Sorun açık ve net RAM'de. BIOS'tan XMP açıksa kapatın ve Memtest86 testi uygulayın. Ek olarak Wi-Fi aygıtınızın sürücüsünü güncellemeyi deneyin.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffffa1488003eb0
Arg3: 80000002cd7a9867
Arg4: fffffa1588003eb0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6077
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14071
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: fffffa1488003eb0
BUGCHECK_P3: 80000002cd7a9867
BUGCHECK_P4: fffffa1588003eb0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffa70c`21378ca8 fffff806`6849a5b9 : 00000000`0000001a 00000000`00000403 fffffa14`88003eb0 80000002`cd7a9867 : nt!KeBugCheckEx
ffffa70c`21378cb0 fffff806`6849ad6e : 00000000`00000000 ffffa70c`213793c0 fffffa14`88004000 ffffa70c`21379310 : nt!MiDeletePteRun+0x17b9
ffffa70c`21378ec0 fffff806`6840bedd : 00000000`00000000 ffff948b`22097700 ffffa70c`21379310 fffffa14`88003f40 : nt!MiDeleteVaTail+0x6e
ffffa70c`21378ef0 fffff806`6840bafb : fffffa7d`00000000 ffff948b`22097700 ffffa70c`00000000 ffffa70c`21379360 : nt!MiWalkPageTablesRecursively+0xc6d
ffffa70c`21378f90 fffff806`6840bafb : fffffa7d`3e852200 ffff948b`22097700 ffffa70c`00000001 ffffa70c`21379370 : nt!MiWalkPageTablesRecursively+0x88b
ffffa70c`21379030 fffff806`6840bafb : fffffa7d`00000000 ffff948b`22097700 ffffa70c`00000002 ffffa70c`21379380 : nt!MiWalkPageTablesRecursively+0x88b
ffffa70c`213790d0 fffff806`6845de6b : 00000000`00000000 ffff948b`22097700 00000000`00000003 ffffa70c`21379390 : nt!MiWalkPageTablesRecursively+0x88b
ffffa70c`21379170 fffff806`6849b991 : ffffa70c`21379310 ffff948b`00000000 fffffa08`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffa70c`21379270 fffff806`6846baf0 : 00000000`00000001 ffffa70c`00000000 ffff948b`22097550 ffff948b`235d9080 : nt!MiDeletePagablePteRange+0x4f1
ffffa70c`21379580 fffff806`68835783 : ffff948b`235d9080 00000000`00000000 ffff948b`00000000 ffff948b`00000000 : nt!MiDeleteVad+0x360
ffffa70c`21379690 fffff806`68833a3f : ffff948b`22b91090 ffff948b`22b91090 ffff948b`22b90140 ffff948b`22097080 : nt!MiCleanVad+0x43
ffffa70c`213796c0 fffff806`6885db24 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff948b`22097080 : nt!MmCleanProcessAddressSpace+0x137
ffffa70c`21379740 fffff806`68906b16 : ffff948b`22097080 ffffaa86`d28618e0 ffffa70c`21379990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffa70c`213797d0 fffff806`688d2868 : ffff948b`00000000 00000000`00000001 ffffa70c`213799e0 000000a2`3826d000 : nt!PspExitThread+0x5f6
ffffa70c`213798d0 fffff806`68467fb7 : 00000000`40cc0088 00000000`00000000 00000000`00000000 fffff806`6840ecc6 : nt!KiSchedulerApcTerminate+0x38
ffffa70c`21379910 fffff806`685fa1c0 : 000000a2`3a3ff5d8 ffffa70c`213799c0 ffffa70c`21379b80 00002910`00000000 : nt!KiDeliverApc+0x487
ffffa70c`213799c0 fffff806`6860765f : ffff948b`235d9080 ffff948b`21b5b960 ffffa70c`21379b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffa70c`21379b00 00007ffe`ee9acc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a2`3a3ff5a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ee9acc94
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.844
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000402, The subtype of the bugcheck.
Arg2: ffff8c09c52a14d8
Arg3: 00002002cd7a9860
Arg4: ffff8c08c52a14d8
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5QPUIS0
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25414
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 402
BUGCHECK_P2: ffff8c09c52a14d8
BUGCHECK_P3: 2002cd7a9860
BUGCHECK_P4: ffff8c08c52a14d8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff004`de692768 fffff804`53c42acd : 00000000`0000001a 00000000`00000402 ffff8c09`c52a14d8 00002002`cd7a9860 : nt!KeBugCheckEx
fffff004`de692770 fffff804`53a83675 : 00000000`00000000 00000000`00000000 ffff8c09`b3a00311 80000001`00000001 : nt!MiDeleteTransitionPte+0x1a80fd
fffff004`de6927f0 fffff804`53ab96f6 : ffffdf8b`aa5f2798 fffff004`de692918 ffffdf8b`ae22f600 ffffdf8b`00000000 : nt!MiDeleteSubsectionPages+0x435
fffff004`de6928b0 fffff804`53e3e2e6 : 00000000`000800a9 00000000`00000000 fffff804`54450dc0 00000000`000800a9 : nt!MiDeleteSegmentPages+0x56
fffff004`de692910 fffff804`53b7c174 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiSegmentDelete+0x92
fffff004`de692960 fffff804`53d2309d : 00000000`00000001 00000000`00000000 fffff804`544514d0 ffff8c09`bfaaa010 : nt!MiDestroySection+0x58
fffff004`de692990 fffff804`53ca7969 : 00000000`00000000 00000000`00000000 fffff804`54451468 fffff804`544514d0 : nt!MiDeleteCachedSegment+0x1c5
fffff004`de6929e0 fffff804`53b17e55 : ffffdf8b`a160c040 ffffdf8b`a160c040 00000000`00000080 fffff804`53bb90f0 : nt!MiDereferenceSegmentThread+0xee879
fffff004`de692c10 fffff804`53bfd278 : ffff9d80`2be80180 ffffdf8b`a160c040 fffff804`53b17e00 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff004`de692c60 00000000`00000000 : fffff004`de693000 fffff004`de68d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiDeleteTransitionPte+1a80fd
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.844
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1a80fd
FAILURE_BUCKET_ID: 0x1a_402_nt!MiDeleteTransitionPte
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2d89ec63-c6a2-64d9-fbb7-0ac2e6941676}
Followup: MachineOwner
---------[/CODE]