MEMORY_MANAGEMENT hataları doğrudan bellek hatasını gösteriyor, zaten dosya içeriğinde
memory_corruption yani belleklerde bozulma olduğu yazıyor. Diğer hatada ise
ntkrnlmp.exe hata vermiş, bu da çoğunlukla bellek sorunu oluyor.
MemTest86 ile belleklerde test yapın.
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...
Aynı zamanda BIOS'unuz 2015 yılından kalma, 2018'de çıkmış en güncel sürümü yükleyin.
Ayrıca belleklerinizi kit olarak alın. XMP ayarlarını açtıysanız kapatın. 8+4 GB şeklinde kullanmanız uyumsuzluk sorunu yaratıyor olabilir.
Sürprizbozan: Hatalar
Kod:Panoya kopyala
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff480b1df8b08
Arg3: 0000400000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13556
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff480b1df8b08
BUGCHECK_P3: 400000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffffd0f`e8e060f8 fffff800`5672abba : 00000000`0000001a 00000000`00041792 fffff480`b1df8b08 00004000`00000000 : nt!KeBugCheckEx
fffffd0f`e8e06100 fffff800`566edc06 : 00000000`00000000 ffffc904`35caa700 00000000`0000001d fffff480`b1df8b08 : nt!MiDeleteVa+0x153a
fffffd0f`e8e06200 fffff800`566edd1b : fffff4fa`00000000 ffffc904`35caa700 fffffd0f`00000000 fffffd0f`e8e06670 : nt!MiWalkPageTablesRecursively+0x776
fffffd0f`e8e062a0 fffff800`566edd1b : fffff4fa`7d202c70 ffffc904`35caa700 fffffd0f`00000001 fffffd0f`e8e06680 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0f`e8e06340 fffff800`566edd1b : fffff4fa`7d202000 ffffc904`35caa700 fffffd0f`00000002 fffffd0f`e8e06690 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0f`e8e063e0 fffff800`566dcbfb : 00000000`00000002 ffffc904`35caa700 fffffd0f`00000003 fffffd0f`e8e066a0 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0f`e8e06480 fffff800`56729451 : fffffd0f`e8e06620 ffffc904`00000000 fffff480`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffd0f`e8e06580 fffff800`56701670 : 00000000`00000001 fffffd0f`00000000 ffffc904`35caa550 ffffc904`36418080 : nt!MiDeletePagablePteRange+0x4f1
fffffd0f`e8e06890 fffff800`56a999e9 : ffffc904`00000000 00000000`00000000 00000163`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
fffffd0f`e8e069a0 fffff800`56a997c2 : ffffc904`3f474f20 00000000`00000000 ffffc904`35caa080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffd0f`e8e069d0 fffff800`56a99639 : fffffe2c`270ff611 0000005c`a29fe268 00000000`ff357291 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffffd0f`e8e06ab0 fffff800`568058b8 : ffffc904`36418080 00000163`bef30000 fffffd0f`e8e06b18 ffffc904`35caa080 : nt!NtUnmapViewOfSectionEx+0x99
fffffd0f`e8e06b00 00007ffb`64fef734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005c`a29fe348 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`64fef734
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Kod:Panoya kopyala
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff20000130b08
Arg3: 0000400000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 22635
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: fffff20000130b08
BUGCHECK_P3: 400000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
ffff8b89`d248adf8 fffff806`39b2abba : 00000000`0000001a 00000000`00041792 fffff200`00130b08 00004000`00000000 : nt!KeBugCheckEx
ffff8b89`d248ae00 fffff806`39aedc06 : 00000000`00000000 00000000`00000000 00000000`000001e6 fffff200`00130b08 : nt!MiDeleteVa+0x153a
ffff8b89`d248af00 fffff806`39aedd1b : fffff279`00000000 ffff9304`efd6a700 ffff8b89`00000000 ffff8b89`d248b370 : nt!MiWalkPageTablesRecursively+0x776
ffff8b89`d248afa0 fffff806`39aedd1b : fffff279`3c800000 ffff9304`efd6a700 ffff8b89`00000001 ffff8b89`d248b380 : nt!MiWalkPageTablesRecursively+0x88b
ffff8b89`d248b040 fffff806`39aedd1b : fffff279`3c800000 ffff9304`efd6a700 ffff8b89`00000002 ffff8b89`d248b390 : nt!MiWalkPageTablesRecursively+0x88b
ffff8b89`d248b0e0 fffff806`39adcbfb : 00000000`00000000 ffff9304`efd6a700 00000000`00000003 ffff8b89`d248b3a0 : nt!MiWalkPageTablesRecursively+0x88b
ffff8b89`d248b180 fffff806`39b29451 : ffff8b89`d248b320 ffff9304`00000000 fffff200`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff8b89`d248b280 fffff806`39b01670 : 00000000`00000001 ffff8b89`00000000 ffff9304`efd6a550 ffff9304`ebc0f080 : nt!MiDeletePagablePteRange+0x4f1
ffff8b89`d248b590 fffff806`39e9939f : ffff9304`ebc0f080 00000000`00000000 ffff9304`00000000 ffff9304`00000000 : nt!MiDeleteVad+0x360
ffff8b89`d248b6a0 fffff806`39ee4dd3 : ffff9304`efd53170 ffff9304`efd53170 ffff9304`f2846a10 ffff9304`efd6a080 : nt!MiCleanVad+0x43
ffff8b89`d248b6d0 fffff806`39e81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9304`efd6a080 : nt!MmCleanProcessAddressSpace+0x137
ffff8b89`d248b750 fffff806`39e9ea8a : ffff9304`efd6a080 ffffb882`4e3b5770 ffff8b89`d248b990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8b89`d248b7d0 fffff806`39df4558 : 00000000`c0000005 ffff9304`efd6a001 00000000`00000001 00000000`09c4b000 : nt!PspExitThread+0x5f6
ffff8b89`d248b8d0 fffff806`39ae6ca7 : 00000000`00000000 fffff806`39ae4867 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8b89`d248b910 fffff806`39bf8440 : 00000000`00000000 ffff8b89`d248b9c0 ffff9304`ef8a0368 00000000`00000000 : nt!KiDeliverApc+0x487
ffff8b89`d248b9c0 fffff806`39c0595f : ffff9304`ebc0f080 00000000`00000000 00000000`00000000 ffff9304`00000000 : nt!KiInitiateUserApc+0x70
ffff8b89`d248bb00 00000000`77481cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0e28ec38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77481cfc
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Kod:Panoya kopyala
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffb5bffecfab08
Arg3: 0000400000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4452
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21082
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffb5bffecfab08
BUGCHECK_P3: 400000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: HxT
STACK_TEXT:
ffff9c0f`403640d8 fffff807`2af2abba : 00000000`0000001a 00000000`00041792 ffffb5bf`fecfab08 00004000`00000000 : nt!KeBugCheckEx
ffff9c0f`403640e0 fffff807`2af293ef : ffffa482`3057d700 00000000`00000000 ffffb5bf`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffff9c0f`403641e0 fffff807`2af01670 : 00000000`00000001 ffff9c0f`00000000 ffffa482`3057d550 ffffa482`38196080 : nt!MiDeletePagablePteRange+0x48f
ffff9c0f`403644f0 fffff807`2b2999e9 : ffffa482`30790aa0 00000000`00000000 ffffa482`00000000 ffffa482`00000000 : nt!MiDeleteVad+0x360
ffff9c0f`40364600 fffff807`2b29938c : ffffa482`30790aa0 ffffa482`33776d20 ffffa482`38196080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c0f`40364630 fffff807`2b2e4dd3 : ffffa482`32971d80 ffffa482`32971d80 ffffa482`30790aa0 ffffa482`3057d080 : nt!MiCleanVad+0x30
ffff9c0f`40364660 fffff807`2b281f5f : ffffffff`00000001 ffffffff`ffffffff 00000000`00000001 ffffa482`3057d080 : nt!MmCleanProcessAddressSpace+0x137
ffff9c0f`403646e0 fffff807`2b29ea8a : ffffa482`3057d080 ffff8007`8eaf9060 ffff9c0f`40364920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff9c0f`40364760 fffff807`2b1f4558 : 00000000`00000001 00000000`00000001 00000000`00000000 00000041`389a6000 : nt!PspExitThread+0x5f6
ffff9c0f`40364860 fffff807`2aee6ca7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff9c0f`403648a0 fffff807`2aff8440 : 0000023f`c4509c30 ffff9c0f`40364950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffff9c0f`40364950 fffff807`2b00595f : 00000000`00000000 fffff807`2ae617be ffffa482`3dbc9580 0000023f`c45278d0 : nt!KiInitiateUserApc+0x70
ffff9c0f`40364a90 00007ffd`9fa8a104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000041`397ff978 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`9fa8a104
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Kod:Panoya kopyala
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000001, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000005, error status (normally i/o status code)
Arg3: ffffa10947fbd0c0, current process (virtual address for lock type 3, or PTE)
Arg4: ffffc73efe961000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5140
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13794
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7a
BUGCHECK_P1: 1
BUGCHECK_P2: ffffffffc0000005
BUGCHECK_P3: ffffa10947fbd0c0
BUGCHECK_P4: ffffc73efe961000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WhatsApp.exe
STACK_TEXT:
ffffb106`22afb0d8 fffff800`6bc72bbc : 00000000`0000007a 00000000`00000001 ffffffff`c0000005 ffffa109`47fbd0c0 : nt!KeBugCheckEx
ffffb106`22afb0e0 fffff800`6baeda6b : 00000000`00000001 ffffa109`00000000 00000000`00000194 00004000`00000000 : nt!MiGetNextPageTablePte+0x18471c
ffffb106`22afb130 fffff800`6baedd1b : ffffc763`00000000 ffffa109`47fbd740 ffffb106`00000001 ffffb106`22afb510 : nt!MiWalkPageTablesRecursively+0x5db
ffffb106`22afb1d0 fffff800`6baedd1b : ffffc763`00000000 ffffa109`47fbd740 ffffb106`00000002 ffffb106`22afb520 : nt!MiWalkPageTablesRecursively+0x88b
ffffb106`22afb270 fffff800`6badcbfb : 00000000`00000000 ffffa109`47fbd740 00000000`00000003 ffffb106`22afb530 : nt!MiWalkPageTablesRecursively+0x88b
ffffb106`22afb310 fffff800`6bb29451 : ffffb106`22afb4b0 ffffa109`00000000 ffffc73e`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffb106`22afb410 fffff800`6bb01670 : 00000000`00000001 ffffb106`00000000 ffffa109`47fbd590 ffffa109`4a12e080 : nt!MiDeletePagablePteRange+0x4f1
ffffb106`22afb720 fffff800`6be999e9 : ffffa109`4d145200 00000000`00000000 ffffa109`00000000 ffffa109`00000000 : nt!MiDeleteVad+0x360
ffffb106`22afb830 fffff800`6be9938c : ffffa109`4d145200 ffffa109`470d7700 ffffa109`4a12e080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb106`22afb860 fffff800`6bee4dd3 : ffffa109`4d13a940 ffffa109`4d13a940 ffffa109`4d145200 ffffa109`47fbd0c0 : nt!MiCleanVad+0x30
ffffb106`22afb890 fffff800`6be81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffa109`47fbd0c0 : nt!MmCleanProcessAddressSpace+0x137
ffffb106`22afb910 fffff800`6be9ea8a : ffffa109`47fbd0c0 ffffe08d`28d16060 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffb106`22afb990 fffff800`6bdf3eae : ffffa109`00000000 00000000`00000001 00000000`00000000 00000055`074be000 : nt!PspExitThread+0x5f6
ffffb106`22afba90 fffff800`6bc058b8 : ffffa109`47fbd0c0 ffffa109`4a12e080 ffffb106`22afbb80 ffffa109`47fbd0c0 : nt!NtTerminateProcess+0xde
ffffb106`22afbb00 00007ffc`b728c344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000055`076ff6b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b728c344
SYMBOL_NAME: nt!MiGetNextPageTablePte+18471c
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 18471c
FAILURE_BUCKET_ID: 0x7a_c0000005_nt!MiGetNextPageTablePte
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4584103-842d-cac6-0c84-edfb0f8fe0b3}
Followup: MachineOwner
---------
Dosyayı WinDbg ile analiz ediyoruz. Analiz tamamlandıktan sonra
!sysinfo machineid komutunu girdiğiniz zaman anakarta dair tüm bilgiler çıkıyor.
Tabii, WinDbg kullanmak şart değil. Başka yöntemlerle de analiz yapılabilir ama o yöntemleri bilmiyorum.