`062906b0 fffff604`14a84920 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffff604`14a84760 fffff807`4e4f5538     : 00000000`00000000 00000000`00000001 00000001`00000000 00000038`553f8000 : nt!PspExitThread+0x5f6
fffff604`14a84860 fffff807`4e00ef67     : 00000000`00000101 00000000`00000000 ffffe087`d5642b50 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff604`14a848a0 fffff807`4e1fb840     : 0000018f`48592240 fffff604`14a84950 00000038`5515fa88 ffffe087`00000000 : nt!KiDeliverApc+0x487
fffff604`14a84950 fffff807`4e208d5f     : 00000000`00000000 fffff604`14a84b80 00000000`00000000 ffffe087`d82ec1c0 : nt!KiInitiateUserApc+0x70
fffff604`14a84a90 00007ffa`c69f07c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`5515fa38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`c69f07c4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff28000404b28
Arg3: 0000000000400000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2405

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3695

    Key  : Analysis.Init.CPU.mSec
    Value: 686

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7766

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : MemoryManagement.PFN
    Value: 400


FILE_IN_CAB:  112721-11406-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff28000404b28

BUGCHECK_P3: 400000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  PES2021.exe

STACK_TEXT: 
ffffea8b`984990f8 fffff801`606440ca     : 00000000`0000001a 00000000`00041792 fffff280`00404b28 00000000`00400000 : nt!KeBugCheckEx
ffffea8b`98499100 fffff801`6069e416     : 00000000`00000000 00000000`00000000 00000000`0000000e fffff280`00404b28 : nt!MiDeleteVa+0x153a
ffffea8b`98499200 fffff801`6069e52b     : fffff2f9`40002020 ffff9201`7c184700 ffffea8b`00000000 ffffea8b`98499670 : nt!MiWalkPageTablesRecursively+0x776
ffffea8b`984992a0 fffff801`6069e52b     : fffff2f9`7ca00010 ffff9201`7c184700 ffffea8b`00000001 ffffea8b`98499680 : nt!MiWalkPageTablesRecursively+0x88b
ffffea8b`98499340 fffff801`6069e52b     : fffff2f9`7ca00000 ffff9201`7c184700 ffffea8b`00000002 ffffea8b`98499690 : nt!MiWalkPageTablesRecursively+0x88b
ffffea8b`984993e0 fffff801`60604f4b     : 00000000`00000000 ffff9201`7c184700 00000000`00000003 ffffea8b`984996a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffea8b`98499480 fffff801`60642961     : ffffea8b`98499620 ffff9201`00000000 fffff280`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffea8b`98499580 fffff801`60612aa0     : 00000000`00000001 ffffea8b`00000000 ffff9201`7c184550 ffff9201`7e5a5080 : nt!MiDeletePagablePteRange+0x4f1
ffffea8b`98499890 fffff801`60a01149     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffea8b`984999a0 fffff801`60a00f22     : ffff9201`7e107c60 00000000`00000000 ffff9201`7c184080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffea8b`984999d0 fffff801`60a00d99     : 00000000`00000000 00000000`51350000 00000000`062bea80 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffea8b`98499ab0 fffff801`60808cb8     : ffff9201`7e5a5080 00000000`80800000 ffffea8b`98499b80 ffff9201`7c184080 : nt!NtUnmapViewOfSectionEx+0x99
ffffea8b`98499b00 00007ffd`e12d06e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`062be8c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e12d06e4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı